18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe




Название18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe
страница3/21
Дата конвертации30.09.2012
Размер1.41 Mb.
ТипДокументы
1   2   3   4   5   6   7   8   9   ...   21
INCLUDE "cin.h"
implicit doubleprecision(a-h,o-z)
common /nnn/ee(NVM), nnn(NVM) , kk(NVM) , ll(NVM) , jj(NVM),nlist
COMMON /NINT/NINT/NHINT/NHINT/NH/NH(NJZMAX)
1 /ns/ns/nso/nso/JZ/JZ(NJZMAX) /kkmax/kkmax /de/icutq
dimension q(10)
C A-------C
C /K
C B-------D
E=0.d0
nx = ns - nso + 1
KAMAX=NS-NSO
NGINT=NINT-NHINT
IS=1
IA=I1
IB=I2
IC=I3
ID=I4
200 MA=JZ(IA)
MB=JZ(IB)
MC=JZ(IC)
----
MD=JZ(ID)
IF (MA+MB.NE.MC+MD) GOTO 1000
NA=NH(IA)
NB=NH(IB)
NC=NH(IC)
ND=NH(ID)
LA=LL(NA)
LB=LL(NB)
LC=LL(NC)
LD=LL(ND)
I=LA+LB+LC+LD
IF (I.NE.2*(I/2)) GOTO 1000
JA=JJ(NA)
JB=JJ(NB)
JC=JJ(NC)
JD=JJ(ND)
if(icutq.gt.0)then
call findke(NA,NC,NB,ND,kmin,kmax,nk,q)
if(nk.eq.0)call findk(NA,NC,NB,ND,kmin,kmax,nk,q)
else
call findk(NA,NC,NB,ND,kmin,kmax,nk,q)
end if
kkk=0
c print 12,kmin,kmax,ja,ma,jb,mb,jc,mc,jd,md
c 12 format('' k:'',10i5)
do 10 k=kmin,kmax,2
kkk=kkk+1
E=E+IS*GAUNT(K,JA*0.5d0,MA*0.5d0,JC*0.5d0,MC*0.5d0)*
1 GAUNT(K,JD*0.5d0,MD*0.5d0,JB*0.5d0,MB*0.5d0)*Q(kkk)
c print 11,k,IS*GAUNT(K,JA*0.5d0,MA*0.5d0,JC*0.5d0,MC*0.5d0)*
c 1 GAUNT(K,JD*0.5d0,MD*0.5d0,JB*0.5d0,MB*0.5d0)*Q(kkk)
11 format('' q:'',i2,2e13.5)
10 CONTINUE
1000 K=IC
IC=ID
ID=K
IS=-IS
IF (IS.EQ.-1) GOTO 200
GINT=E
c PRINT 170, I1,I2,I3,I4,NA,NB,NC,ND,E
c 170 FORMAT('' GINT:'',8I6,E17.7)
RETURN
END
c..............
c
subroutine findke(m1,m2,m3,m4,kmin,kmax,nk,q)
INCLUDE "cin.h"
implicit doubleprecision(a-h,o-z)
common /nnn/ee(NVM), nnn(NVM) , kk(NVM) , ll(NVM) , jj(NVM),nlist
common /qpar/nvl(NVM) ,nvlist
common /qqqe/qq(NIMAX1) ,qqe(NIMAX1) ,kat(NKAT1)
, ngint,katomax /DE/ICUTQ,DE /fk/fk(9),fkk(9)
real qq, qqe
dimension q(10)
* m1------m2
* /k
* m3------m4
nk=0
mb1=nvstate(m1)
if(mb1.eq.0)return
mb2=nvstate(m2)
if(mb2.eq.0)return
--
mb3=nvstate(m3)
if(mb3.eq.0)return
mb4=nvstate(m4)
if(mb4.eq.0)return
c print 117,m1,m2,m3,m4,mb1,mb2,mb3,mb4
c 117 format('' findke:'',8i5)
mm1=max0(mb1,mb2)
mm2=min0(mb1,mb2)
mm3=max0(mb3,mb4)
mm4=min0(mb3,mb4)
if(mm3.gt.mm1)then
mv1=mm3
mv2=mm4
mv3=mm1
mv4=mm2
else
mv1=mm1
mv2=mm2
mv3=mm3
mv4=mm4
end if
katom=nvlist*(mv1-1)+mv2
i1=kat(katom)
i2=kat(katom+1)-1
k=kmin
ind=10*(nvlist*(mv3-1)+mv4)+k
c print *, ''i1,i2,ind:'',i1,i2,ind
if(i1.lt.0.or.i2.lt.0)then
print 22,m1,m2,m3,m4,k
22 format(''findk:'',5i5)
print 23,nlist,katom,i1,i2,ind
23 format(5i6)
end if

if(ind.lt.nad(i1).or.ind.gt.nad(i2))then
print 2,k,m1,m2,m3,m4,i1,i2,ind,nad(i1),nad(i2)
2 format('' findk : '', i2,'' : '',4i4,'' : '',2i4,'' : '',3i6)
stop
end if
if(nad(i1).eq.ind)then
iadr=i1
goto 18
end if
if(nad(i2).eq.ind)then
iadr=i2
goto 18
end if
10 i3=(i1+i2)/2
if(i3.eq.i1.or.i3.eq.i2)go to 17
if(nad(i3).eq.ind)then
iadr=i3
goto 18
end if
if(nad(i3).gt.ind)then
i2=i3
else
i1=i3
end if
if(i1.eq.i2.and.nad(i1).ne.ind)then
17 print 1,m1,m2,m3,m4,k,mv1,mv2,mv3,mv4
1 format('' Cannot find '', 4i5,'' k='',i2,'' mv='',4i3)
----
print 3,kk(m1),kk(m2),kk(m3),kk(m4),k
3 format('' Kaps:'' ,4i4,'' k='',i2)
print 4, kat(katom),kat(katom+1),i1,i2,nad(i1),nad(i2) ,ind
4 format(4i7,3i10)
stop
end if
go to 10
18 nk=nk+1
if(icutq.eq.1)then
q(nk)=qq(iadr)+qqe(iadr)
else
q(nk)=qq(iadr)*fk(k+1)
end if
if(k.ge.kmax)return
k=k+2
iadr=iadr+1
goto 18
20 return
end
c..............
c
function nvstate(m1)
include "cin.h"
common /qpar/nvl(NVM) ,nvlist
c print 1,nvlist,(nv(i),i=1,nvlist)
c 1 format(''nvlist='',i3,'' nvl:'',20i3)
nvstate=0
do i=1,nvlist
if(nvl(i).eq.m1)then
nvstate=1
return
end if
end do
return
end
c
subroutine findk(na,nc,nb,nd,kmin,kmax,nk,q)
include "cin.h"
implicit doubleprecision(a-h,o-z)
common /some/jmin
common /nnn/ee(NVM), nnn(NVM) , kk(NVM) , ll(NVM) , jj(NVM),nlist
common /qqq/qq(NIMAX2), nad(NIMAX2) , kat(NIMAX2),ngint,katomax
common /de/icutq,de /fk/fk(9), fkk(9)
dimension q(10)
real qq,rsig,rdsig
* na------nc
* /k
* nb------nd
nk=0
call limits(na,nc,nb,nd,kmin,kmax,*20)
q=0.d0
mm1=max0(na,nc)
mm2=min0(na,nc)
mm3=max0(nb,nd)
mm4=min0(nb,nd)
if(mm3.gt.mm1)then
m1=mm3
m2=mm4
m3=mm1
m4=mm2
else
m1=mm1
m2=mm2
--
m3=mm3
m4=mm4
end if
katom=(nlist-jmin)*(m1-jmin-1)+m2-jmin
i1=kat(katom)
i2=kat(katom+1)-1
if(i1.le.0.or.i2.le.0)stop ''i1 or i2 in qfindk are wrong''
k=kmin
ind=10*((nlist-jmin)*(m3-jmin-1)+m4-jmin)+k
if(ind.lt.nad(i1).or.ind.gt.nad(i2))then !stop ''ind in qfindk is wrong''
print 41,m1,m2,m3,m4,na,nb,nc,nd,k,
, i1,i2,nlist,ind,nad(i1),nad(i2)
41 format(9i5/6i8)
stop
end if
if(nad(i1).eq.ind)then
iadr=i1
goto 18
end if
if(nad(i2).eq.ind)then
iadr=i2
goto 18
end if
10 i3=(i1+i2)/2
if(i3.eq.i1.or.i3.eq.i2)go to 17
if(nad(i3).eq.ind)then
iadr=i3
goto 18
end if
if(nad(i3).gt.ind)then
i2=i3
else
i1=i3
end if
if(i1.eq.i2.and.nad(i1).ne.ind)then
17 print 1,m1,m2,m3,m4,k
1 format(''Cannot find '',4i5, '' k='',i2)
print 33,kk(m1),kk(m2),kk(m3),kk(m4),k
33 format(''Kaps:'',4i4,'' k='',i2)
print 34,kat(katom),kat(katom+1)-1,i1,i2,nad(i1),nad(i2),ind
34 format(4i7,3i10)
stop
end if
go to 10
18 nk=nk+1
if(icutq.eq.1)then
c icutq - включение сигмы или выключение?
q(nk)=qq(iadr)*fkk(k+1)
else
q(nk)=qq(iadr)*fk(k+1)
end if
if(k.ge.kmax)return
k=k+2
iadr=iadr+1
goto 18
20 return
end
c
subroutine limits(m1,m2,m3,m4,kmin,kmax,*)
include "cin.h"
implicit doubleprecision(a-h,o-z)
common /nnn/ee(NVM), nnn(NVM) , kk(NVM) , ll(NVM) , jj(NVM),nlist
if(mod(ll(m1)+ll(m3),2).ne.mod(ll(m2)+ll(m4),2))return 1
----
kmin1=iabs(ll(m1)-ll(m2))
if(iabs(jj(m1)-jj(m2))/2.gt.kmin1)kmin1=kmin1+2
kmax1=ll(m1)+ll(m2)
if((jj(m1)+jj(m2))/2.lt.kmax1)kmax1=kmax1-2
if(kmax1.lt.kmin1) return 1
kmin2=iabs(ll(m3)-ll(m4))
if(iabs(jj(m3)-jj(m4))/2.gt.kmin2)kmin2=kmin2+2
kmax2=ll(m3)+ll(m4)
if((jj(m3)+jj(m4))/2.lt.kmax1)kmax2=kmax2-2
if(kmax2.lt.kmin2) return 1
kmin=max0(kmin1,kmin2)
kmax=min0(kmax1,kmax2)
if(kmax.lt.kmin) return 1
return
end
c
FUNCTION GAUNT(K,J1,M1,J2,M2)
implicit real *8 (a-h,o-z)
common/in/ kmax, in(41000),kat(2000) /gnt/gnt(41000)
c common /in/in(1294) /gnt/gnt(1294)
REAL*8 J1,M1,J2,M2
is = 1
g = 0.d0
im = dabs(m2-m1)
if(k.LT.im) goto 1000
g = 1.d0
if(k.EQ.0) goto 1000
if(j2.GE.j1) goto 200
x = j2
j2 = j1
j1 = x
x = m2
m2 = m1
m1 = x
if(im.NE.2*(im/2)) is = -is
200 if(m1.GT.0.d0) goto 210
m1 = -m1
m2 = -m2
ij = k+j1-j2
if(ij.NE.2*(ij/2)) is = -is
c 210 ind = 10000*k + 2000*j1 + 200*j2 + 10*(j1+m1) + (j2+m2)
ij1=j1+0.501
ij2=j2+0.501
ina=(ij1-1)*kmax+ij2
do 10 i=kat(ina),kat(ina+1)-1
c print 2, ind,i,in(i)
2 format(3i8)
if(in(i).NE.ind) goto 10
g = gnt(i)
goto 1000
10 continue
write (*,5) ind,k,j1,m1,j2,m2,ina,kat(ina),kat(ina+1)-1
5 format(1X, ''Gaunt: can not find index '',I6/
/ i4,4f6.2,3i6)
stop
1000 gaunt = g*is
return
end
c..............
c
SUBROUTINE OUTP(NV,NLEV,EV,WORK)
INCLUDE "cin.h"
--
implicit real * 8 (a-h,o-z)
COMMON /NC/NC /NE/NE /MJ/MJ
COMMON /NDC/NDC(NCMAX) /ER0/ER0 /ncjnr/ncjnr(ncmax)
COMMON /NCJ/NCJ(NCMAX) /COEF/COEF(NCOEF)
dimension ev(NT), work(*), ck(ndetmax)
data ccmax/1.00/
REAL COEF
real *8 jz, lz
AJ=0.5D0*MJ
PRINT 1, AJ
1 FORMAT(40(''='')/''States with J='', f5.2,'':'')
IVV=0
DO 100 IE=1,NLEV
IC0=0
CC=0.D0
SN=0.D0
ck=0.
nd=0
ii=0
DO 10 IV=1,NV
IVV=IVV+1
IC=NCJ(IV)
call dets(ic,ni1,ni2)
nd=max0(nd,ni2)
do i=ni1,ni2
ii=ii+1
ck(i)=ck(i)+work(ivv)*coef(ii)
end do
icnr=ncjnr(ic)
IF(ICnr.NE.IC0) THEN
IF(CC.GT.IC0)THEN
PRINT 3,CC
3 FORMAT(F10.5,''%''$)
CALL PCONFnr(6,IC0)
END IF
IC0=ICnr
CC=100*WORK(IVV)**2
ELSE
CC=CC+100*WORK(IVV)**2
END IF
SN=SN+100*WORK(IVV)**2
10 CONTINUE
IF(CC.GT.ccmax)THEN
PRINT 3,CC
CALL PCONFnr(6,ICnr)
END IF
g=0.
call gfact(nd,ck,g)
if(ie.gt.1)then
dsi=-(ev(ie-1)-ev(ie))*2.*109737.
c связь 1/см и атомных единиц?
с (разность энергий переводится из атомных единиц в 1/см)?
else
dsi=0.
print 70, Ev(1)
70 format(''Ev(1)='',f12.7)
end if
DS=(EV(IE)-ER0)*2.*109737.
c print 69,ie,ev(ie),ds,dsi,g
c 69 format(i4,'') En='',f12.7,'' De='',2f12.2,'' g='',f10.4)
print 71,ie,aj,ev(ie),ds,dsi,g
71 format(i4,'')'',f4.1,f12.7,2f12.2,f10.4)
100 CONTINUE
RETURN
----
END
c..............
___________
* Terror book:
Jessica Stern. The Ultimate Terrorists. USA, 1999. - 214 p.
pages 3, 4:
In recent years terrorists have been acquiring crude chemical and biological agents, and some have plotted or threatened to use them.
It would be relatively easy to use them to poison agricultural commodities, infect livestock, or gas passengers on trains or planes.
Biological weapons have the potential to be as deadly as nuclear bombs. For example, 100 kilograms of anthrax, less than the amount
--
Iraq has produced, could kill up to 3 million people if disperse under optimal conditions.
In comparison, a Hiroshima- type fission bomb with a yield of 12,500 tons of TNT could kill up to 80,000, while a more powerful hydrogen bomb, with yield of a million tons of TNT, could kill between 600,000 and 2 million.
Few if any terrorists are likely to be capable of such attacks, but fear of poisons could make even a small- scale, low- technology incident - the kind terrorists are more likely to achieve - psychologically devastating. [5]
- - -
[5]. U.S. Congress, Office of Technology Assessment, Proliferation of Weapons of Mass Destruction: Assessing the Risks (Washington: GPO, 1993, OTA- ISC-559), 54, 53.
- - -
Unlike the effects of conventional or nuclear weapons, however, those of some biological and chemical agents can be reversed.
If authorities were aware that an attack had taken place, victims could be treated.
For some contagious agents, vaccines might prevent person- to- person spread. But if doctors did not know there had been a biological attack, they might think the victims had the flu, since the early symptoms are similar. By the time victims displayed unmistakable symptoms - perhaps days after the attack - it would be too late to save their lives.
In the meantime, if the agent was contagious, thousands of others might be infected by coming into contact with the original victims.
--
pages 4, 5, 169:
....
Vulnerable Societies
Successful terrorists will choose their technology to exploit the vulnerabilities of a particular society. Modern societies are particularly susceptible to weapons that are capable to killing many people at one time - weapons of mass destruction (WMD). Their citizens tend to live, work, and travel in close proximity, providing concentrated targets.
For Aum Shinrikiyo cult in Japan, which released poison gas in Tokyo subway cars, gas was an effective weapon not only because of its capacity to inspire fear but also because in Tokyo many people go about their lives close together, especially on the subway.
Despite this concentration of population, many individuals in modern societies are isolated from one another. This creates fertile ground for the breeding of extremists and makes it possible for extremist groups to operate unnoticed.
Again the Aum Shinrikiyo case is an example: the Japanese government''s failure to detect the cult''s plans
--
suggests the possibility that terrorists may be able to pursue other WMD, even crude nuclear weapons, without being caught.
Americans face an additional vulnerability. First Amendment protections make it legal to advocate using WMD, to disseminate detailed instructions for producing them, and to advise would-be terrorists about how to evade detection. [6]
- - -
page 169:
[6]. In Brandenburg v. Ohio, 395 U.S. 444(1969), the Supreme Court held that it is permissible under the First Amendment to advocate the use of force in violation of the law, except in cases where the advocacy is "directed to inciting or producing imminent lawless actions and is likely to incite or produce that action."
--
pages 170, 5:
Cited in U.S. Department of Justice, "Report on the Availability of Bomb- making Information, the Extent to which Its Dissemination Is Controlled by Federal Law, and the Extent to Which Such Dissemination May Be subject to Regulation Consistent with the First Amendment to the United States Constitution," Submitted to the U.S. House of Representatives and the U.S. Senate, April 1997, 29.
- - -
The same Bill of Rights that makes Americans uniquely free also makes terrorism harder to combat. It prevents the government from banning poisoning manuals and makes it difficult for government agents to infiltrate and monitor terrorist groups. The Internet provides an easy way for terrorists to spread information around the world, to recruit, and to plan operations in secret.
And Americans'' fundamental wariness of government makes it easier to terrorize them; citizens have little faith in the government''s ability to minimize fatalities in case of an attack. People who don''t trust their government to protect them are more susceptible to panic, and panic may lead to loss of life.
--
page 11:
Definitions
The killing of soldiers and nearby civilians [is] to be defended only insofar
as [it is] the product of a single intention, directed at the first and not the
second. The argument suggests the great importance of taking aim in
wartime, and it correctly restricts the targets at which one can aim.
- Michael Walzer, 1997
(Epigraphy (
эпиграф))

Hundreds of definitions of terrorism are offered in the literature. Some focus on the perpetrators, others on their techniques. But only two characteristics are critical for distinguishing terrorism from other forms of violence. First, terrorism is aimed at noncombatants. This is what makes it different from fighting in war. Second, terrorists use violence for a dramatic purpose: usually to instill fear in the targeted population. This deliberate evocation of dread is what sets terrorism apart from simple murder or assault.
[1]
- - -
page 171: (Definitions)
[3]. The U.S. Catholic Bishop(s).....
......
- - -
___________
1   2   3   4   5   6   7   8   9   ...   21

Похожие:

18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon16: 00; 31. 05. 2006; in (the) Ukraine, Eastern Europe, Украина, Україна
Вы очень много пишете на разные темы, в больших объемах (я видела Ваши посты на сайте сдпу(о)). Какая цель этих постов?
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon16: 00; 31. 05. 2006; in (the) Ukraine, Eastern Europe, Украина, Україна
Вы очень много пишете на разные темы, в больших объемах (я видела Ваши посты на сайте сдпу(о)). Какая цель этих постов?
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe iconAll web-sites (Все Интернет страницы)13: 00, 23. 09. 2008. (September) in (the) Ukraine, Eastern Europe, Украина, Україна
Все Интернет страницы)13: 00, 23. 09. 2008. (September) in (the) Ukraine, Eastern Europe, Украина, Україна
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe iconAll web-sites (Все Интернет страницы)12: 00, 09. 2008. (September) in (the) Ukraine, Eastern Europe, Украина, Україна
Все Интернет страницы)12: 00, 09. 2008. (September) in (the) Ukraine, Eastern Europe, Украина, Україна
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon13: 00; 28. 04. 2006; in (the) Ukraine, Eastern Europe
Мне нужна информация о погибшем 21 октября 2006 года в Днепропетровске Валерии для того, чтобы расследовать был это несчастный случай...
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon9: 55, 09. 2008. (September) in (the) Ukraine, Eastern Europe, Украина, Україна
Днепропетровске в Ледовом Дворце планируется очередное собрание одной из наиболее опасных сект, Духовного центра "Возрождение". Я...
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon Journal of the Network for Communicable Disease Control in Northern and Eastern Europe

18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon   '  ,    ,     $- eastern  Europe  and  neighboring  regions,  many  oppor-, *     ,         tunities  for  young  water  specialist  are  being  created   

18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe iconControl in Northern and Eastern Europe / Журнал сети сотрудничества по контролю за инфекционными 
Эпидемиологические  тенденции заболеваемости управляемыми  инфекциями в городе Северодвинске
18: 00; 31. 07. 2006; (July); in (the) Ukraine, Eastern Europe icon2009 July 15 August 15 Остановись,  мгновенье! Сохраните лучшие  моменты вашей жизни

Разместите кнопку на своём сайте:
TopReferat


База данных защищена авторским правом ©topreferat.znate.ru 2012
обратиться к администрации
ТопРеферат
Главная страница