WorldWideScience

Sample records for defense base realignment

  1. Defense Base Realignment and Closure Budget Data for the Realignment of the Bureau of Naval Personnel, Washington, D.C., to Naval Air Station Memphis, Tennessee

    National Research Council Canada - National Science Library

    Granetto, Paul

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  2. Defense Base Realignment and Closure Budget Data for Realignment of Construction Battalion Unit 416 from Naval Air Station Alameda, California, to Naval Air Station Fallon, Nevada

    National Research Council Canada - National Science Library

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  3. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  4. Joint Cross-Service Group for Laboratories 1995 Defense Base Realignment and Closure Process

    National Research Council Canada - National Science Library

    Reed, Donald

    1995-01-01

    This report is one in a series of reports that discusses the Joint Cross-Service Group implementation of the internal control plan developed by the 1995 Defense Base Closure and Realignment Steering Group (the Steering Group...

  5. Defense Base Realignment and Closure Budget Data for the Closure of Marine Corps Air Station El Toro and Tustin, California, and the Realignment to Naval Air Station Miramar, California

    National Research Council Canada - National Science Library

    1994-01-01

    ... requested for each military construction project associated with base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  6. 75 FR 29322 - Base Closure and Realignment

    Science.gov (United States)

    2010-05-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Base Closure and Realignment AGENCY: Office of...)(ii) of the Defense Base Closure and Realignment Act of 1990. It provides a partial list of military installations closing or realigning pursuant to the 2005 Base Closure and Realignment (BRAC) Report. It also...

  7. Report on 2005 Defense Base Closure and Realignment Implementation

    Science.gov (United States)

    2007-04-01

    California 681 1 World Trade Center Long Beach 683 2180 Burbank Boulevard Woodland Hills 684 ASW Center Point Loma 685 Fallbrook Detachment NSWC Crane...Sep 30 2009 680 California 681 682 1 World Trade Center Long Beach, CA Commission recommendation(s) affected by this installation: Number...184 Create a Naval Intergrated Weapons & Armaments Research, Development & Acquisition, Test & Evaluation Center Closure or realignment actions taken

  8. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Year 1992 and 1993

    Science.gov (United States)

    1993-05-25

    OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FISCAL YEARS 1992 AND 1993...ASSISTANT SECRETARY OF DEFENSE (INSTALLATIONS) SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Years...1992 and 1993 (Report No. 93-100) We are providing this final summary report for your information and use. The audit was required by Public Law

  9. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYS 1993 and 1994

    Science.gov (United States)

    1994-02-14

    Jl%«~~ /&■ OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FYS 1993 AND...COMPTROLLER) AUDITOR GENERAL, DEPARTMENT OF THE ARMY SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYs...Therefore, we are publishing this report in final form. We appreciate the courtesies and cooperation extended to the audit staff. If you have any

  10. Department of Defense Base Closure and Realignment Report

    Science.gov (United States)

    1993-03-01

    Polygriph Instituite (I)ODP) to Fort Lzonard Wood, Misouri. Transfer as’countability for Peiham Range and other ,required training support faciities...federal civilian homeowners who, through no fault of their own, face a financial loss when selling their homes in an area where real estate values have...Defense determines that the financial re- sources available to the community (by grant or otherwise) for such purposes are inadequate, and may use

  11. Defense Base Realignment and Closure Budget Data for the Closure of Gentile Air Force Station, Dayton, Ohio, and Realignment of Defense Logistics Agency Components to Wright-Patterson Air Force Base, Ohio

    National Research Council Canada - National Science Library

    1996-01-01

    .... This report provides the results of the audit of two projects, valued at $5.5 million, for the closure of Gentile Air Force Station, Dayton, Ohio, and realignment to Wright-Patterson Air Force Base, Ohio, of two Defense Logistics Agency components...

  12. Defense Base Realignment and Closure Budget Data for Naval Air Stations Dallas, Texas, and Memphis, Tennessee, Realigning to Carswell Air Reserve Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 16 projects, valued at $122 million, for the realignment of the Naval Air Stations Memphis, Tennessee, and Dallas, Texas, to Carswell Air Reserve Base, Texas...

  13. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  14. 32 CFR 989.25 - Base closure and realignment.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Base closure and realignment. 989.25 Section 989... PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.25 Base closure and realignment. Base closure or realignment may entail special requirements for environmental analysis. The permanent base closure...

  15. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Training Center Great Lakes, Illinois

    Science.gov (United States)

    1994-05-19

    the audit of project P-608T, Building Modifications, as they relate to project P-557S. Because...project P-608T was addressed in Report No. 94-108, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California, May 19,

  16. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California

    Science.gov (United States)

    1994-05-19

    the audit of two projects: P-608T, Building Modifications, valued at...Island, California, to the Naval Training Center Great Lakes, Illinois. The audit also evaluated the implementation of the DoD Internal Management...related to the two projects in this report and is discussed in Report No. 94-109, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for the Naval Training Center Great Lakes, Illinois, May 19,

  17. Defense Base Realignment and Closure Budget Data for the Realignment of Navy and Air Force Food Services Training at Lackland Air Force Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1996-01-01

    ... of the FY 1997 audit coverage. Public Law 102-190, "National Defense Authorization Act for Fiscal Years 1992 and 1993," December 5, 1991, directs the Secretary of Defense to ensure that the amount of the authorization that DoD...

  18. Defense Base Realignment and Closure Budget Data for Naval Air Technical Training Center, Naval Air Station Pensacola, Florida

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 19 projects, valued at $288.9 million, for the realignment of the Naval Air Technical Training Center from Naval Air Station Memphis, Tennessee, to Naval Air Station Pensacola, Florida...

  19. Defense Infrastructure: Realignment of Air Force Special Operations Command Units to Cannon Air Force Base, New Mexico

    National Research Council Canada - National Science Library

    Lepore, Brian J

    2008-01-01

    .... As a result, Cannon Air Force Base will remain open. While DOD has satisfied the intent of the recommendation by finding a new mission for the base, this BRAC recommendation was unusual because it contained a contingency clause...

  20. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Training Center Great Lakes, Illinois

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... The Hull Technician School will share building 520 with the Advanced Hull Technician School, which is being realigned from the Naval Training Center San Diego, California, under project P-608T...

  1. Military Base Closures: Updated Status of Prior Base Realignments and Closures

    Science.gov (United States)

    As the Department of Defense (DOD) prepares for the 2005 base realignment and closure (BRAC) round, questions continue to be raised about the transfer and environmental cleanup of unneeded property arising from the prior four BRAC rounds and their impact on cost and savings and on local economies.

  2. Cleanups In My Community (CIMC) - RCRA and Base Realignment and Closure (BRAC) Federal Facilities, National Layer

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data layer provides access to Resource Conservation and Recovery Act (RCRA) Base Realignment and Closure (BRAC) sites as part of the CIMC web service. The...

  3. Cleanups In My Community (CIMC) - Base Realignment and Closure (BRAC) Superfund Sites, National Layer

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data layer provides access to Base Realignment and Closure (BRAC) Superfund Sites as part of the CIMC web service. EPA works with DoD to facilitate the reuse...

  4. 77 FR 3503 - Guam Military Base Realignment Contractor Recruitment Standards

    Science.gov (United States)

    2012-01-24

    ... Contractor Recruitment Standards AGENCY: Employment and Training Administration, Labor. ACTION: Notice... issuing this notice to announce the recruitment standards that construction contractors are required to... contractors engaged in construction projects related to the realignment of U.S. military forces from Okinawa...

  5. The Transformational Quality of Base Realignment and Closure 2005

    National Research Council Canada - National Science Library

    Lathroum, John A

    2006-01-01

    ...) our infrastructure with defense strategy.. .by maximiz(ing) warfighting capability and efficiency." This study examines the transformational capability of BRAC 2005 by analyzing three recommendations (USA: Operational Army (IGPBS), E&T...

  6. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...industry and the munitions DIB. This report documented the volatility associated with the production of munitions and financial risks to which

  7. Base Realignment and Closure: An Evolution for Harvesting Efficiencies

    Science.gov (United States)

    2012-06-15

    JIOI .1 I’\\ ( a~~:c ...... cu t\\ pnl 17. 20 1::!!. 16 The Commiss ion’s review of the military force strucrure and basing requi rements wa~ geared...II I II,JII __ (lt_ ( )iloltll~_ ( <o• l t.\\tl __ [,q tllt<’ll\\ (’dl !<t~<.: C’-’- t.: d t\\ pnl :!(l. 21!1 :2). ’i U.S. Ctt~,·rnutt: lll At... pnl 2.\\. 2012 ). I ’ . - ll11ll. 6 1 Durin~ the BRJ\\C 2005 i nau~ural hcmi nu in IVlav nf 2005. G;\\0 ’"’"" a"ked w addre:-.s: .... .._ ..... - ( I

  8. Military Bases: Opportunities Exist to Improve Future Base Realignment and Closure Rounds

    Science.gov (United States)

    2013-03-01

    Operational Army—realigns Fort Bliss , TX; Fort Hood, TX; Fort Riley, KS; Fort Campbell, KY; and Fort Sill, OK to include rebasing of units from overseas to...Committee on Appropriations United States Senate The Honorable Tim Johnson Chairman The Honorable Mark Kirk Ranking Member Subcommittee on Military

  9. Marshall Application Realignment System (MARS) Architecture

    Science.gov (United States)

    Belshe, Andrea; Sutton, Mandy

    2010-01-01

    The Marshall Application Realignment System (MARS) Architecture project was established to meet the certification requirements of the Department of Defense Architecture Framework (DoDAF) V2.0 Federal Enterprise Architecture Certification (FEAC) Institute program and to provide added value to the Marshall Space Flight Center (MSFC) Application Portfolio Management process. The MARS Architecture aims to: (1) address the NASA MSFC Chief Information Officer (CIO) strategic initiative to improve Application Portfolio Management (APM) by optimizing investments and improving portfolio performance, and (2) develop a decision-aiding capability by which applications registered within the MSFC application portfolio can be analyzed and considered for retirement or decommission. The MARS Architecture describes a to-be target capability that supports application portfolio analysis against scoring measures (based on value) and overall portfolio performance objectives (based on enterprise needs and policies). This scoring and decision-aiding capability supports the process by which MSFC application investments are realigned or retired from the application portfolio. The MARS Architecture is a multi-phase effort to: (1) conduct strategic architecture planning and knowledge development based on the DoDAF V2.0 six-step methodology, (2) describe one architecture through multiple viewpoints, (3) conduct portfolio analyses based on a defined operational concept, and (4) enable a new capability to support the MSFC enterprise IT management mission, vision, and goals. This report documents Phase 1 (Strategy and Design), which includes discovery, planning, and development of initial architecture viewpoints. Phase 2 will move forward the process of building the architecture, widening the scope to include application realignment (in addition to application retirement), and validating the underlying architecture logic before moving into Phase 3. The MARS Architecture key stakeholders are most

  10. Cleanups In My Community (CIMC) - Base Realignment and Closure (BRAC) Superfund Sites, National Layer

    Science.gov (United States)

    This data layer provides access to Base Realignment and Closure (BRAC) Superfund Sites as part of the CIMC web service. EPA works with DoD to facilitate the reuse and redevelopment of BRAC federal properties. When the BRAC program began in the early 1990s, EPA worked with DoD and the states to identify uncontaminated areas and these parcels were immediately made available for reuse. Since then EPA has worked with DoD to clean up the contaminated portions of bases. These are usually parcels that were training ranges, landfills, maintenance facilities and other past waste-disposal areas. Superfund is a program administered by the EPA to locate, investigate, and clean up worst hazardous waste sites throughout the United States. EPA administers the Superfund program in cooperation with individual states and tribal governments. These sites include abandoned warehouses, manufacturing facilities, processing plants, and landfills - the key word here being abandoned.This data layer shows Superfund Sites that are located at BRAC Federal Facilities. Additional Superfund sites and other BRAC sites (those that are not Superfund sites) are included in other data layers as part of this web service.BRAC Superfund Sites shown in this web service are derived from the epa.gov website and include links to the relevant web pages within the attribute table. Data about BRAC Superfund Sites are located on their own EPA web pages, and CIMC links to those pages. The CIMC web service

  11. Summary Report on the Audit of Defense Base Realignment and Closure Budget Data

    Science.gov (United States)

    1996-04-03

    management control program as it applied to the audit objectives. This report summarizes the results of the specific objectives in Finding A and discusses the management control objective in Finding B.

  12. Military Base Realignments and Closures: More Guidance and Information Needed to Take Advantage of Opportunities to Consolidate Training

    Science.gov (United States)

    2016-02-01

    Management Training, (2) Joint Center of Excellence for Culinary Training, (3) Joint Center of Excellence for Religious Training and Education, (4...Realignments and Closures For the remaining three training functions— Culinary training, Transportation Management training, and Religious training— the... culinary , transportation management , and chaplain training programs did not have data for various reasons, including a change in accounting systems, and

  13. The Availability of Judicial Review Regarding Military Base Closures and Realignments

    Science.gov (United States)

    2005-06-30

    held that the President is not subject to the APA, due to separation of powers principles.37 Base Closure Act Claims The Dalton Court distinguished...that the 1988 Base Closure Act violated the non-delegation doctrine and the separation of powers doctrine.53 However, the Base Closure Act has not yet been held unconstitutional by any federal appellate courts.

  14. Impacts of Severe Weather, Climate Zone, and Energy Factors on Base Realignment and Closure (BRAC)

    Science.gov (United States)

    2015-03-26

    Partial Fulfillment of the Requirements for the Degree of Master of Science in Engineering Management Christopher L. Teke, Major, USAF Major...the science behind severe weather occurrences and climate zone. Chapter 3 further details the methodology used in the analysis and sets the stage... actuarial estimates and should be thought of as insurance premiums, and ought to remain a budgeted cost if a base stays open. In contrast, if a base is

  15. Military Base Realignments and Closures: Process for Reusing Property for Homeless Assistance Needs Improvements

    Science.gov (United States)

    2015-03-01

    information in the Federal Register. The LRA then must advertise the surplus property availability in a newspaper of general circulation within the vicinity...of the base. The advertisement must include the period, required to be between 90 and 180 days following the advertisement , during which it will...order. Call for additional information. Connect with GAO on Facebook , Flickr, Twitter, and YouTube. Subscribe to our RSS Feeds or E-mail Updates. Listen

  16. Base Closure and Realignment Act (BRAC) Cleanup Plan, Sacramento Army Depot, Sacramento, California

    Science.gov (United States)

    1995-10-01

    Treatment System. April 5. Levy, R. 1978. Eastern Miwok. In Handbook of North American Indians. Volume 8: California, (R.F. Heizer , ed.) pp. 398-413... Heizer , pp. 389-387. Smithsonian Institution, Washington, D.C. Wirth Environmental Services. 1983. An archaeological overview and management plan for the...water quality which, if reached, are expected to render a body of water suitable for its designated use. The criteria are based on specific levels of

  17. Fingerprint re-alignment: a solution based on the true fingerprint center point

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-02-01

    Full Text Available Solution Based on the True Fingerprint Center Point Ishmael S. Msiza, Brain Leke-Betechuoh, and Tendani Malumedzha Biometrics Research Group ? Information Security CSIR, Modelling & Digital Science Unit Pretoria, Republic of South Africa e... with a pattern that belongs to the Tented Arch (TA) fingerprint class. Fingerprints that belong to the TA class have a single core and a single delta, with the core located almost directly above the delta, as depicted in figure 3 (b). Many singular...

  18. Mapping allied health evidence-based practice: providing a basis for organisational realignment.

    Science.gov (United States)

    Ziviani, Jenny; Wilkinson, Shelley A; Hinchliffe, Fiona; Feeney, Rachel

    2015-06-01

    Ahead of the convergence of two major paediatric services, we examined evidence-based practice (EBP) self-efficacy, outcome expectance, knowledge and use among allied health (AH) staff in two major Queensland (Qld) paediatric services. This was to determine whether any differences existed based on organisational affiliation, profession and any previous training to inform a strategy to enhance AH EBP within the new organisational setting. All AH staff from the two Brisbane (Qld) tertiary paedritic hospitals were invited to participate in the survey. Using a cross-sectional design EBP self-efficacy, outcome expectancy, knowledge and use, as well as previous EBP training, were assessed with an online survey. Background demographic information obtained included professional discipline and hospital. One hundreD and thirty-eight health practitioners completed the survey (37% respone rate). Most practioners had accessed EBP training. Mean scores for EBP attitudes (self-efficacy and outcome expectancy) and knowledge were higher than for EBP use scores. Greater variation was observed across professional disciplines than organisations. Training impacted positively on EBP measures but explained a small proportion of total variance in regression models. The results underscore the need to provide organisational supports to AH staff ro EBP implementation. Strategies other than training are requred to maximally enhance EBP attitudes. The new organisational structure provides an oppotunity for this cultural shift to occur.

  19. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  20. Simulation of groundwater flow to assess future withdrawals associated with Base Realignment and Closure (BRAC) at Fort George G. Meade, Maryland

    Science.gov (United States)

    Raffensperger, Jeff P.; Fleming, Brandon J.; Banks, William S.L.; Horn, Marilee A.; Nardi, Mark R.; Andreasen, David C.

    2010-01-01

    Increased groundwater withdrawals from confined aquifers in the Maryland Coastal Plain to supply anticipated growth at Fort George G. Meade (Fort Meade) and surrounding areas resulting from the Department of Defense Base Realignment and Closure Program may have adverse effects in the outcrop or near-outcrop areas. Specifically, increased pumping from the Potomac Group aquifers (principally the Patuxent aquifer) could potentially reduce base flow in small streams below rates necessary for healthy biological functioning. Additionally, water levels may be lowered near, or possibly below, the top of the aquifer within the confined-unconfined transition zone near the outcrop area. A three-dimensional groundwater flow model was created to incorporate and analyze data on water withdrawals, streamflow, and hydraulic head in the region. The model is based on an earlier model developed to assess the effects of future withdrawals from well fields in Anne Arundel County, Maryland and surrounding areas, and includes some of the same features, including model extent, boundary conditions, and vertical discretization (layering). The resolution (horizontal grid discretization) of the earlier model limited its ability to simulate the effects of withdrawals on the outcrop and near-outcrop areas. The model developed for this study included a block-shaped higher-resolution local grid, referred to as the child model, centered on Fort Meade, which was coupled to the coarser-grid parent model using the shared node Local Grid Refinement capability of MODFLOW-LGR. A more detailed stream network was incorporated into the child model. In addition, for part of the transient simulation period, stress periods were reduced in length from 1 year to 3 months, to allow for simulation of the effects of seasonally varying withdrawals and recharge on the groundwater-flow system and simulated streamflow. This required revision of the database on withdrawals and estimation of seasonal variations in

  1. Military Base Realignments and Closures: Plan Needed to Monitor Challenges for Completing More Than 100 Armed Forces Reserve Centers

    National Research Council Canada - National Science Library

    Lepore, Brian J; Holman, Barry; Talbott, Laura; Arbogast, Shawn; Beers, Rachel; Coleman, Grace; Edwards, Jennifer; Matta, Julie; Perdue, Charles

    2007-01-01

    ...) and close 387 existing reserve components facilities. The Department of Defense (DoD) expects the new AFRCs to increase recruiting and retention and create greater efficiencies by fostering jointness and consolidating functions...

  2. Final Environmental Assessment to Implement the Defense Base Closure and Realignment Commission Recommendations for Shaw Air Force Base, South Carolina

    Science.gov (United States)

    2007-07-01

    corresponding years. Year 2005 through 2009: VOCE = .016 * Trips NOxE = .015 * Trips PM10E = .0022 * Trips COE = .262 * Trips Year 2010 and beyond: VOCE ... VOCE * DPYII/2000 Nox (tons/yr) = NOxE * DPYII/2000 PM10(tons/yr) = PM10E * DPYII/2000 CO (tons/yr) = COE * DPYII/2000 Where: Commercial

  3. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  4. Realigning thunder and lightning: temporal adaptation to spatiotemporally distant events.

    Directory of Open Access Journals (Sweden)

    Jordi Navarra

    Full Text Available The brain is able to realign asynchronous signals that approximately coincide in both space and time. Given that many experience-based links between visual and auditory stimuli are established in the absence of spatiotemporal proximity, we investigated whether or not temporal realignment arises in these conditions. Participants received a 3-min exposure to visual and auditory stimuli that were separated by 706 ms and appeared either from the same (Experiment 1 or from different spatial positions (Experiment 2. A simultaneity judgment task (SJ was administered right afterwards. Temporal realignment between vision and audition was observed, in both Experiment 1 and 2, when comparing the participants' SJs after this exposure phase with those obtained after a baseline exposure to audiovisual synchrony. However, this effect was present only when the visual stimuli preceded the auditory stimuli during the exposure to asynchrony. A similar pattern of results (temporal realignment after exposure to visual-leading asynchrony but not after exposure to auditory-leading asynchrony was obtained using temporal order judgments (TOJs instead of SJs (Experiment 3. Taken together, these results suggest that temporal recalibration still occurs for visual and auditory stimuli that fall clearly outside the so-called temporal window for multisensory integration and appear from different spatial positions. This temporal realignment may be modulated by long-term experience with the kind of asynchrony (vision-leading that we most frequently encounter in the outside world (e.g., while perceiving distant events.

  5. Final Environmental Assessment Realignment of Jenkins Armed Forces Reserve Center (AFRC), Kirtland Air Force Base, New Mexico, BRAC 2005

    Science.gov (United States)

    2007-05-01

    cryptoleucus Northern mockingbird Mimus polyglottos Black-throated sparrow Amphispiza bilineata Eastern meadowlark Sturnella magna House finch...Americans- and ealii~ kills 5,000 each year. :ses1 The network combines nub lie e sJ\\ awareness with an Internet- based information service and -qnd...scientists agree that p;roper cooking · will kill HEAL:: s most kinds of harmful bacteria, nobody is convinced that the bulk of consumers know what

  6. Competition: A Means to Transform the Defense Industrial Base

    National Research Council Canada - National Science Library

    Hansen, Richard

    2003-01-01

    .... The defense acquisition process and its industrial base comprise a significant economic institution in need of transformation to ensure that research, development, and acquisition efforts remain...

  7. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  8. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  9. Implementing Set Based Design into Department of Defense Acquisition

    Science.gov (United States)

    2016-12-01

    The team employed a tailored waterfall process model in order to explore SBD applications in the support of defense acquisition and PORs. Figure 1...Engineering Model . Additionally, the team reviewed DOD case studies that implemented SBD. The SBD principles, along with the common themes from the...acquisition. 14. SUBJECT TERMS set based design, set based thinking, model based systems engineering, concurrent engineering, defense acquisition

  10. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  11. Early endoscopic realignment in posterior urethral injuries.

    Science.gov (United States)

    Shrestha, B; Baidya, J L

    2013-01-01

    Posterior urethral injury requires meticulous tertiary care and optimum expertise to manage successfully. The aim of our study is to describe our experiences with pelvic injuries involving posterior urethra and their outcome after early endoscopic realignment. A prospective study was carried out in 20 patients with complete posterior urethral rupture, from November 2007 till October 2010. They presented with blunt traumatic pelvic fracture and underwent primary realignment of posterior urethra in our institute. The definitive diagnosis of urethral rupture was made after retrograde urethrography and antegrade urethrography where applicable. The initial management was suprapubic catheter insertion after primary trauma management in casualty. After a week of conservative management with intravenous antibiotics and pain management, patients were subjected to the endoscopic realignment. The follow up period was at least six months. The results were analyzed with SPSS software. After endoscopic realignment, all patients were advised CISC for the initial 3 months. All patients voided well after three months of CISC. However, 12 patients were lost to follow up by the end of 6 postoperative months. Out of eight remaining patients, two had features of restricture and were managed with DVU followed by CISC again. One patient with restricture had some degree of erectile dysfunction who improved significantly after phospodiesterase inhibitors. None of the patients had features of incontinence. Early endoscopic realignment of posterior urethra is a minimally invasive modality in the management of complete posterior urethral injury with low rates of incontinence and impotency.

  12. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  13. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  14. Chronostratigraphy and geochronology: A proposed realignment

    NARCIS (Netherlands)

    Zalasiewicz, J.; Cita, M.B.; Hilgen, F.; Pratt, B.R.; Strasser, A.; Thierry, J.; Weissert, H.

    2013-01-01

    We propose a realignment of the terms geochronology and chronostratigraphy that brings them broadly into line with current use, while simultaneously resolving the debate over whether the Geological Time Scale should have a “single” or “dual” hierarchy of units: Both parallel sets of units are

  15. Managed Realignment in Europe: Achievements and Challenges

    Science.gov (United States)

    Esteves, L. S.

    2017-12-01

    Environmental and financial sustainability associated with climate change adaptation needs are the key drivers leading to the development of national and regional strategies which promote managed realignment. Managed realignment aims to maximise environmental and socioeconomic benefits by creating space for coastal habitats to evolve more naturally. Therefore, the natural adaptive capacity of coastal habitats and the range of ecosystem services they provide are paramount to the success of these strategies. In Europe, most projects involve the creation of intertidal areas by artificially restoring tidal flow into embanked land. Projects generally involve at least one of the following: removal, breach, or realignment of existing coastal protection, controlled tidal restoration and managed retreat (i.e. relocation from risk areas). Since early 1980s, over 140 managed realignment projects have been implemented (or are under construction) in Europe, mainly in the UK, France, Germany, Netherlands, Belgium and Spain, resulting in approximately 15,800 ha of habitat creation. This paper will present an overview of managed realignment initiatives in Europe, summarise achievements so far and discuss ways to overcome commonly faced challenges, focusing on high-level strategy; delivery of objectives at the project level; and public perception. Projects vary greatly as planning must take into account local social and environmental characteristics and constraints. Evidence of benefits gained in each project and their contribution to high level targets need to be quantified and widely disseminated to help attract public support. However, the lack of information and/or undisputable evidence about the realisation of tangible socioeconomic benefits is still hindering public acceptance. The knowledge about how the many social, economic, and technical aspects interact is evolving fast as new policies are formulated, more projects are implemented, and monitoring data are made available.

  16. Expeditionary Air Base Defense: Historical Cases and Modern Implications

    Science.gov (United States)

    2017-06-01

    203. 50 As violence in Iraq’s urban areas surged in 2006, IDF attacks against Balad Air Base reached their peak, with approximately 475...defense operations when appropriate, but it is not a singular solution for quickly or completely reducing violence in the area of air bases. The case of...forces “drawing from the units available.”3 This is appropriate for small combat outposts ( COP ) or forward operating bases (FOB) in lower threat

  17. Ground-Based Midcourse Defense (GMD) Initial Defensive Operations Capability (IDOC) at Vandenberg Air Force Base Environmental Assessment

    Science.gov (United States)

    2003-08-28

    Zielinski , EDAW, Inc., concerning utilities supply and demand for Vandenberg Air Force Base, 1 August. Rush, P., 2002. Personal communication between...Pernell W. Rush, Technical Sergeant, Water Utilities/Water Treatment NCO, USAF 30th CES/CEOIU, Vandenberg Air Force Base, and James E. Zielinski ... Dave Savinsky, Environmental Consultant, 30 CES/CEVC, Vandenberg Air Force Base, on the Preliminary Draft Ground-Based Midcourse Defense (GMD

  18. Defense Industrial Base Capabilities Study: Battlespace Awareness

    Science.gov (United States)

    2004-01-01

    not production capacity or workforce issues. It considers the best capabilities in both the domestic and foreign components of the industrial base...www.maliburesearch.com Ground Penetrating Radar MARIMATECH 1989 Aarhus, Denmark n.a. n.a. www.marimatech.com Sonar Maser Technology (NZ) Ltd. 1983 Auckland , New

  19. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  20. In defense of eminence-based medicine

    Directory of Open Access Journals (Sweden)

    Willis BC

    2017-02-01

    Full Text Available No abstract available. Article truncated at 150 words. To arms, august compatriots! Our very way of life is threatened by the hordes of barbarians at our gates. Armed not with pitchforks and torches, but with Cochrane reviews, “multicenter randomized controlled trials”, the Interwebs, and “tablet computers”, they besiege our traditions and values, and threaten our place in the hierarchy of medicine. In no uncertain terms, they want to remove us from our place of reverence, from our position of respect, and replace us with guidelines, pathways, and protocols. To do nothing is to perish. We must stand together, and fight this tide, or be swept away in the tidal wave of journals and statistical analyses buffeting our land. Join or Die! For generations, we have preserved our careers and medicine itself by strictly honoring a system based on “eminence-based medicine” or “EBM”. This is the practice of making the same sound decisions with increasing confidence over an impressive …

  1. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  2. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  3. Research on moving target defense based on SDN

    Science.gov (United States)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  4. Parasitic wasp responses to symbiont-based defense in aphids

    Directory of Open Access Journals (Sweden)

    Oliver Kerry M

    2012-02-01

    Full Text Available Abstract Background Recent findings indicate that several insect lineages receive protection against particular natural enemies through infection with heritable symbionts, but little is yet known about whether enemies are able to discriminate and respond to symbiont-based defense. The pea aphid, Acyrthosiphon pisum, receives protection against the parasitic wasp, Aphidius ervi, when infected with the bacterial symbiont Hamiltonella defensa and its associated bacteriophage APSE (Acyrthosiphon pisum secondary endosymbiont. Internally developing parasitoid wasps, such as A. ervi, use maternal and embryonic factors to create an environment suitable for developing wasps. If more than one parasitoid egg is deposited into a single aphid host (superparasitism, then additional complements of these factors may contribute to the successful development of the single parasitoid that emerges. Results We performed experiments to determine if superparasitism is a tactic allowing wasps to overcome symbiont-mediated defense. We found that the deposition of two eggs into symbiont-protected aphids significantly increased rates of successful parasitism relative to singly parasitized aphids. We then conducted behavioral assays to determine whether A. ervi selectively superparasitizes H. defensa-infected aphids. In choice tests, we found that A. ervi tends to deposit a single egg in uninfected aphids, but two or more eggs in H. defensa-infected aphids, indicating that oviposition choices may be largely determined by infection status. Finally, we identified differences in the quantity of the trans-β-farnesene, the major component of aphid alarm pheromone, between H. defensa-infected and uninfected aphids, which may form the basis for discrimination. Conclusions Here we show that the parasitic wasp A. ervi discriminates among symbiont-infected and uninfected aphids, and changes its oviposition behavior in a way that increases the likelihood of overcoming symbiont-based

  5. Realignment Surgery for Malunited Ankle Fracture.

    Science.gov (United States)

    Guo, Chang-Jun; Li, Xing-Cheng; Hu, Mu; Xu, Yang; Xu, Xiang-Yang

    2017-02-01

    To investigate the characteristics and the results of realignment surgery for the treatment of malunited ankle fracture. Thirty-three patients with malunited fractures of the ankle who underwent reconstructive surgery at our hospital from January 2010 to January 2014 were reviewed. The tibial anterior surface angle (TAS), the tibiotalar tilt angle (TTA), the malleolar angle (MA), and the tibial lateral surface angle (TLS) were measured. Clinical assessment was performed with use of the American Orthopaedic Foot and Ankle Society (AOFAS) scale and visual analogue scale (VAS) scores, and the osteoarthritis stage was determined radiographically with the modified Takakura classification system. The Wilcoxon matched-pairs test was used to analyze the difference between the preoperative and the postoperative data. The mean follow-up was 36 months (range, 20-60 months). The mean age at the time of realignment surgery was 37.1 years (range, 18-62 years). Compared with preoperation, the TAS at the last follow-up showed a significant increase (88.50° ± 4.47° vs. 90.80° ± 3.49°, P = 0.0035); similar results were observed in TTA (1.62° ± 1.66° vs. 0.83° ± 0.90°, P ankle osteoarthritis, and was treated by ankle joint distraction. Realignment surgery for a malunited ankle fracture can reduce pain, improve function, and delay ankle arthrodesis or total ankle replacement. Postoperative large talar tilt and advanced stages of ankle arthritis are the risk factors for the surgery. © 2017 Chinese Orthopaedic Association and John Wiley & Sons Australia, Ltd.

  6. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  7. Endoscopic urethral realignment of traumatic urethral disruption: A monocentric experience

    Directory of Open Access Journals (Sweden)

    Hamed Mohamed El Darawany

    2018-01-01

    Conclusions: Endoscopic primary realignment of posterior urethral rupture is less invasive and a safer procedure, without pelvic hemorrhage or additional injuries. It has low incidence of severe urethral stricture and avoids the need for delayed open urethral reconstruction.

  8. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    Science.gov (United States)

    2017-12-01

    CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL BASE GOING FORWARD? by Daniel J. Shipman December 2017 Thesis Advisor: Mie...2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HOW MIGHT CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL...the competitive business environment of Department of Defense (DOD) vendors and whether the market is favorable for non-traditional, technology

  9. Air Warfare and Air Base Defense 1914-1973

    Science.gov (United States)

    1988-01-01

    338 X Conclusion ............................................. 343 A ppendices ...military operations. During the battle of Stalingrad, however, the need for a more focussed defense became acute . Between November 19, 1942, when the

  10. Realignment process of actin stress fibers in single living cells studied by focused femtosecond laser irradiation

    OpenAIRE

    Yasukuni, Ryohei; Spitz, Jean-Alexis; Meallet-Renault, Rachel; Negishi, Takayuki; Tada, Takuji; Hosokawa, Yoichiroh; Asahi, Tsuyoshi; Shukunami, Chisa; Hiraki, Yuji; Masuhara, Hiroshi

    2007-01-01

    Three-dimensional dissection of a single actin stress fiber in a living cell was performed based on multi-photon absorption of a focused femtosecond laser pulse. The realignment process of an actin stress fiber was investigated after its direct cutting by a single-shot femtosecond laser pulse irradiation by high-speed transmission and fluorescence imaging methods. It was confirmed that mechanical force led by the femtosecond laser cutting propagates to entire cell through the cytockelton in a...

  11. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  12. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  13. Nomenclatural realignment of Neotyphodium species with genus Epicholë.

    Science.gov (United States)

    Leuchtmann, Adrian; Bacon, Charles W; Schardl, Christopher L; White, James F; Tadych, Mariusz

    2014-01-01

    Nomenclatural rule changes in the International Code of Nomenclature for algae, fungi and plants, adopted at the 18th International Botanical Congress in Melbourne, Australia, in 2011, provide for a single name to be used for each fungal species. The anamorphs of Epichloë species have been classified in genus Neotyphodium, the form genus that also includes most asexual Epichloë descendants. A nomenclatural realignment of this monophyletic group into one genus would enhance a broader understanding of the relationships and common features of these grass endophytes. Based on the principle of priority of publication we propose to classify all members of this clade in the genus Epichloë. We have reexamined classification of several described Epichloë and Neotyphodium species and varieties and propose new combinations and states. In this treatment we have accepted 43 unique taxa in Epichloë, including distinct species, subspecies, and varieties. We exclude from Epichloë the two taxa Neotyphodium starrii, as nomen dubium, and Neotyphodium chilense, as an unrelated taxon.

  14. Deferred endoscopic urethral realignment: Role in management of traumatic posterior urethral disruption

    Directory of Open Access Journals (Sweden)

    M.A. Elgammal

    2014-06-01

    Conclusion: When early realignment is postponed for any reason, deferred endoscopic realignment is considered an adequate substitute because urethral continuity can be achieved in a group of patients without increase incidence of impotence and incontinence.

  15. Final Base Realignment and Closure (BRAC) Environmental Assessment for Realignment of Nellis Air Force Base

    Science.gov (United States)

    2007-03-01

    weapons systems in support of potential technological improvements in hardware, software , tactics, and training. In recent years, the total amount of...communities in southeastern California, southern Nevada, western and southern Arizona, southwestern Utah, and through Sonora and northern Sinaloa, Mexico ...Publ ic Utilities Commi ssion Pete Konesky , Stat e Energy Of f i ce Rebecca Pa l me r , State Historic Preservation Office Alisa Huckle, ONR Libr a

  16. [Endoscopic realignment for post-traumatic rupture of posterior urethra].

    Science.gov (United States)

    Tazi, Hicham; Ouali, Mohammed; Lrhorfi, My Hfid; Moudouni, Saïd; Tazi, Karim; Lakrissa, Ahmed

    2003-12-01

    To analyse the long-term results of treatment of posterior urethral disruptions with endoscopic realignment, and to assess the efficacy, simplicity and benefit of this technique. Between 1989 and 2001, thirty six patients were treated by endoscopic realignment for traumatic rupture of the posterior urethra. The analysis of the results took in consideration the quality of urinary stream, the continence and the erectile function. With a mean follow-up of thirty four months (12 to 72 months), the 36 patients treated by endoscopic realignment are continent and urinate with a satisfactory urine output. This result was obtained after internal urethrotomy in 13 patients (36.1%), and after transperineal urethroplasty in two patients. Only 7 patients (19.4%) developed an impotence. The endoscopic realignment can be considered like initial treatment of all post-traumatic rupture of the posterior urethra. This simple and little aggressive technique doesn't compromise the recourse to another type of ulterior treatment and resulted in negligible morbidity. The secondary urethral strictures are short and accessible to an endoscopic urethrotomy.

  17. Delayed primary realignment of posterior urethral rupture | Shittu ...

    African Journals Online (AJOL)

    The treatment of acute posterior urethral rupture is controversial. Twelve patients who presented with acute posterior urethral rupture over a five--year period were treated by delayed primary realignment of the injury. The technique of this procedure and the outcome are the subject of this presentation. Eight patients had ...

  18. 7 CFR 1210.501 - Realignment of districts.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Realignment of districts. 1210.501 Section 1210.501 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Hutchinson, Roberts, Hemphill, Oldham, Potter, Carson, Gray, Wheeler, Deaf Smith, Randall, Armstrong, Donley...

  19. Some thoughts to realignment of PortalU

    International Nuclear Information System (INIS)

    Konstantinidis, Stefanie; Kruse, Fred

    2013-01-01

    Environmental information is the basis for improving the environmental situation in the EU. The challenge poses the tailoring of information to a defined group of interest and not only the technical possibility to retrieve the environmental information. Even though, the technical infrastructure for retrieving public environmental information is the first step. Hence, the clear understanding of the needs of the general public is essential for a successful environmental information portal for the interest group ''general public''. What does this mean referring to the German Environmental Information Portal PortalU? Since the launch of PortalU the focus of the portal is set on making available official environmental information especially on German Federal Republic and Federal States level. Currently, information from web pages represents the greatest amount of information. In contrast, information from environmental data catalogs and further data bases represent a smaller amount of information within PortalU. But quantity itself does not tell anything about the demand of a target group. The experience of the last years has shown that environmental interested citizens use mainly general search engines like Google to find information from public environmental web pages. Thus it would be worth thinking about a realignment of PortalU. The idea of a prospective alignment of PortalU is to concentrate on important environmental information, which is not easily found via Google and other general search engines. This information is mainly provided via environmental data catalogs and possibly further data bases. Some thoughts about the potential form and design of a respectively aligned environmental portal are discussed in the paper. (orig.)

  20. Some thoughts to realignment of PortalU

    Energy Technology Data Exchange (ETDEWEB)

    Konstantinidis, Stefanie; Kruse, Fred [Lower Saxony Ministry of Environment and Climate Protection, Hannover (Germany). Coordination Centre PortalU

    2013-07-01

    Environmental information is the basis for improving the environmental situation in the EU. The challenge poses the tailoring of information to a defined group of interest and not only the technical possibility to retrieve the environmental information. Even though, the technical infrastructure for retrieving public environmental information is the first step. Hence, the clear understanding of the needs of the general public is essential for a successful environmental information portal for the interest group ''general public''. What does this mean referring to the German Environmental Information Portal PortalU? Since the launch of PortalU the focus of the portal is set on making available official environmental information especially on German Federal Republic and Federal States level. Currently, information from web pages represents the greatest amount of information. In contrast, information from environmental data catalogs and further data bases represent a smaller amount of information within PortalU. But quantity itself does not tell anything about the demand of a target group. The experience of the last years has shown that environmental interested citizens use mainly general search engines like Google to find information from public environmental web pages. Thus it would be worth thinking about a realignment of PortalU. The idea of a prospective alignment of PortalU is to concentrate on important environmental information, which is not easily found via Google and other general search engines. This information is mainly provided via environmental data catalogs and possibly further data bases. Some thoughts about the potential form and design of a respectively aligned environmental portal are discussed in the paper. (orig.)

  1. Risk Management and Simulation Based Live Fire Test and Evaluation in the Performance Based Defense Business Environment

    National Research Council Canada - National Science Library

    Brown, R

    1999-01-01

    The objective of this analysis is to reduce the policy and management process costs of Congressionally mandated Live Fire Test and Evaluation procedures in the new Performance Based Defense Acquisition environment...

  2. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  3. Computed tomographic evaluation of realignment surgery for patellar subluxation

    International Nuclear Information System (INIS)

    Inoue, Masahiro; Shino, Konsei; Maeda, Akira; Nakata, Ken; Ono, Hiroo.

    1994-01-01

    Forty-two patients with patellar subluxation underwent realignment surgery of the knee extensor mechanism. The surgery included, lateral release, advancement and reefing of the vastus medialis and the medial capsule and tibial tubercle transfer (Elmslie-Trillat procedure). The effect of surgery was evaluated using computed tomograms of the pre- and post-operative knees at 0, 15, 30 and 45 degrees of knee flexion. The degree of patellofemoral incongruence on CT was expressed using two parameters of patellar tilt and patellar shift. Thirty-three volunteers without any patello-femoral symptoms served as controls. Postoperatively both the patellar tilt and the patellar shift improved significantly. The average patellar tilt and the patellar shift of the patient group at 45 degrees were comparable with those of controls. However, it was found by CT that the realignment surgery was less effective between 0 and 30 degrees of knee flexion. (author)

  4. Computed tomographic evaluation of realignment surgery for patellar subluxation

    Energy Technology Data Exchange (ETDEWEB)

    Inoue, Masahiro (Kansai Rosai Hospital, Amagasaki (Japan)); Shino, Konsei; Maeda, Akira; Nakata, Ken; Ono, Hiroo

    1994-01-01

    Forty-two patients with patellar subluxation underwent realignment surgery of the knee extensor mechanism. The surgery included, lateral release, advancement and reefing of the vastus medialis and the medial capsule and tibial tubercle transfer (Elmslie-Trillat procedure). The effect of surgery was evaluated using computed tomograms of the pre- and post-operative knees at 0, 15, 30 and 45 degrees of knee flexion. The degree of patellofemoral incongruence on CT was expressed using two parameters of patellar tilt and patellar shift. Thirty-three volunteers without any patello-femoral symptoms served as controls. Postoperatively both the patellar tilt and the patellar shift improved significantly. The average patellar tilt and the patellar shift of the patient group at 45 degrees were comparable with those of controls. However, it was found by CT that the realignment surgery was less effective between 0 and 30 degrees of knee flexion. (author).

  5. Environmental Assessment: Base Realignment and Closure (BRAC) 2005 Mission Realignments to Vandenberg AFB

    Science.gov (United States)

    2007-02-01

    implied by altered connective tissue metabolism and altered pulmonary morphology in animals after long-term exposures and pulmonary function...addition to the wildlife found in chaparral, other species include mammals like Heerman’s kangaroo rat (Dipodomys heermanni), Broad-footed mole (Scapanus

  6. In defense of types in knowledge-based CAAD

    DEFF Research Database (Denmark)

    Galle, Per

    1997-01-01

    There are two basic approaches to representation of design knowledge in knowledge-based CAAD systems, the type-based approach which has a long tradition, and the more recent typeless approach. Proponents of the latter have offered a number of arguments against the type-based approach which...

  7. Investigating an approach to the alliance based on interpersonal defense theory.

    Science.gov (United States)

    Westerman, Michael A; Muran, J Christopher

    2017-09-01

    Notwithstanding consistent findings of significant relationships between the alliance and outcome, questions remain to be answered about the relatively small magnitude of those correlations, the mechanisms underlying the association, and how to conceptualize the alliance construct. We conducted a preliminary study of an approach to the alliance based on interpersonal defense theory, which is an interpersonal reconceptualization of defense processes, to investigate the promise of this alternative approach as a way to address the outstanding issues. We employed qualitative, theory-building case study methodology, closely examining alliance processes at four time points in the treatment of a case in terms of a case formulation based on interpersonal defense theory. The results suggested that our approach made it possible to recognize key processes in the alliance and that it helps explain how the alliance influences outcome. Our analyses also provided a rich set of concrete illustrations of the alliance phenomena identified by the theory. The findings suggest that an approach to the alliance based on interpersonal defense theory holds promise. However, although the qualitative method we employed has advantages, it also has limitations. We offer suggestions about how future qualitative and quantitative investigations could build on this study.

  8. CRISPR-Based Antibacterials: Transforming Bacterial Defense into Offense.

    Science.gov (United States)

    Greene, Adrienne C

    2018-02-01

    The development of antimicrobial-resistant (AMR) bacteria poses a serious worldwide health concern. CRISPR-based antibacterials are a novel and adaptable method for building an arsenal of antibacterials potentially capable of targeting any pathogenic bacteria. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Integrated Defense: Lessons Learned from Joint Base Balad

    Science.gov (United States)

    2013-01-01

    maintenance , personnel and information management, environ- mental restoration, logistics readiness and transportation man- agement, grounds maintenance ...explosive device systems require daily maintenance , and operators require continuous training. Due to a lack of formalized training, Airmen assigned to EWO...BSZ base security zone CCTV closed-circuit television CENTCOM US Central Command CF coalition forces C-IDF counter–indirect fire C-IED counter

  10. Air Base Defense: Different Times Call for Different Methods

    Science.gov (United States)

    2006-12-01

    small explosives in an attempt to drive U.S. forces from their territories. Many of these attacks were successful, resulting in the loss of human ...value.27 As the war rages on in Iraq, Matthew Levitt argues that the U.S. cannot afford to be distracted by the situation there, as terrorists may...serious and more difficult to defend.101 Air bases typically employ infrared and thermal imagers, security sentries, canine patrols and motion-tracking

  11. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  12. Internal Versus External Fixation of Charcot Midfoot Deformity Realignment.

    Science.gov (United States)

    Lee, Daniel J; Schaffer, Joseph; Chen, Tien; Oh, Irvin

    2016-07-01

    Internal and external fixation techniques have been described for realignment and arthrodesis of Charcot midfoot deformity. There currently is no consensus on the optimal method of surgical reconstruction. This systematic review compared the clinical results of surgical realignment with internal and external fixation, specifically in regard to return to functional ambulation, ulcer occurrence, nonunion, extremity amputation, unplanned further surgery, deep infection, wound healing problems, peri- or intraoperative fractures, and total cases with any complication. A search of multiple databases for all relevant articles published from January 1, 1990, to March 22, 2014, was performed. A logistic regression model evaluated each of the outcomes and its association with the type of fixation method. The odds of returning to functional ambulation were 25% higher for internal fixation (odds ratio [OR], 1.259). Internal fixation had a 42% reduced rate of ulcer occurrence (OR, 0.578). External fixation was 8 times more likely to develop radiographic nonunion than internal fixation (OR, 8.2). Internal fixation resulted in a 1.5-fold increase in extremity amputation (OR, 1.488), a 2-fold increase in deep infection (OR, 2.068), a 3.4-fold increase in wound healing complications (OR, 3.405), and a 1.5-fold increase in the total number of cases experiencing any complication (OR, 1.525). This was associated with a 20% increase in the need for unplanned further surgery with internal fixation (OR, 1.221). Although internal fixation may decrease the risk of nonunion and increase return to functional ambulation, it had a higher rate of overall complications than external fixation for realignment and arthrodesis of Charcot midfoot deformity. [Orthopedics. 2016; 39(4):e595-e601.]. Copyright 2016, SLACK Incorporated.

  13. Nonlinear Effects in Transformation Optics-Based Metamaterial Shields for Counter Directed Energy Weapon Defense

    Science.gov (United States)

    2016-06-01

    employs the in- variance of the Maxwell equations under coordinate transformations to convert the free- space wave solutions in a coordinate... ENERGY WEAPON DEFENSE by Jacob D. Thompson June 2016 Thesis Co-Advisors: James Luscombe Brett Borden Approved for public release; distribution is...2014 to 06-17-2016 4. TITLE AND SUBTITLE NONLINEAR EFFECTS IN TRANSFORMATION OPTICS-BASED METAMATE- RIAL SHIELDS FOR COUNTER DIRECTED ENERGY WEAPON

  14. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  15. Deliberating A Contract Type Based Risk Mitigation Strategy For South African Defense Acquisitions

    Science.gov (United States)

    2016-06-01

    cash flow may lead to cost overruns and schedule slippage. Table 1 shows the description, schedule and cost performance status for two SA DOD...possibility of applying a contract-type based strategy to manage acquisition program costs and schedule risks for the South African (SA) Department of...deviations between technical, cost and schedule performance. 14. SUBJECT TERMS acquisition process, defense acquisition, contract-type, risk

  16. Identifying and Mitigating the Impact of the Budget Control Act on High Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks

    Science.gov (United States)

    2016-04-30

    Ü~åÖÉ= - 351 - products, similar to those found in a bill of material. Figure 3 provides an example of the relationship between sectors , sub- sectors ...defense aircraft. Defense aircraft are divided in three main sub- sectors : fixed-wing, rotary wing, and unmanned systems. The fixed-wing sub- sector ...Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks Lirio Avilés, Engineer, MIBP, OUSD(AT&L) Sally

  17. Research on air and missile defense task allocation based on extended contract net protocol

    Science.gov (United States)

    Zhang, Yunzhi; Wang, Gang

    2017-10-01

    Based on the background of air and missile defense distributed element corporative engagement, the interception task allocation problem of multiple weapon units with multiple targets under network condition is analyzed. Firstly, a mathematical model of task allocation is established by combat task decomposition. Secondly, the initialization assignment based on auction contract and the adjustment allocation scheme based on swap contract were introduced to the task allocation. Finally, through the simulation calculation of typical situation, the model can be used to solve the task allocation problem in complex combat environment.

  18. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  19. Department of Defense Base Structure Report (A Summary of DOD's Real Property Inventory), Fiscal year 2005 Baseline

    National Research Council Canada - National Science Library

    2005-01-01

    The Base Structure Report represents a consolidated summary of the Services native real property inventories to provide an overall look at the physical infrastructure that makes up the Department of Defense...

  20. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  1. The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense

    International Nuclear Information System (INIS)

    Massa, R.J.

    1987-01-01

    This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training

  2. Consolidation of the U.S. Defense Industrial Base: Impact on Research Expenditures

    National Research Council Canada - National Science Library

    Linster, Bruce G; Slate, Stephen; Waller, Robert L

    2002-01-01

    ...: Boeing, Raytheon, Litton Industries, Lockheed Martin, and Northrop Grumman. The battle for the shrinking defense budget has resulted in not only mergers, but also an increased emphasis on the formation of partnerships among defense contractors...

  3. Vesicourethral fistula after retrograde primary endoscopic realignment in posterior urethral injury.

    Science.gov (United States)

    Arora, Rajat; John, Nirmal Thampi; Kumar, Santosh

    2015-01-01

    A 22-year-old male patient presented with iatrogenic vesicourethral fistula after immediate retrograde endoscopic realignment of urethra after a posterior urethral injury associated with pelvic fracture. Copyright © 2015 Elsevier Inc. All rights reserved.

  4. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    Science.gov (United States)

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  5. Influence of rheology on realignment of mantle convective structure with plate motion after a plate reorganization

    Science.gov (United States)

    van Hunen, J.; Zhong, S.

    2006-08-01

    Small-scale convection (SSC) rolls below the oceanic lithosphere have the tendency to align with the large-scale shearing direction and thus with the plate motion direction relative to the deep mantle. Understanding the timescales of and processes responsible for realignment would contribute significantly to our understanding of the unresolved phenomena in the Pacific such as gravity lineations, small-scale seismic velocity variations, and intraplate volcanism that cannot be explained by hot spots. In this study we examine the evolution of those convection rolls when this relative plate motion direction is suddenly changed, as suggested by the kink in the Hawaii-Emperor seamount chain. Using three-dimensional numerical flow models, we investigate the realignment of SSC rolls after a change in plate motion direction. From the nature of the SSC, it is expected that rheological parameters dominate the characteristics of this realignment. Our results show that this is indeed the case. We find that (1) using constraints from onset timing of SSC, realignment of rolls can occur as fast as within 20 Ma, but might also take much longer, dependent on the rheology; (2) the realignment period is strongly correlated to the sum of large-scale shear stress induced by plate motion and small-scale shear stress from the SSC itself; (3) in a mantle deforming by dislocation creep, realignment occurs faster than by diffusion creep, because dislocation creep SSC is more vigorous; and (4) activation energy has little influence on the realignment time. Possible evidence for the realignment period might come from precise age determination of intraplate volcanism or azimuthal seismic anisotropy.

  6. Environmental Assessment Installation Development and Base Realignment and Closure Actions

    Science.gov (United States)

    2007-01-01

    describe what som eone hears w hen a single event occurs. The noise levels experi enced inside a contour may be similar to that experienced outside...strucwres is limited to 50 feet AGL. 3. Suggested maximum density in RSZ C is less than one d11·el/ing unit per 10 acres. 4. Clubhouses , chapels, ami...depending on where the source is located, which pollutants are being emitted, and in what amounts. The 3- 13 January 2007 Environmental Assessment

  7. Base Realignment and Closure (BRAC) 2005: Congressional Dialogue and Decision

    National Research Council Canada - National Science Library

    Powers, Robert

    2003-01-01

    .... After painstaking compromise and a national security crisis, reformed BRAC legislation was passed, balancing political leadership and national strategy with job loss and disruption to local communities...

  8. Comprehensive Base Realignment/Closure and Fort Belvoir Development

    Science.gov (United States)

    1991-06-01

    2, and 4 through 14) involve structural and cosmetic repairs and upgrades. The process is scheduled in phases and should be completed in fiscal year...them, this having been begun in the late 1960s, and some cosmetic landscaping, path construction, and placing of information signs has been done around...Climatic Data Center. Washington National Airport, DC. Oxley, D.J., M.B. Fenton , and G.R. Carmody. 1974. The Effects of Roads on Populations of Small

  9. 78 FR 1256 - Guam Military Base Realignment Contractor Recruitment Standards

    Science.gov (United States)

    2013-01-08

    ... Contractor Recruitment Standards AGENCY: Employment and Training Administration, Labor. ACTION: Final notice... issuing this notice to announce recruitment standards that construction contractors are required to follow... B) by adding a new subsection (6). This provision prohibits contractors engaged in construction...

  10. Realignment of Cannon Air Force Base Curry County, New Mexico

    Science.gov (United States)

    1990-05-01

    1.80 33 35 107 175 Quay 0.96 41 17 27 85 Guadalupe 0.42 33 79 112 Torrance 1.60 14 14 Taos 7.60 25 25 50 Rio Arriba 4.30 67 67 I San Duval 3.90 16 16...414. ’" Q .0a.Ŕ 40 s0 al4141 41. . 0 4 g - Li wsa 0 oo%30.41..4 .9 40 0 ta.4 >.- w ’ aLa aQ a0..A0.0 to3 0 u1 0 4 .. 0 4 .3414. C41 41 0V 044 41 a0 0 2

  11. The Impact of Osseous Malalignment and Realignment Procedures in Knee Ligament Surgery: A Systematic Review of the Clinical Evidence.

    Science.gov (United States)

    Tischer, Thomas; Paul, Jochen; Pape, Dietrich; Hirschmann, Michael T; Imhoff, Andreas B; Hinterwimmer, Stefan; Feucht, Matthias J

    2017-03-01

    Failure rates of knee ligament surgery may be high, and the impact of osseous alignment on surgical outcome remains controversial. Basic science studies have demonstrated that osseous malalignment can negatively affect ligament strain and that realignment procedures may improve knee joint stability. The purpose of this review was to summarize the clinical evidence concerning the impact of osseous malalignment and realignment procedures in knee ligament surgery. The hypotheses were that lower extremity malalignment would be an important contributor to knee ligament surgery failure and that realignment surgery would contribute to increased knee stability and improved outcome in select cases. Systematic review; Level of evidence, 4. According to the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, a systematic electronic search of the PubMed database was performed in November 2015 to identify clinical studies investigating (A) the influence of osseous alignment on postoperative stability and/or failure rates after knee ligament surgery and (B) the impact of osseous realignment procedures in unstable knees with or without additional knee ligament surgery on postoperative knee function and stability. Methodological quality of the studies was assessed using the Oxford Centre for Evidence-Based Medicine Levels of Evidence and the Coleman Methodological Score (CMS). Of the 1466 potentially relevant articles, 28 studies fulfilled the inclusion and exclusion criteria. Average study quality was poor (CMS, 40). For part A, studies showed increased rerupture rate after anterior cruciate ligament (ACL) replacement in patients with increased tibial slope. Concerning the posterior cruciate ligament (PCL)/posterolateral corner (PLC)/lateral collateral ligament (LCL), varus malalignment was considered a significant risk factor for failure. For part B, studies showed decreased anterior tibial translation after slope-decreasing high tibial

  12. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  13. Symposium by NATO Defense Research Group Panel VIII on Computer-Based Instruction in Military Environments

    CERN Document Server

    Weddle, Peter

    1987-01-01

    This collection of papers is the result of a symposium sponsored by NATO's Defense Research Group Panel VIII in the Spring of 1985. The symposium came into being when it became obvious to the NATO countries that research, development and utilization of advanced technologies for training was the best means of increasing both training effectiveness and efficiency. This symposium was the second in a series of three devoted to training. The series was structured to cover all aspects of training. The first series addressed the value of training, the second one dealt with the application of training technologies and the third and last of the series focused on academic issues concerned with the effect of prior learning on subsequent learning. The fact that a major American publisher has determined that computer based instruction is the technology of greatest interest to the NATO community is not surprising. Advances in microprocessor technology have revolutionized both how and where we train. During this symposium t...

  14. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  15. Preliminary results of anterior lumbar interbody fusion, anterior column realignment for the treatment of sagittal malalignment.

    Science.gov (United States)

    Hosseini, Pooria; Mundis, Gregory M; Eastlack, Robert K; Bagheri, Ramin; Vargas, Enrique; Tran, Stacie; Akbarnia, Behrooz A

    2017-12-01

    OBJECTIVE Sagittal malalignment decreases patients' quality of life and may require surgical correction to achieve realignment goals. High-risk posterior-based osteotomy techniques are the current standard treatment for addressing sagittal malalignment. More recently, anterior lumbar interbody fusion, anterior column realignment (ALIF ACR) has been introduced as an alternative for correction of sagittal deformity. The objective of this paper was to report clinical and radiographic results for patients treated using the ALIF-ACR technique. METHODS A retrospective study of 39 patients treated with ALIF ACR was performed. Patient demographics, operative details, radiographic parameters, neurological assessments, outcome measures, and preoperative, postoperative, and mean 1-year follow-up complications were studied. RESULTS The patient population comprised 39 patients (27 females and 12 males) with a mean follow-up of 13.3 ± 4.7 months, mean age of 66.1 ± 11.6 years, and mean body mass index of 27.3 ± 6.2 kg/m 2 . The mean number of ALIF levels treated was 1.5 ± 0.5. Thirty-three (84.6%) of 39 patients underwent posterior spinal fixation and 33 (84.6%) of 39 underwent posterior column osteotomy, of which 20 (60.6%) of 33 procedures were performed at the level of the ALIF ACR. Pelvic tilt, sacral slope, and pelvic incidence were not statistically significantly different between the preoperative and postoperative periods and between the preoperative and 1-year follow-up periods (except for PT between the preoperative and 1-year follow-up, p = 0.018). Sagittal vertical axis, T-1 spinopelvic inclination, lumbar lordosis, pelvic incidence-lumbar lordosis mismatch, intradiscal angle, and motion segment angle all improved from the preoperative to postoperative period and the preoperative to 1-year follow-up (p < 0.05). The changes in motion segment angle and intradiscal angle achieved in the ALIF-ACR group without osteotomy compared with the ALIF-ACR group with osteotomy

  16. N-terminal domains of human DNA polymerase lambda promote primer realignment during translesion DNA synthesis

    Science.gov (United States)

    Taggart, David J.; Dayeh, Daniel M.; Fredrickson, Saul W.; Suo, Zucai

    2014-01-01

    The X-family DNA polymerases λ (Polλ) and β (Polβ) possess similar 5′-2-deoxyribose-5-phosphatelyase (dRPase) and polymerase domains. Besides these domains, Polλ also possesses a BRCA1 C-terminal (BRCT) domain and a proline-rich domain at its N terminus. However, it is unclear how these non-enzymatic domains contribute to the unique biological functions of Polλ. Here, we used primer extension assays and a newly developed high-throughput short oligonucleotide sequencing assay (HT-SOSA) to compare the efficiency of lesion bypass and fidelity of human Polβ, Polλ and two N-terminal deletion constructs of Polλ during the bypass of either an abasic site or a 8-oxo-7,8-dihydro-2′-deoxyguanosine (8-oxodG) lesion. We demonstrate that the BRCT domain of Polλ enhances the efficiency of abasic site bypass by approximately 1.6-fold. In contrast, deletion of the N-terminal domains of Polλ did not affect the efficiency of 8-oxodG bypass relative to nucleotide incorporations opposite undamaged dG. HT-SOSA analysis demonstrated that Polλ and Polβ preferentially generated −1 or −2 frameshift mutations when bypassing an abasic site and the single or double base deletion frequency was highly sequence dependent. Interestingly, the BRCT and proline-rich domains of Polλ cooperatively promoted the generation of −2 frameshift mutations when the abasic site was situated within a sequence context that was susceptible to homology-driven primer realignment. Furthermore, both N-terminal domains of Polλ increased the generation of −1 frameshift mutations during 8-oxodG bypass and influenced the frequency of substitution mutations produced by Polλ opposite the 8-oxodG lesion. Overall, our data support a model wherein the BRCT and proline-rich domains of Polλ act cooperatively to promote primer/template realignment between DNA strands of limited sequence homology. This function of the N-terminal domains may facilitate the role of Polλ as a gap-filling polymerase

  17. Cine MR imaging before and after realignment surgery for patellar maltracking - comparison with axial radiographs

    Energy Technology Data Exchange (ETDEWEB)

    Brossmann, J. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Muhle, C. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Buell, C.C. [Rheumaklinik, Bad Bramstedt (Germany); Zieplies, J. [Lubinus Klinik, Kiel (Germany); Melchert, U.H. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Brinkmann, G. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Schroeder, C. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Heller, M. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany)

    1995-04-01

    Comparison of motion-triggered cine magnetic resonance (MR) imaging and conventional radiographs for the assessment of operative results of patellar realignment. Fifteen patients with recurrent patellar dislocation or patellar subluxation were evaluated with conventional axial radiographs before and after realignment surgery by measuring the congruence angle (CA), lateral patellofemoral angle (LPFA), and lateral displacement (d). In eight patients the patellofemoral joint was additionally evaluated pre- and postoperatively with motion-triggered cine MR imaging by determining the bisect offset (BSO), lateral patellar displacement (LPD), and patellar tilt angle (PTA). Significant differences between the pre- and postoperative measurements were found for all MR imaging parameters (BSO, LPD, PTA: p<0.01) but not for the conventional X-ray parameters (CA: p=0.70, LPFA: p=0.56; d: p=0.04). Motion-triggered cine MR imaging was superior to conventional tangential radiographs for assessing the effectiveness of patellar realignment surgery. (orig.)

  18. Cine MR imaging before and after realignment surgery for patellar maltracking - comparison with axial radiographs

    International Nuclear Information System (INIS)

    Brossmann, J.; Muhle, C.; Buell, C.C.; Zieplies, J.; Melchert, U.H.; Brinkmann, G.; Schroeder, C.; Heller, M.

    1995-01-01

    Comparison of motion-triggered cine magnetic resonance (MR) imaging and conventional radiographs for the assessment of operative results of patellar realignment. Fifteen patients with recurrent patellar dislocation or patellar subluxation were evaluated with conventional axial radiographs before and after realignment surgery by measuring the congruence angle (CA), lateral patellofemoral angle (LPFA), and lateral displacement (d). In eight patients the patellofemoral joint was additionally evaluated pre- and postoperatively with motion-triggered cine MR imaging by determining the bisect offset (BSO), lateral patellar displacement (LPD), and patellar tilt angle (PTA). Significant differences between the pre- and postoperative measurements were found for all MR imaging parameters (BSO, LPD, PTA: p<0.01) but not for the conventional X-ray parameters (CA: p=0.70, LPFA: p=0.56; d: p=0.04). Motion-triggered cine MR imaging was superior to conventional tangential radiographs for assessing the effectiveness of patellar realignment surgery. (orig.)

  19. Task Group on a Strategic Relationship Model Between the Department of Defense and the Industrial Base

    National Research Council Canada - National Science Library

    2008-01-01

    ...) to evaluate and make recommendations to the Department of Defense (DoD) regarding actions that could improve the strategic relationship between the Department and its manufacturer and service suppliers...

  20. Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems

    National Research Council Canada - National Science Library

    Lorell, Mark A; Graser, John C; Cook, Cynthia R

    2005-01-01

    .... Critics of this traditional, CBA method see it as imposing heavy regulatory burdens on the government and the contractor and tending to discourage potential non-defense contractors from competing...

  1. Strategy for the Long Haul: The U.S. Defense Industrial Base, Past, Present and Future

    National Research Council Canada - National Science Library

    Watts, Barry D

    2008-01-01

    .... The other was North Korea's invasion of South Korea in June 1950, which precipitated the large increases in defense spending called for in Paul Nitze's formulation of containment in April 1950...

  2. When to remove the urethral catheter after endoscopic realignment of traumatic disruption of the posterior urethra?

    Science.gov (United States)

    El Darawany, H M

    2017-09-01

    To detect the optimal time for urethral stent removal after endoscopic urethral realignment and its effect on the incidence of development of urethral stricture. Eighteen patients underwent endoscopic urethral realignment after traumatic disruption of the posterior urethra. Post-operative urethroscopy was done using the flexible cystoscope to assess progress of urethral healing. The urethral Foley catheter that served as a stent and for urine drainage was removed only when complete mucosal healing was observed by flexible urethroscopy. There was a post-operative follow-up period of 12-36months. Uroflowmetry was performed at the end of the follow-up period. Endoscopy 6weeks after realignment showed 50-75% mucosal epithelialization at the site of urethral disruption in all patients. Epithelialization was complete at 9weeks in 15/18 patients (83%) and at 12weeks in the remaining 3 patients (17%). One patient (5.6%) developed a mild symptomatic stricture 5months post stent removal that was successfully treated by a single session of visual urethrotomy. All 18 patients had normal uroflowmetry readings at 12-36months after realignment. Urethral stenting should be continued till mucosal healing at the site of urethral disruption became complete. Removal of the stent at this optimal time decreases the incidence of post-operative urethral stricture. Flexible urethroscopy was a safe procedure for post-operative follow-up of endoscopic urethral realignment to assess the progress and completion of mucosal healing at the site of realignment. 4. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  3. Risk Management and Simulation Based Live Fire Test and Evaluation in the Performance Based Defense Business Environment

    National Research Council Canada - National Science Library

    Brown, R

    1999-01-01

    .... The service and acquisition program independent Live Fire Test and Evaluation Community has not fully recognized the changing defense acquisition business environment and modified policy and business...

  4. Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

    Directory of Open Access Journals (Sweden)

    Dileep Basam

    2016-01-01

    Full Text Available Moving Target IPv6 Defense (MT6D imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.

  5. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  7. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    Science.gov (United States)

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  8. Carbon degradation in agricultural soils flooded with seawater after managed coastal realignment

    DEFF Research Database (Denmark)

    Sjøgaard, Kamilla Schneekloth; Treusch, Alexander H.; Valdemarsen, Thomas Bruun

    2017-01-01

    Strand) that was planned to be flooded in a coastal realignment project. We found rapid carbon degradation almost immediately after flooding and microbial sulfate reduction rapidly established as the dominant mineralization pathway. Nevertheless, no free sulfide was observed as it precipitated as Fe...

  9. The Sociolinguistic Realignment in the Chinese Community in Kuala Lumpur: Past, Present and Future

    Science.gov (United States)

    Wang, Xiaomei

    2010-01-01

    The language situation in the Malaysian Chinese community has undergone great changes in the past century. This paper aims to account for such changes in the framework of sociolinguistic realignment, which is both descriptive and predictive. The triglossic situation in the colonial period (1859-1957) is described; with the support of a language…

  10. Reconfiguring and Realigning the Assessment Feedback Processes for an Undergraduate Criminology Degree

    Science.gov (United States)

    Case, Stephen

    2007-01-01

    A reconfigured and realigned system of assessment feedback was implemented with undergraduates taking criminology modules at Swansea University. The reformulated system integrated explicit engagement with assessment criteria in feedback given on an electronic template form with the use of a statement bank and the offer of follow-up, feedback…

  11. A motion correction algorithm for an image realignment programme useful for sequential radionuclide renography

    International Nuclear Information System (INIS)

    De Agostini, A.; Moretti, R.; Belletti, S.; Maira, G.; Magri, G.C.; Bestagno, M.

    1992-01-01

    The correction of organ movements in sequential radionuclide renography was done using an iterative algorithm that, by means of a set of rectangular regions of interest (ROIs), did not require any anatomical marker or manual elaboration of frames. The realignment programme here proposed is quite independent of the spatial and temporal distribution of activity and analyses the rotational movement in a simplified but reliable way. The position of the object inside a frame is evaluated by choosing the best ROI in a set of ROIs shifted 1 pixel around the central one. Statistical tests have to be fulfilled by the algorithm in order to activate the realignment procedure. Validation of the algorithm was done for different acquisition set-ups and organ movements. Results, summarized in Table 1, show that in about 90% of the stimulated experiments the algorithm is able to correct the movements of the object with a maximum error less of equal to 1 pixel limit. The usefulness of the realignment programme was demonstrated with sequential radionuclide renography as a typical clinical application. The algorithm-corrected curves of a 1-year-old patient were completely different from those obtained without a motion correction procedure. The algorithm may be applicable also to other types of scintigraphic examinations, besides functional imaging in which the realignment of frames of the dynamic sequence was an intrinsic demand. (orig.)

  12. Inappropriate emergency laboratory test ordering: defensive or peer evidence shared based medicine?

    Directory of Open Access Journals (Sweden)

    C. Descovich

    2013-05-01

    Full Text Available BACKGROUND The laboratory overuse is widely prevalent in hospital practice, mostly in the emergency care. Reasons for excessive and inappropriate test-ordering include defensive behaviour and fear or uncertainty, lack of experience, the misuse of protocols and guidelines, “routine” and local attitudes, inadequate educational feedback and clinician’s unawareness about the cost of examinations and their related implications. AIM OF THE STUDY AND METHODS The primary target of our working group was to reduce inappropriate ordering on a urgent basis test, implementing further examinations not yet previewed in the hospital panel of the available urgencies, according to the evidence based diagnosis concept. The secondary goal was to indicate strategies of re-engineering of the processes, improving turnaround time in the laboratory management of emergencies. After evaluating, as first intervention, the more reliable sources for practice guidelines, systematic reviews and RCTs, the committee further discussed main topics with in-hospital stakeholders, selected from Emergency, Internal Medicine and Surgery Depts. The working group, in many subsequent audits, tried to obtain a systematic feed back with all involved professionals. RESULTS After reviewing literature’s evidence, the board constrained testing options by defining the basic emergency laboratory panel tests (blood type, hemogram, blood urea nitrogen, plasma creatinine, glucose, sodium, potassium, chloride, osmolarity, CRP, bicarbonate, CPK, creatine phosphokinase-MB, myoglobin, troponin, BNP and NT-proBNP, PT-INR, PTT, D-dimer, beta- HCG, biochemical urinalysis etc.. As final result, the proposed tests reduced the overall number of inappropriate investigations and increased, with newer and updated tests, the available panel for critical patients. DISCUSSION A collegiate review of data reporting, in-hospital deepening of problems and the inter- professional discussion of the evidences

  13. An Analysis of Department Of Defense Policy and Guidance for Implementation of Performance-Based Logistics

    Science.gov (United States)

    2015-09-01

    stability to the provider’s order book and adds shareholder value . Incentives that focus on profit may not be applicable for public facilities, but... Stakeholders (from ASD (L&MR) 2011b, 17) ...............3  Figure 3.  System Life Cycle Illustration (from Secretary of Defense 2014, 2–1) ...........5...Figure 2 is provided to show the roles, relationships, responsibilities and business agreements among the various key product support stakeholders

  14. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  15. Electromyographic investigation of unstable patella before and after its realignment operation

    Directory of Open Access Journals (Sweden)

    D D Baksi

    2011-01-01

    Full Text Available Background: Patellar dislocations are either due to superolateral contracture of the soft tissue or imbalance of the power between the vastus medialis (VM and the vastus lateralis (VL. The imbalance of muscle power as an etiology of patellar dislocation has not been studied. Hence, we studied the recurrent, habitual and permanent dislocations of the patella with an electromyogram (EMG of the vastus medialis, vastus lateralis, and pes anserinus, before and after realignment operations, to document the muscle imbalance and effectiveness of the realignment operation. Materials and Methods: An electromyographic investigation was carried out on the vastus medialis and vastus lateralis in nine recurrent, 20 habitual, and 13 permanent dislocations of the patella, before and after their realignment operations. Pes anserinus transposition, which acted as a medial stabilizer of the patella, was also investigated with an EMG study, to understand its role on patellar stability at 0΀, 30΀, 60΀, 90΀, 120΀, 150΀, and full flexion of the knee. The age of the patients varied from nine to 30 (mean 15 years. There were 24 males and 18 females. Twenty-six patellar dislocations were on the right and 16 were on the left side. Results: Electromyographic pictures reveal subnormal activity of the vastus medialis in all types of dislocations and similar activities of the vastus lateralis in permanent and habitual dislocations recorded pre operatively, which recovered to almost normal values postoperatively, at the mean one-year follow-up. Pes anserinus, which was used for medial stabilization of the patella after its realignment, maintained normal EMG activity before and after the operation. Conclusion: This study is significant for understanding the imbalance of muscle activities in patients with an unstable patella, which can be rectified without recurrence after pes anserinus transposition.

  16. Air Base Defense in the Republic of Vietnam, 1961-1973,

    Science.gov (United States)

    1979-01-01

    that trying year at best the The same conditions prevailed at Pleiku. Maj. Perry J. Rawls , Chief of RVNAF responsible for external de- Security Police...which depend on yourself alone and your own ability. Niccolo Machiavelli , 1513. The local ground defense of Forces Vietnam, Seventh Air Force, USAF...in 23. EOTR, Maj Perry J. Rawls , Ch/ Vietnam, Part H: May-December 1965 SP, Pleiku AB, 30 May 69. (Hist Div, USMC, 1970), p 6:18; lItr, 24. Ltr, Ch/SP

  17. Movement analysis of chest MR image under rest breath using realignment of SPM

    International Nuclear Information System (INIS)

    Kitamura, Shigemi; Usui, Shuji; Horiguchi, Takayoshi; Akiyama, Mitoshi

    2007-01-01

    Analyses of diaphragm and chest wall motion are good indicators to evaluate clinical status and pulmonary function before and after surgery for respiratory disease. Noninvasive MR images using fast gradient recalled echo techniques recently have received a great deal of attention for their assessment of inspiratory motion. However, it is laborious to analyze a large number of dynamic MR images. Therefore, we performed movement analyses of chest two-dimensional (2D) MR images by using the public domain software statistical parametric mapping (SPM) Realignment sub-routine, which is commonly used for the motion correction of brain functional MRI analyses. First, dynamic 2D MR images of a glue-stick phantom were measured as a simple reciprocal movement model and were numerically analyzed by the SPM Realignment. The resulting translation to each axis coincided with the measured values. Then the dynamic images of normal volunteers under free breathing were analyzed by the same method, and we found that the inspiratory motions were quantitatively shown as the translation to each axis. These results revealed that the SPM Realignment is a useful tool for screening the magnitude and characteristics of inspiratory motion. (author)

  18. Early Primary Endoscopic Realignment of Posterior Urethral Injury- Evaluation and Follow-Up

    Directory of Open Access Journals (Sweden)

    Prasad Mylarappa

    2013-07-01

    Full Text Available Background: The management of complete orpartial posterior urethral disruption is contro-versial and much debate continues regarding theimmediate, early and delayed definitive therapy.Objective: We report our institutional experi-ence and long term result of early endoscopicrealignment of traumatic posterior urethral in-jury. Method and Materials: Between Septem-ber 1996 and March 2012, ninety six men witheither complete (84 or partial (12 posteriorurethral injury secondary to blunt trauma (11or pelvic fractures (85, presented to our insti-tution and these patients underwent immediatesuprapubic cystostomy followed by early pri-mary endoscopic realignment done 3-8 daysafter injury. Result: Seventy four patients(92.5% were continent after catheter removal.Urethral stricture was seen in seventy two pa-tients (90% of which fifty patients (69.4%had simple urethral stricture who were managedby urethral dilatation on outpatient basis. Four-teen patients (19.4% developed short stric-tures which were successfully treated with vi-sual internal urethrotomy. Eight patients(11.1% required anastomotic urethroplasty fordense stricture. Potency was retained in sev-enty five patients (93.75%. Urinary flow mea-surements at follow-up evaluation were satis-factory.Conclusion:Early primary endoscopic realign-ment in our experience reduces time to spon-taneous voiding, decrease the need for majorreconstructive surgery and long term supra pub-lic urinary diversion.

  19. Carbon degradation in agricultural soils flooded with seawater after managed coastal realignment

    Science.gov (United States)

    Sjøgaard, Kamilla S.; Treusch, Alexander H.; Valdemarsen, Thomas B.

    2017-09-01

    Permanent flooding of low-lying coastal areas is a growing threat due to climate change and related sea-level rise. An increasingly common solution to protect coastal areas lying below sea level is intentional flooding by "managed coastal realignment". However, the biogeochemical implications of flooding agricultural soils with seawater are still not well understood. We conducted a 1-year mesocosm experiment to investigate microbial carbon degradation processes in soils flooded with seawater. Agricultural soils were sampled on the northern coast of the island Fyn (Denmark) at Gyldensteen Strand, an area that was subsequently flooded in a coastal realignment project. We found rapid carbon degradation to TCO2 1 day after experimental flooding and onwards and microbial sulfate reduction established quickly as an important mineralization pathway. Nevertheless, no free sulfide was observed as it precipitated as Fe-S compounds with Fe acting as a natural buffer, preventing toxic effects of free sulfide in soils flooded with seawater. Organic carbon degradation decreased significantly after 6 months, indicating that most of the soil organic carbon was refractory towards microbial degradation under the anoxic conditions created in the soil after flooding. During the experiment only 6-7 % of the initial soil organic carbon pools were degraded. On this basis we suggest that most of the organic carbon present in coastal soils exposed to flooding through sea-level rise or managed coastal realignment will be permanently preserved.

  20. Neural mechanisms underlying spatial realignment during adaptation to optical wedge prisms.

    Science.gov (United States)

    Chapman, Heidi L; Eramudugolla, Ranmalee; Gavrilescu, Maria; Strudwick, Mark W; Loftus, Andrea; Cunnington, Ross; Mattingley, Jason B

    2010-07-01

    Visuomotor adaptation to a shift in visual input produced by prismatic lenses is an example of dynamic sensory-motor plasticity within the brain. Prism adaptation is readily induced in healthy individuals, and is thought to reflect the brain's ability to compensate for drifts in spatial calibration between different sensory systems. The neural correlate of this form of functional plasticity is largely unknown, although current models predict the involvement of parieto-cerebellar circuits. Recent studies that have employed event-related functional magnetic resonance imaging (fMRI) to identify brain regions associated with prism adaptation have discovered patterns of parietal and cerebellar modulation as participants corrected their visuomotor errors during the early part of adaptation. However, the role of these regions in the later stage of adaptation, when 'spatial realignment' or true adaptation is predicted to occur, remains unclear. Here, we used fMRI to quantify the distinctive patterns of parieto-cerebellar activity as visuomotor adaptation develops. We directly contrasted activation patterns during the initial error correction phase of visuomotor adaptation with that during the later spatial realignment phase, and found significant recruitment of the parieto-cerebellar network--with activations in the right inferior parietal lobe and the right posterior cerebellum. These findings provide the first evidence of both cerebellar and parietal involvement during the spatial realignment phase of prism adaptation. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  1. Slipped upper femoral epiphysis: Outcome after in situ fixation and capital realignment technique

    Directory of Open Access Journals (Sweden)

    Sanjay Arora

    2013-01-01

    Results: Clinical outcome as assessed by Merle d′ Aubigne score was excellent in 6, good in 10, fair in 6 and poor in 1. Half of the in situ fixation patients underwent osteoplasty procedure for femoroacetabular impingement and 5 more were symptomatic. The head neck offset and α angle after in situ pinning were -1.12 ± 3 mm and 66.05 ± 9.7°, respectively and this improved to 8.7 mm and 49°, respectively, after osteoplasty. One child in the pinning group had chondrolysis. Eight patients with severe slip underwent capital realignment. Mean followup was 20.15 months. The anterior head neck offset and α angle were corrected to 6.8 ± 1.72 mm and 44.6 ± 7.0° mm, respectively. Two children with unstable slip in the capital realignment group had avascular necrosis which was diagnosed at presentation by bone scan. Conclusion: High BMI, vitamin D deficiency and endocrine disorders are associated with SUFE in India and should be evaluated as some of these are amenable to prevention and treatment. Most patients treated with in situ pinning developed femoroacetabular impingement. The early results after capital realignment procedure are encouraging and help to avoid a second procedure which is needed in a majority of patients who underwent in situ pinning.

  2. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  3. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  4. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  5. Silicate Based Glass Formulations for Immobilization of U.S. Defense Wastes Using Cold Crucible Induction Melters

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Gary L.; Kim, Dong-Sang; Schweiger, Michael J.; Marra, James C.; Lang, Jesse B.; Crum, Jarrod V.; Crawford, Charles L.; Vienna, John D.

    2014-05-22

    The cold crucible induction melter (CCIM) is an alternative technology to the currently deployed liquid-fed, ceramic-lined, Joule-heated melter for immobilizing of U.S. tank waste generated from defense related reprocessing. In order to accurately evaluate the potential benefits of deploying a CCIM, glasses must be developed specifically for that melting technology. Related glass formulation efforts have been conducted since the 1990s including a recent study that is first documented in this report. The purpose of this report is to summarize the silicate base glass formulation efforts for CCIM testing of U.S. tank wastes. Summaries of phosphate based glass formulation and phosphate and silicate based CCIM demonstration tests are reported separately (Day and Ray 2013 and Marra 2013, respectively). Combined these three reports summarize the current state of knowledge related to waste form development and process testing of CCIM technology for U.S. tank wastes.

  6. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    International Nuclear Information System (INIS)

    Seidel, F.

    1998-01-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper's intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  7. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Federal Office for Radiation Protection, Salzgitter (Germany)

    1998-10-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper`s intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  8. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  9. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  10. Priorities for a 21st-century defense: aligning u.s. Army environmental science and engineering officer resources with the department of defense strategic guidance.

    Science.gov (United States)

    Licina, Derek; Rufolo, Dennis; Story, Mike

    2013-01-01

    The recently published Department of Defense (DoD) strategic guidance highlights the need to ?shape a joint force for the future.? Supporting requirements to shape the joint force while the overall DoD force structure is reduced will be challenging. Fortunately, based on its unique training and experience, the Army Environmental Science and Engineering Officer (ESEO) profession is positioned today to fill anticipated joint public health requirements. Obtaining the U.S. Army Medical Department (AMEDD) approval to meet these requirements will have near-term consequences for the ESEO profession as some existing (albeit antiquated) authorizations may go unfilled. However, long-term dividends for the Medical Service Corps (MSC), AMEDD, Army, and DoD will be achieved by realigning critical resources to future joint and interagency requirements. Assigning ESEOs now to organizations such as the Theater Special Operations Commands (TSOCs), U.S. Agency for International Development (USAID), and the North Atlantic Treaty Organization (NATO) with perceived and real joint force health protection/public health requirements through unique means will ensure our profession remains relevant today and supports the joint force of tomorrow. 2013.

  11. Multifunctional Polyphenols- and Catecholamines-Based Self-Defensive Films for Health Care Applications.

    Science.gov (United States)

    Dhand, Chetna; Harini, Sriram; Venkatesh, Mayandi; Dwivedi, Neeraj; Ng, Alice; Liu, Shouping; Verma, Navin Kumar; Ramakrishna, Seeram; Beuerman, Roger W; Loh, Xian Jun; Lakshminarayanan, Rajamani

    2016-01-20

    In an era of relentless evolution of antimicrobial resistance, there is an increasing demand for the development of efficient antimicrobial coatings or surfaces for food, biomedical, and industrial applications. This study reports the laccase-catalyzed room-temperature synthesis of mechanically robust, thermally stable, broad spectrum antimicrobial films employing interfacial interactions between poly(vinyl alcohol), PVA, and 14 naturally occurring catecholamines and polyphenols. The oxidative products of catecholamines and polyphenols reinforce the PVA films and also alter their surface and bulk properties. Among the catecholamines-reinforced films, optimum surface and bulk properties can be achieved by the oxidative products of epinephrine. For polyphenols, structure-property correlation reveals an increase in surface roughness and elasticity of PVA films with increasing number of phenolic groups in the precursors. Interestingly, PVA films reinforced with oxidized/polymerized products of pyrogallol (PG) and epinephrine (EP) display potent antimicrobial activity against pathogenic Gram-positive and Gram-negative strains, whereas hydroquinone (HQ)-reinforced PVA films display excellent antimicrobial properties against Gram-positive bacteria only. We further demonstrate that HQ and PG films retain their antimicrobial efficacy after steam sterilization. With an increasing trend of giving value to natural and renewable resources, our results have the potential as durable self-defensive antimicrobial surfaces/films for advanced healthcare and industrial applications.

  12. REALIGNED MODEL PREDICTIVE CONTROL OF A PROPYLENE DISTILLATION COLUMN

    Directory of Open Access Journals (Sweden)

    A. I. Hinojosa

    Full Text Available Abstract In the process industry, advanced controllers usually aim at an economic objective, which usually requires closed-loop stability and constraints satisfaction. In this paper, the application of a MPC in the optimization structure of an industrial Propylene/Propane (PP splitter is tested with a controller based on a state space model, which is suitable for heavily disturbed environments. The simulation platform is based on the integration of the commercial dynamic simulator Dynsim® and the rigorous steady-state optimizer ROMeo® with the real-time facilities of Matlab. The predictive controller is the Infinite Horizon Model Predictive Control (IHMPC, based on a state-space model that that does not require the use of a state observer because the non-minimum state is built with the past inputs and outputs. The controller considers the existence of zone control of the outputs and optimizing targets for the inputs. We verify that the controller is efficient to control the propylene distillation system in a disturbed scenario when compared with a conventional controller based on a state observer. The simulation results show a good performance in terms of stability of the controller and rejection of large disturbances in the composition of the feed of the propylene distillation column.

  13. Estimating Herd Immunity to Amphibian Chytridiomycosis in Madagascar Based on the Defensive Function of Amphibian Skin Bacteria

    Directory of Open Access Journals (Sweden)

    Molly C. Bletz

    2017-09-01

    Full Text Available For decades, Amphibians have been globally threatened by the still expanding infectious disease, chytridiomycosis. Madagascar is an amphibian biodiversity hotspot where Batrachochytrium dendrobatidis (Bd has only recently been detected. While no Bd-associated population declines have been reported, the risk of declines is high when invasive virulent lineages become involved. Cutaneous bacteria contribute to host innate immunity by providing defense against pathogens for numerous animals, including amphibians. Little is known, however, about the cutaneous bacterial residents of Malagasy amphibians and the functional capacity they have against Bd. We cultured 3179 skin bacterial isolates from over 90 frog species across Madagascar, identified them via Sanger sequencing of approximately 700 bp of the 16S rRNA gene, and characterized their functional capacity against Bd. A subset of isolates was also tested against multiple Bd genotypes. In addition, we applied the concept of herd immunity to estimate Bd-associated risk for amphibian communities across Madagascar based on bacterial antifungal activity. We found that multiple bacterial isolates (39% of all isolates cultured from the skin of Malagasy frogs were able to inhibit Bd. Mean inhibition was weakly correlated with bacterial phylogeny, and certain taxonomic groups appear to have a high proportion of inhibitory isolates, such as the Enterobacteriaceae, Pseudomonadaceae, and Xanthamonadaceae (84, 80, and 75% respectively. Functional capacity of bacteria against Bd varied among Bd genotypes; however, there were some bacteria that showed broad spectrum inhibition against all tested Bd genotypes, suggesting that these bacteria would be good candidates for probiotic therapies. We estimated Bd-associated risk for sampled amphibian communities based on the concept of herd immunity. Multiple amphibian communities, including those in the amphibian diversity hotspots, Andasibe and Ranomafana, were

  14. Estimating Herd Immunity to Amphibian Chytridiomycosis in Madagascar Based on the Defensive Function of Amphibian Skin Bacteria.

    Science.gov (United States)

    Bletz, Molly C; Myers, Jillian; Woodhams, Douglas C; Rabemananjara, Falitiana C E; Rakotonirina, Angela; Weldon, Che; Edmonds, Devin; Vences, Miguel; Harris, Reid N

    2017-01-01

    For decades, Amphibians have been globally threatened by the still expanding infectious disease, chytridiomycosis. Madagascar is an amphibian biodiversity hotspot where Batrachochytrium dendrobatidis ( Bd ) has only recently been detected. While no Bd -associated population declines have been reported, the risk of declines is high when invasive virulent lineages become involved. Cutaneous bacteria contribute to host innate immunity by providing defense against pathogens for numerous animals, including amphibians. Little is known, however, about the cutaneous bacterial residents of Malagasy amphibians and the functional capacity they have against Bd . We cultured 3179 skin bacterial isolates from over 90 frog species across Madagascar, identified them via Sanger sequencing of approximately 700 bp of the 16S rRNA gene, and characterized their functional capacity against Bd . A subset of isolates was also tested against multiple Bd genotypes. In addition, we applied the concept of herd immunity to estimate Bd -associated risk for amphibian communities across Madagascar based on bacterial antifungal activity. We found that multiple bacterial isolates (39% of all isolates) cultured from the skin of Malagasy frogs were able to inhibit Bd . Mean inhibition was weakly correlated with bacterial phylogeny, and certain taxonomic groups appear to have a high proportion of inhibitory isolates, such as the Enterobacteriaceae, Pseudomonadaceae, and Xanthamonadaceae (84, 80, and 75% respectively). Functional capacity of bacteria against Bd varied among Bd genotypes; however, there were some bacteria that showed broad spectrum inhibition against all tested Bd genotypes, suggesting that these bacteria would be good candidates for probiotic therapies. We estimated Bd -associated risk for sampled amphibian communities based on the concept of herd immunity. Multiple amphibian communities, including those in the amphibian diversity hotspots, Andasibe and Ranomafana, were estimated to be

  15. Early Realignment Versus Delayed Urethroplasty in Management of Pelvic Fracture Urethral Injury: A Meta-analysis

    Directory of Open Access Journals (Sweden)

    Rama Firmanto

    2016-09-01

    Full Text Available Aim: this meta-analysis study will evaluate the incidence of urethral stricture as a successfull parameter in the management of PFUI through early realignment, compared with delayed urethroplasty. Long-term complications such as erectile dysfunction and incontinence on both methods will also be evaluated. Methods: online literature was sourced from Pubmed, Embase, Cochrane, and Google Scholar. The incidence of stricture was evaluated from the entire study group of ER and DU. Stricture of the urethra is diagnosed by the symptoms such as the obstruction that felt by the patient, uroflowmetry examination, and urine residual post micturition that supported by urethrography examination at regular interval. In some cases the incidence of stricture also diagnosed by urethroscopy. The patient is assessed as not having stricture when it is no longer needed to do urethral dilatation or advanced urethrotomy. The rate of incontinence was assessed subjectively from the patient’s complaints. The erectile function assessed subjectively; decreased of tumesen’s degree, reduced the duration of erection, and penetration failure diagnosed as erection dysfunction. The data were processed as dichotomy data to calculate the risk ratio using Review Manager 5.1. Results: five relevant literatures reviewed in this study. The incidence of urethral strictures are statistically significant lower in early realignment group (RR=0.70, 95% CI 0.50-0.99, P<0.05. There were no statistically significant differences between both treatment groups on the incidence of erectile dysfunction (RR=0.72, 95% CI 0.39-1.34 nor the incidence of incontinence (RR=0.74, 95% CI 0.36-1.51. Conclusion: early realignment decrease the occurrence of stricture on PFUI treatment compared to delayed urethroplasty method. Between the two methos, the complications such as erectile dysfunction and incontinence; however, there was no significant difference.

  16. Knowledge-based software design for Defense-in-Depth risk monitor system and application for AP1000

    International Nuclear Information System (INIS)

    Ma Zhanguo; Yoshikawa, Hidekazu; Yang Ming; Nakagawa, Takashi

    2017-01-01

    As part of the new risk monitor system, the software for the plant Defense-in-Depth (DiD) risk monitor system was designed based on the state-transition and finite-state machine, and then the knowledge-based software was developed by object-oriented method utilizing the Unified Modeling Language (UML). Currently, there are mainly two functions in the developed plant DiD risk monitor software that are knowledge-base editor which is used to model the system in a hierarchical manner and the interaction simulator that simulates the interactions between the different actors in the model. In this paper, a model for playing its behavior is called an Actor which is modeled at the top level. The passive safety AP1000 power plant was studied and the small-break loss-of-coolant accident (SBLOCA) design basis accident transient is modeled using the plant DiD risk monitor software. Furthermore, the simulation result is shown for the interactions between the actors which are defined in the plant DiD risk monitor system as PLANT actor, OPERATOR actor, and SUPERVISOR actor. This paper shows that it is feasible to model the nuclear power plant knowledge base using the software modeling technique. The software can make the large knowledge base for the nuclear power plant with small effort. (author)

  17. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  18. Early endoscopic realignment of traumatic anterior and posterior urethral disruptions under caudal anaesthesia - a 5-year review.

    Science.gov (United States)

    Olapade-Olaopa, E O; Atalabi, O M; Adekanye, A O; Adebayo, S A; Onawola, K A

    2010-01-01

    We recently described early rigid retrograde endoscopic realignment of the disrupted urethra under caudal anaesthesia in the outpatient setting. This retrospective study was performed to evaluate our medium-term results. A retrospective review of patients who had early rigid retrograde endoscopic realignment of traumatic urethral disruptions in our institution over a 5-year period was done and the relevant data extracted and analyzed. Fourteen acutely ruptured urethras (10 posterior and four anterior) were endoscopically realigned early in the study period. Nine (90%) of the posterior disruptions occurred at bulbo-membranous urethra (distal to the external sphincter mechanism). Thirteen of the ruptured urethras (93%) were successfully realigned (nine posterior and four anterior) and postoperative clean intermittent self-calibration (CIC) was instituted in 10 patients. The mean follow-up period was 36.6 months (range 18-54 months). The mean operating time and the median hospital stay were 22 min (range 8-68 min) and 3 days (range 1-10 days), respectively, and were shorter in patients with injuries of the anterior urethra than those with posterior urethral tears (p < or = 0.0001). Post-realignment, all 13 patients were potent and continent. Two patients required additional procedures (direct vision internal urethrotomy or urethral dilation) and one patient has remained on CIC i.e. a stricture rate of 21%. Early retrograde endoscopic realignment under caudal analgesia is suitable and cost-effective for patients with acute traumatic urethral disruptions and has good medium-term results. In addition, an early postoperative regimen of CIC significantly reduced stricture-formation in our series.

  19. The development of coal-based technologies for Department of Defense facilities: Phase 1 final report. Volume 1: Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Pisupati, S.V. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1997-01-31

    The first phase of a three-phase project investigating the development of coal-based technologies for Department of Defense facilities has been completed. The objectives of the project are to: decrease DOD`s dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase 1 activities were focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. The specific objective in Phase 1 was to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWM or DMC. This was achieved through a project consisting of fundamental, pilot-sale, and demonstration-scale activities investigating coal beneficiation and preparation, and MCWM and DMC combustion performance. In addition, detailed engineering designs and an economic analysis were conducted for a boiler located at the Naval Surface Warfare Center, near Crane, Indiana. Results are reported on MCWM and DMC combustion performance evaluation; engineering design; and cost/economic analysis.

  20. [Ureteral realignment with the rendezvous procedure in complex ureteral injuries - aspects of technique and our experience].

    Science.gov (United States)

    Brandt, Alexander Sascha; von Rundstedt, F-C; Lazica, D A; Roth, S

    2010-07-01

    The rendezvous procedure for re-establishing ureteral continuity after complex ureteral injuries is introduced and we present our experience with this technique. Aspects of the technique are described in a detailed step-by-step instruction using intraoperative radiographs. We evaluated our patient data from 1998 until 2009 for cases in which the rendezvous procedure was attempted. The rendezvous procedure was used in a total of 11 patients. Realignment was successful in 10 cases (90.9 %) and the initial nephrostomy could be removed. In 3 of 7 cases postoperative removal of the JJ ureteric stent was successful. In 7 patients the final surgical ureter reconstruction was performed after a medium period of 7 months. 5 cases of ureteroneocystostomy and 2 cases of reconstruction of the ureter either with colon or ileum segments were accomplished. In 1 patient a permanent maintenance of the DJ ureteral stent was necessary. Ureteral realignment with the rendezvous procedure enables disposition of the ureteral stent in many cases, exclusively antegrade or retrograde procedures failed. By this means nephrostomy could be spared as a temporary or permanent solution and a better chance of restitutio ad integrum could be realised. Georg Thieme Verlag KG Stuttgart * New York.

  1. Early Realignment Versus Delayed Urethroplasty in Management of Pelvic Fracture Urethral Injury: A Meta-analysis.

    Science.gov (United States)

    Firmanto, Rama; Irdam, Gampo A; Wahyudi, Irfan

    2016-04-01

    this meta-analysis study will evaluate the incidence of urethral stricture as a successfull parameter in the management of PFUI through early realignment, compared with delayed urethroplasty. Long-term complications such as erectile dysfunction and incontinence on both methods will also be evaluated. online literature was sourced from Pubmed, Embase, Cochrane, and Google Scholar. The incidence of stricture was evaluated from the entire study group of ER and DU. Stricture of the urethra is diagnosed by the symptoms such as the obstruction that felt by the patient, uroflowmetry examination, and urine residual post micturition that supported by urethrography examination at regular interval. In some cases the incidence of stricture also diagnosed by urethroscopy. The patient is assessed as not having stricture when it is no longer needed to do urethral dilatation or advanced urethrotomy. The rate of incontinence was assessed subjectively from the patient's complaints. The erectile function assessed subjectively; decreased of tumesen's degree, reduced the duration of erection, and penetration failure diagnosed as erection dysfunction. The data were processed as dichotomy data to calculate the risk ratio using Review Manager 5.1. five relevant literatures reviewed in this study. The incidence of urethral strictures are statistically significant lower in early realignment group (RR=0.70, 95% CI 0.50-0.99, Purethroplasty method. Between the two methos, the complications such as erectile dysfunction and incontinence; however, there was no significant difference.

  2. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  3. In Defense of Agent-Based Virtue Ethics | Van Zyl | Philosophical ...

    African Journals Online (AJOL)

    In 'Against agent-based virtue ethics' (2004) Michael Brady rejects agent-based virtue ethics on the grounds that it fails to capture the commonsense distinction between an agent's doing the right thing, and her doing it for the right reason. In his view, the failure to account for this distinction has paradoxical results, making it ...

  4. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  5. Collaborative DDoS Defense using Flow-based Security Event Information

    NARCIS (Netherlands)

    Steinberger, Jessica; Kuhnert, Benjamin; Sperotto, Anna; Baier, Harald; Pras, Aiko

    Over recent years, network-based attacks evolved to the top concerns responsible for network infrastructure and service outages. To counteract such attacks, an approach is to move mitigation from the target network to the networks of Internet Service Providers (ISP). In addition, exchanging threat

  6. Dynamic photoinduced realignment processes in photoresponsive block copolymer films: effects of the chain length and block copolymer architecture.

    Science.gov (United States)

    Sano, Masami; Shan, Feng; Hara, Mitsuo; Nagano, Shusaku; Shinohara, Yuya; Amemiya, Yoshiyuki; Seki, Takahiro

    2015-08-07

    A series of block copolymers composed of an amorphous poly(butyl methacrylate) (PBMA) block connected with an azobenzene (Az)-containing liquid crystalline (PAz) block were synthesized by changing the chain length and polymer architecture. With these block copolymer films, the dynamic realignment process of microphase separated (MPS) cylinder arrays of PBMA in the PAz matrix induced by irradiation with linearly polarized light was studied by UV-visible absorption spectroscopy, and time-resolved grazing incidence small angle X-ray scattering (GI-SAXS) measurements using a synchrotron beam. Unexpectedly, the change in the chain length hardly affected the realignment rate. In contrast, the architecture of the AB-type diblock or the ABA-type triblock essentially altered the realignment feature. The strongly cooperative motion with an induction period before realignment was characteristic only for the diblock copolymer series, and the LPL-induced alignment change immediately started for triblock copolymers and the PAz homopolymer. Additionally, a marked acceleration in the photoinduced dynamic motions was unveiled in comparison with a thermal randomization process.

  7. 76 FR 17841 - Record of Decision (ROD) for the Realignment, Growth, and Stationing of Army Aviation Assets

    Science.gov (United States)

    2011-03-31

    ... requirements and available aviation forces, and also improving training opportunities for aviation and ground... promote more effective training and force management. Existing CABs cannot meet the continuing high demand... units at JBLM with full CAB training capability and benefits when realigned units are added to JBLMs...

  8. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  9. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  10. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  11. Long-term outcome of primary endoscopic realignment for bulbous urethral injuries: risk factors of urethral stricture.

    Science.gov (United States)

    Seo, Ill Young; Lee, Jea Whan; Park, Seung Chol; Rim, Joung Sik

    2012-12-01

    Although endoscopic realignment has been accepted as a standard treatment for urethral injuries, the long-term follow-up data on this procedure are not sufficient. We report the long-term outcome of primary endoscopic realignment in bulbous urethral injuries. Patients with bulbous urethral injuries were treated by primary endoscopic realignment between 1991 and 2005. The operative procedure included suprapubic cystostomy and transurethral catheterization using a guide wire, within 72 hours of injury. The study population included 51 patients with a minimum follow-up duration of 5 years. The most common causes of the injuries were straddle injury from falling down (74.5%), and pelvic bone fracture (7.8%). Gross hematuria was the most common complaint (92.2%). Twenty-three patients (45.1%) had complete urethral injuries. The mean time to operation after the injury was 38.8±43.2 hours. The mean operation time and mean indwelling time of a urethral Foley catheter were 55.5±37.6 minutes and 22.0±11.9 days, respectively. Twenty out of 51 patients (39.2%) were diagnosed with urethral stricture in 89.1±36.6 months after surgery. A multivariate analysis revealed that young age and operation time were independent risk factors for strictures as a complication of urethral realignment (hazard ratio [HR], 6.554, P=0.032; HR, 6.206, P=0.035). Urethral stricture commonly developed as a postoperative complication of primary endoscopic urethral realignment for bulbous urethral injury, especially in young age and long operation time.

  12. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  13. Analysis for Ad Hoc Network Attack-Defense Based on Stochastic Game Model

    Directory of Open Access Journals (Sweden)

    Yuanjie LI

    2014-06-01

    Full Text Available The attack actions analysis for Ad Hoc networks can provide a reference for the design security mechanisms. This paper presents an analysis method of security of Ad Hoc networks based on Stochastic Game Nets (SGN. This method can establish a SGN model of Ad Hoc networks and calculate to get the Nash equilibrium strategy. After transforming the SGN model into a continuous-time Markov Chain (CTMC, the security of Ad Hoc networks can be evaluated and analyzed quantitatively by calculating the stationary probability of CTMC. Finally, the Matlab simulation results show that the probability of successful attack is related to the attack intensity and expected payoffs, but not attack rate.

  14. Shiningbank energy, Rodney, Ontario : natural channel realignment for protection of an oil field battery

    International Nuclear Information System (INIS)

    Hirvonen, J.

    2005-01-01

    The Rodney Unit 1 battery in Ontario has produced Devonian crude oil with some hydrogen sulfide since 1948. Waterflooding was initiated in 1968, and continues today using recycled produced water as a flushing agent. This presentation provided details of recent upgrades which included replacement of all storage tanks and production lines as well as new lines under the Fleming Creek drain. Upgrades of waterflooding injection systems and the reconstruction of a battery tank farm were also conducted, and old infrastructure and tanks were removed. An environmental conditions investigation revealed oil seepage from Fleming Drain Creek bank, as well as creek erosion which threatened the unit battery. Remediation options required addressing environmental issues due to regulations. Experts hired during the investigation included a hydrogeologist; a fluvial geomorphologist; a fisheries biologist and a restoration contractor. The aim of the project was to extract contaminants from the soil and provide site stability through a realignment of the creek. The site was also revegetated following construction. Various design options were outlined and a construction sequence was presented. A post-construction inspection showed that the Rodney Unit 1 Battery was remediated in accordance with Ontario standards. Soil and groundwater quality now meets Ministry of the Environment standards for the site. The realignment of Fleming Creek Drain in the vicinity of the battery has improved functionality of the drain, and reduced the erosive impact on the battery site as well as enhancing the aquatic habitat in the area. It was concluded that industry applications of ecosystem design solutions have improved pipeline crossings, temporary road impacts and erosion threats. Site decommissioning is also expected to be less costly and time-consuming due to the remediation methods used. refs., tabs., figs

  15. Evaluation of early endoscopic realignment of post-traumatic complete posterior urethral rupture

    Directory of Open Access Journals (Sweden)

    Yaser M Abdelsalam

    2013-01-01

    Full Text Available Introduction: to report our experience with 41 patients treated by early endoscopic realignment of complete post-traumatic rupture urethra. Materials and Methods: The study includes patients presented to our institute, between May 2004 and April 2009, with post-traumatic complete posterior urethral disruption. Preoperative retrograde urethrography, voiding cystourethrography and abdominopelvic CT were performed to evaluate the urethral defect length, the bladder neck competence, the prostate position, and the extent of the pelvic hematoma. Within the first week after trauma, antegrade and retrograde urethroscopy were performed to identify both urethral ends and insert urethral catheter. Patients were followed up by pericatheter retrograde urethrogram monthly postoperatively till catheter removal on disappearance of extravasation. Retrograde urethrography, voiding cystourethrography and urethroscopy were performed 1 month after the removal of the catheter. Follow-up abdominal ultrasound and uroflowmetry monthly till 6 months, bimonthly till 1 year, and every 3 months thereafter were encouraged. Urinary continence and postoperative erectile dysfunction were assessed by direct patient interview. Results: Forty one patients in the age group 17-61 years (mean 37.9 were treated. Patients were followed up for 12-36 months (mean 17 months. Complete healing of the urethra occurred in 18 patients (43.9%. Passable urethral stricture developed in 15 patients (36.6%. Complete urethral obstruction occurred in eight patients (19.5%. Conclusions: Early endoscopic realignment for complete posterior urethral rupture is a feasible technique with no or minimal intraoperative complications. The technique is successful as the definitive line of therapy in reasonable number of patients and seems to render further future interventions for inevitable urethral stricture easier.

  16. Military Base Closures: Updated Status of Prior Base Realignments and Closures

    National Research Council Canada - National Science Library

    2005-01-01

    ...) round, questions continue to be raised about the transfer and environmental cleanup of unneeded property arising from the prior four BRAC rounds and their impact on cost and savings and on local economies...

  17. Environmental Assessment: 2005 Base Realignment and Closure Seymour Johnson Air Force Base Goldsboro, North Carolina

    Science.gov (United States)

    2007-07-01

    aquatica), red maple (Acer rubrum), and loblolly pine ( Pinus taeda) are also present. • Coastal Plain Small Stream Swamp: Degraded examples of this...Daily Permit Limit (lbs/hr) Emissions (lbs/hr) (lbs/hr) Emissions (lbs/day) Emissions (lbs/day) (lbs/day) Ethyl Acetate 0 0 481.8 - - -- Methyl Ethyl...Ketone 0.54 1.08 34.1 2.7 5.4 76.2 Methyl Isobutyl Ketone 0.41 0.82 105.6 2.05 4.1 2247.7 Toluene 0.71 1.42 23.8 3.55 7.1 571.4 Xylene 0.33 0.66

  18. Environmental Assessment of 2005 Base Realignment and Closure Actions at Homestead Air Reserve Base, Florida

    Science.gov (United States)

    2007-02-01

    6th Av e Avocado Dr 176th St 160th St 186th St 164th St 18t h A ve 128th St128th St 152nd St 6th Av e 120th St147 th A ve 376th St 137 th A ve 137...attempt to take, capture or kill; possess, offer to or sell, barter, purchase, deliver, or cause to be shipped, exported , imported, transported

  19. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  20. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  1. The role of the California Base Closure Environmental Committee's (CBCEC) Radioactive and Mixed Waste Process Action Team (RMWPAT) in expediting site restoration and reuse

    International Nuclear Information System (INIS)

    Laudon, L.S.

    1994-01-01

    The Base Realignment and Closure Act (BRAC) mandated the closing and transfer of Department of Defense (DoD) properties within specific timeframes. Due to requirements of federal and state laws, closing bases must be environmentally remediated to alleviate threats to human health and the environment upon transfer. Certain barriers such as legislative, regulatory, administrative, and technical issues, have been identified which threaten the timely restoration and transfer of these BRAC properties. The state of California, faced with the scheduled closure or realignment of 26 military bases, recognized the need to establish a base closure environmental committee to address issues affecting the timely cleanup and reuse of DoD properties and promote accelerated restoration. Accordingly, the California Base Closure Environmental Committee (CBCEC) was formed by executive order of Governor Pete Wilson. One of the barriers identified by the CBCEC is the potential contamination of DoD facilities with radioactive materials. As a result of the difficulties encountered in assessing the nature and extent of radioactive contamination at DoD sites in California, the CBCEC formed the Radioactive and Mixed Waste Process Action Team (RMWPAT). The RMWPAT was tasked with ''demystifying'' and working to address issues associated with radioactive contamination

  2. Could the laser tracker AT401 replace digital levelling and "ecartometry" for the smoothing and realignment of the LHC?

    CERN Document Server

    Missiaen, D

    2012-01-01

    The laser tracker AT401 appeared on the market a couple of years ago with a very accurate distance meter, as a matter of fact the one of the Mekometer ME5000, and angular encoders almost as accurate as the ones of the best total stations. For the smoothing and realignment of the LHC components, the Survey team at CERN normally uses digital levelling measurements to determine the vertical position and offsets to a stretched wire measurements, also called “ecartometry”, for the horizontal one. During the last winter technical stop, a measurement of an LHC sector (3km) was realised using these three technologies in order to compare the AT401 capabilities with respect to the others. The paper will present the methodology applied, the data processing, the results obtained and the conclusions drawn for the future LHC realignment campaign which will take place during the long shut-down of 20 months starting at the end of 2012.

  3. “I Didn’t Feel Like I Was a Person Anymore”: Realigning Full Adult Personhood after Ostomy Surgery

    Science.gov (United States)

    Ramirez, Michelle; Altschuler, Andrea; McMullen, Carmit; Grant, Marcia; Hornbrook, Mark; Krouse, Robert

    2016-01-01

    Colorectal cancer (CRC) is the third most common cancer in the United States. For some CRC patients, cancer treatment involves creating a permanent or temporary intestinal ostomy. Having an ostomy often results in complex social and physical concerns—including unpredictable and at times publicly noticeable bowel output. In this article, we discuss findings from 30 in-depth interviews with female CRC survivors with ostomies in the western United States. We highlight how having an ostomy disrupts culturally sanctioned practices of continence that mark the attainment of full-adult personhood. We discuss how survivors reclaim a sense of full personhood after ostomy surgery through a process of realignment that entails both learning how to manage ostomy equipment to conceal bowel activity and reappraising their illness and suffering. We suggest that the anthropological categories of personhood and personhood realignment be incorporated into research and interventions aimed at increasing support among cancer survivors living with bodily impairments. PMID:24782269

  4. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  5. Tensile Mechanical Properties and Dynamic Collagen Fiber Re-Alignment of the Murine Cervix are Dramatically Altered Throughout Pregnancy.

    Science.gov (United States)

    Barnum, Carrie E; Fey, Jennifer L; Weiss, Stephanie N; Barila, Guillermo; Brown, Amy G; Connizzo, Brianne K; Shetye, Snehal S; Elovitz, Michal A; Soslowsky, Louis J

    2017-06-01

    The cervix is a unique organ able to dramatically change its shape and function by serving as a physical barrier for the growing fetus and then undergoing dramatic dilation allowing for delivery of a term infant. As a result, the cervix endures changing mechanical forces from the growing fetus. There is an emerging concept that the cervix may change or remodel "early" in many cases of spontaneous preterm birth (sPTB). However, the mechanical role of the cervix in both normal and preterm birth remains unclear. Therefore, the primary objective of this study was to determine the mechanical and structural responses of murine cervical tissue throughout a normal gestational time course. In this study, both tissue structural and material properties were determined via a quasi-static tensile load-to-failure test, while simultaneously obtaining dynamic collagen fiber re-alignment via cross-polarization imaging. This study demonstrated that the majority of the mechanical properties evaluated decreased at midgestation and not just at term, while collagen fiber re-alignment occurred earlier in the loading curve for cervices at term. This suggests that although structural changes in the cervix occur throughout gestation, the differences in material properties function in combination with collagen fiber re-alignment as mechanical precursors to regulate term gestation. This work lays a foundation for investigating cervical biomechanics and the role of the cervix in preterm birth.

  6. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  7. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  8. Process of Integrating Screening and Detailed Risk-based Modeling Analyses to Ensure Consistent and Scientifically Defensible Results

    International Nuclear Information System (INIS)

    Buck, John W.; McDonald, John P.; Taira, Randal Y.

    2002-01-01

    To support cleanup and closure of these tanks, modeling is performed to understand and predict potential impacts to human health and the environment. Pacific Northwest National Laboratory developed a screening tool for the United States Department of Energy, Office of River Protection that estimates the long-term human health risk, from a strategic planning perspective, posed by potential tank releases to the environment. This tool is being conditioned to more detailed model analyses to ensure consistency between studies and to provide scientific defensibility. Once the conditioning is complete, the system will be used to screen alternative cleanup and closure strategies. The integration of screening and detailed models provides consistent analyses, efficiencies in resources, and positive feedback between the various modeling groups. This approach of conditioning a screening methodology to more detailed analyses provides decision-makers with timely and defensible information and increases confidence in the results on the part of clients, regulators, and stakeholders

  9. Creating a sampling frame for population-based veteran research: Representativeness and overlap of VA and Department of Defense databases

    OpenAIRE

    Donna L. Washington, MD, MPH; Su Sun, MPH; Mark Canning, BA

    2010-01-01

    Most veteran research is conducted in Department of Veterans Affairs (VA) healthcare settings, although most veterans obtain healthcare outside the VA. Our objective was to determine the adequacy and relative contributions of Veterans Health Administration (VHA), Veterans Benefits Administration (VBA), and Department of Defense (DOD) administrative databases for representing the U.S. veteran population, using as an example the creation of a sampling frame for the National Survey of Women Vete...

  10. Estimating Herd Immunity to Amphibian Chytridiomycosis in Madagascar Based on the Defensive Function of Amphibian Skin Bacteria

    OpenAIRE

    Bletz, Molly C.; Myers, Jillian; Woodhams, Douglas C.; Rabemananjara, Falitiana C. E.; Rakotonirina, Angela; Weldon, Che; Edmonds, Devin; Vences, Miguel; Harris, Reid N.

    2017-01-01

    For decades, Amphibians have been globally threatened by the still expanding infectious disease, chytridiomycosis. Madagascar is an amphibian biodiversity hotspot where Batrachochytrium dendrobatidis (Bd) has only recently been detected. While no Bd-associated population declines have been reported, the risk of declines is high when invasive virulent lineages become involved. Cutaneous bacteria contribute to host innate immunity by providing defense against pathogens for numerous animals, inc...

  11. The Relative Importance of Market Power and Efficiency to Profitability in the Defense Sector: A Firm Based Analysis.

    Science.gov (United States)

    1983-12-01

    production contract that follows. Development contracts almost always contain some kind of cost- reimbursement provision (more on contract types later...two major contract types is the cost reimbursement contract. Cost contracts allow the firm to recover all allowable and reasonable costs from __ the...government. As noted earlier, defense firms are . motivated to raise costs when cost reimbur ement contract are used because profits aro usually

  12. 76 FR 6455 - Final Programmatic Environmental Impact Statement (PEIS) for the Growth, Realignment, and...

    Science.gov (United States)

    2011-02-04

    ... alternative, the Army would retain its aviation force structure at its current levels, configurations, and.... The primary environmental issues evaluated include impacts to air quality, soil, airspace, cultural... DEPARTMENT OF DEFENSE Department of the Army Final Programmatic Environmental Impact Statement...

  13. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  14. EDR2 negatively regulates salicylic acid-based defenses and cell death during powdery mildew infections of Arabidopsis thaliana

    Directory of Open Access Journals (Sweden)

    Nishimura Marc

    2007-07-01

    Full Text Available Abstract Background The hypersensitive necrosis response (HR of resistant plants to avirulent pathogens is a form of programmed cell death in which the plant sacrifices a few cells under attack, restricting pathogen growth into adjacent healthy tissues. In spite of the importance of this defense response, relatively little is known about the plant components that execute the cell death program or about its regulation in response to pathogen attack. Results We isolated the edr2-6 mutant, an allele of the previously described edr2 mutants. We found that edr2-6 exhibited an exaggerated chlorosis and necrosis response to attack by three pathogens, two powdery mildew and one downy mildew species, but not in response to abiotic stresses or attack by the bacterial leaf speck pathogen. The chlorosis and necrosis did not spread beyond inoculated sites suggesting that EDR2 limits the initiation of cell death rather than its spread. The pathogen-induced chlorosis and necrosis of edr2-6 was correlated with a stimulation of the salicylic acid defense pathway and was suppressed in mutants deficient in salicylic acid signaling. EDR2 encodes a novel protein with a pleckstrin homology and a StAR transfer (START domain as well as a plant-specific domain of unknown function, DUF1336. The pleckstrin homology domain binds to phosphatidylinositol-4-phosphate in vitro and an EDR2:HA:GFP protein localizes to endoplasmic reticulum, plasma membrane and endosomes. Conclusion EDR2 acts as a negative regulator of cell death, specifically the cell death elicited by pathogen attack and mediated by the salicylic acid defense pathway. Phosphatidylinositol-4-phosphate may have a role in limiting cell death via its effect on EDR2. This role in cell death may be indirect, by helping to target EDR2 to the appropriate membrane, or it may play a more direct role.

  15. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  16. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  17. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  18. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  19. Environmental Impact Statement. Comprehensive Base Realignment/Closure And Fort Belvoir Development.

    Science.gov (United States)

    1991-08-01

    structural and cosmetic repairs and upgrades. The process is scheduled in phases and should be completed in fiscal year 1997. Figures 2-39 through 2-48...County Heritage Resources. The Belvoir ruins have been stabilized to preserve them, this having been begun in the late 1960s, and some cosmetic ...Data Center. Washington National Airport, DC. Oxley, D.J., M.B. Fenton , and G.R. Carmody. 1974. The Effects of Roads on Populations of Small Mammals. J

  20. Comprehensive Base Realignment/Closure and Fort Belvoir Development: Environmental Impact Statement

    Science.gov (United States)

    1991-08-01

    involve structural and cosmetic repairs and upgrades. The process is scheduled in phases and should be completed in fiscal year 1997. Figures 2-39...begun in the late 1960s, and some cosmetic landscaping, path construction, and placing of information signs has been done around the site...Data Center. Washington National Airport, DC. i Oxley, D.J., M.B. Fenton , and G.R. Carmody. 1974. The Effects of Roads on Populations of Small Mammals

  1. Base Realignment and Closure (BRAC) Cleanup Plan, Ford Ord, Monterey, California

    Science.gov (United States)

    1994-03-25

    2,036.39 1 10 Maria Antonia Field 563.19 1 11 Stephen Joseph Field 1,018.02 1 April 1944 Key: I = Undocumented o45.sj Fort Ord, California - 25 March 1994...geophysical anomalies Further investigation of canal containoc .etroleum hydrocarbons discharge area which depending on and vanous organic compounds...detected at various areas. Concentration below TPH cleanup standard. Canal discharge area soil contained Pb, Sb, and Cr at concentration of concern. For

  2. Environmental Impact Statement. Preliminary Draft. Realignment of Cannon Air Force Base, Curry County, New Mexico

    Science.gov (United States)

    1989-12-15

    Park are in the center of the lower third of i the MOA. Also under the MOA is the Capulin Volcano National Monument in the upper northwest and Clayton...Park, Capulin Volcano National Monument, a ranch near Quay and the village of House, New Mexico, near the Melrose Range. The Bell Ranch Complex is...is a 1 nm avoidance area around Mosquero and 2 nm area around Capulin Volcano National Monument, Bell Ranch, Quay, Kenton State Park, 2 specified

  3. Long-billed curlews on the Yakima Training Center: Information for base realignment

    Energy Technology Data Exchange (ETDEWEB)

    Hand, K.D.; Cadwell, L.L.; Eberhardt, L.E.

    1994-02-01

    This report summarizes and discusses the results obtained during 1992 from the study of long-billed curlews on the Yakima Training Center (YTC), which Pacific Northwest Laboratory conducted for the US Department of the Army. This study was initiated to provide basic ecological information on YTC long-billed curlews (Numenius americanus). The long-billed curlew is a relatively common spring and summer resident on the YTC. However, other than casual observations, very little is known about the distribution, density, reproductive success, and habitat requirements for this species on the YTC. Until recently the long-billed curlew was a US Fish and Wildlife Service candidate for listing as threatened or endangered; however, on November 21, 1991 it was down-listed to Class IIIc. The Washington Department of Wildlife lists the long-billed curlew as a ``species of special concern.`` Specific objectives of this study were to (1) locate nesting areas, (2) locate brood-rearing areas, (3) evaluate habitat requirements, (4) determine diet, (5) evaluate response to troop activities, (6) evaluate the impact of livestock grazing, (7) estimate the population size, and (8) estimate recruitment rates. Six curlews (four females and two males) were captured and fitted with radio transmitters. These birds were relocated to obtain nesting, habitat use, and feeding information. Road surveys conducted over most of the YTC provided information on the bird`s general distribution, habitat requirements, and nesting and brood-rearing areas.

  4. 75 FR 78946 - Revitalizing Base Closure Communities and Addressing Impacts of Realignment

    Science.gov (United States)

    2010-12-17

    ... economy; productivity; competition; jobs; the environment; public health or safety; or State, local, or... job generation. (6) Current local and regional real estate market conditions, including market demand...) was not structured to deal with the unique challenges of assisting community economic recovery and job...

  5. 76 FR 70878 - Revitalizing Base Closure Communities and Addressing Impacts of Realignment

    Science.gov (United States)

    2011-11-16

    ..., particularly the increased flexibility and promotion of community reuse and redevelopment efforts. Following is... of the economy; productivity; competition; jobs; the environment; public health or safety; or State...

  6. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  7. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  8. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  10. Empirically based Suggested Insights into the Concept of False-Self Defense: Contributions From a Study on Normalization of Children With Disabilities.

    Science.gov (United States)

    Eichengreen, Adva; Hoofien, Dan; Bachar, Eytan

    2016-02-01

    The concept of the false self has been used widely in psychoanalytic theory and practice but seldom in empirical research. In this empirically based study, elevated features of false-self defense were hypothetically associated with risk factors attendant on processes of rehabilitation and integration of children with disabilities, processes that encourage adaptation of the child to the able-bodied environment. Self-report questionnaires and in-depth interviews were conducted with 88 deaf and hard-of-hearing students and a comparison group of 88 hearing counterparts. Results demonstrate that despite the important contribution of rehabilitation and integration to the well-being of these children, these efforts may put the child at risk of increased use of the false-self defense. The empirical findings suggest two general theoretical conclusions: (1) The Winnicottian concept of the environment, usually confined to the parent-child relationship, can be understood more broadly as including cultural, social, and rehabilitational variables that both influence the parent-child relationship and operate independently of it. (2) The monolithic conceptualization of the false self may be more accurately unpacked to reveal two distinct subtypes: the compliant and the split false self. © 2016 by the American Psychoanalytic Association.

  11. In Defense of the Southern Borders of Russia and Allied Countries (the Russian Foreign Military Bases on the Black Sea-Caspian Arc of Tension

    Directory of Open Access Journals (Sweden)

    Vladimir I. Afanasenko

    2016-12-01

    Full Text Available December 25, 2014, President Vladimir Putin approved a new version of the military doctrine of the Russian Federation, which reflects manifested threat to Russia and its allies because the situation in Ukraine, especially in its south-east, in the Donets Basin; the events in Syria, Iraq, and Afghanistan; issues of interaction and cooperation with Abkhazia, South Ossetia, with the CSTO member countries, the BRICS. An important role in the strengthening of the southern borders of the security operate military bases and facilities of the Ministry of Defense of the Russian Federation, located in Transnistria, the Caucasus, Syria and Central Asia. Characteristics of these bases and their value in the Black Sea-Caspian arc of tension given in this article.

  12. "I didn't feel like I was a person anymore": realigning full adult personhood after ostomy surgery.

    Science.gov (United States)

    Ramirez, Michelle; Altschuler, Andrea; McMullen, Carmit; Grant, Marcia; Hornbrook, Mark; Krouse, Robert

    2014-06-01

    Colorectal cancer (CRC) is the third most common cancer in the United States. For some CRC patients, cancer treatment involves creating a permanent or temporary intestinal ostomy. Having an ostomy often results in complex social and physical concerns-including unpredictable and at times publicly noticeable bowel output. In this article, we discuss findings from 30 in-depth interviews with female CRC survivors with ostomies in the western United States. We highlight how having an ostomy disrupts culturally sanctioned practices of continence that mark the attainment of full-adult personhood. We discuss how survivors reclaim a sense of full personhood after ostomy surgery through a process of realignment that entails both learning how to manage ostomy equipment to conceal bowel activity and reappraising their illness and suffering. We suggest that the anthropological categories of personhood and personhood realignment be incorporated into research and interventions aimed at increasing support among cancer survivors living with bodily impairments. © 2014 by the American Anthropological Association.

  13. Efficiency of Trichome-Based Plant Defense in Phaseolus vulgaris Depends on Insect Behavior, Plant Ontogeny, and Structure

    Directory of Open Access Journals (Sweden)

    Zhenlong Xing

    2017-11-01

    Full Text Available Plant trichomes often function as physical barriers in preventing arthropod feeding and oviposition. Even though insects are frequently reported being entrapped and killed by trichome traps, the actual trapping behavior has not yet been described in detail. Capture experiments showed that capture efficiency during the plant's vegetative stage was considerably higher than in the fruiting and cotyledon stages. The ventral surface of the leaf was more effective in trapping flies than other parts of the plant. Capture-events monitoring showed that the mouthparts, legs, and ovipositor of Liriomyza trifolii adults are the body parts involved in entrapment by surface trichomes on Phaseolus vulgaris plants, and subsequently, deter their ability to feed, walk, and oviposit. Of the three main body parts normally affected, mouthparts was found to be the body part most susceptible to the trichomes. Entrapments were most often caused by landing, followed by puncturing or feeding, and occasionally by walking or fighting. Using scanning electron microscopy (SEM and optical microscopy, we determined the susceptible positions of each body part and found that the flies were all trapped by hooked trichomes. This study revealed the process by which leafminer flies are entrapped by surface trichomes of the host plant and evaluated the capture efficiency. The results will contribute to our understanding of physical defenses against herbivores.

  14. Multi-modal low cost mobile indoor surveillance system on the Robust Artificial Intelligence-based Defense Electro Robot (RAIDER)

    Science.gov (United States)

    Nair, Binu M.; Diskin, Yakov; Asari, Vijayan K.

    2012-10-01

    We present an autonomous system capable of performing security check routines. The surveillance machine, the Clearpath Husky robotic platform, is equipped with three IP cameras with different orientations for the surveillance tasks of face recognition, human activity recognition, autonomous navigation and 3D reconstruction of its environment. Combining the computer vision algorithms onto a robotic machine has given birth to the Robust Artificial Intelligencebased Defense Electro-Robot (RAIDER). The end purpose of the RAIDER is to conduct a patrolling routine on a single floor of a building several times a day. As the RAIDER travels down the corridors off-line algorithms use two of the RAIDER's side mounted cameras to perform a 3D reconstruction from monocular vision technique that updates a 3D model to the most current state of the indoor environment. Using frames from the front mounted camera, positioned at the human eye level, the system performs face recognition with real time training of unknown subjects. Human activity recognition algorithm will also be implemented in which each detected person is assigned to a set of action classes picked to classify ordinary and harmful student activities in a hallway setting.The system is designed to detect changes and irregularities within an environment as well as familiarize with regular faces and actions to distinguish potentially dangerous behavior. In this paper, we present the various algorithms and their modifications which when implemented on the RAIDER serves the purpose of indoor surveillance.

  15. Creating a sampling frame for population-based veteran research: representativeness and overlap of VA and Department of Defense databases.

    Science.gov (United States)

    Washington, Donna L; Sun, Su; Canning, Mark

    2010-01-01

    Most veteran research is conducted in Department of Veterans Affairs (VA) healthcare settings, although most veterans obtain healthcare outside the VA. Our objective was to determine the adequacy and relative contributions of Veterans Health Administration (VHA), Veterans Benefits Administration (VBA), and Department of Defense (DOD) administrative databases for representing the U.S. veteran population, using as an example the creation of a sampling frame for the National Survey of Women Veterans. In 2008, we merged the VHA, VBA, and DOD databases. We identified the number of unique records both overall and from each database. The combined databases yielded 925,946 unique records, representing 51% of the 1,802,000 U.S. women veteran population. The DOD database included 30% of the population (with 8% overlap with other databases). The VHA enrollment database contributed an additional 20% unique women veterans (with 6% overlap with VBA databases). VBA databases contributed an additional 2% unique women veterans (beyond 10% overlap with other databases). Use of VBA and DOD databases substantially expands access to the population of veterans beyond those in VHA databases, regardless of VA use. Adoption of these additional databases would enhance the value and generalizability of a wide range of studies of both male and female veterans.

  16. A Framework for Seismic Design of Items in Safety-Critical Facilities for Implementing a Risk-Informed Defense-in-Depth-Based Concept

    Directory of Open Access Journals (Sweden)

    Tatsuya Itoi

    2017-05-01

    Full Text Available Recently, especially after the 2011 off the Pacific coast of Tohoku earthquake and the Fukushima Daiichi nuclear power plant accident, the need for treating residual risks and cliff-edge effects in safety-critical facilities has been widely recognized as an extremely important issue. In this article, the sophistication of seismic designs in safety-critical facilities is discussed from the viewpoint of mitigating the consequences of accidents, such as the avoidance of cliff-edge effects. For this purpose, the implementation of a risk-informed defense-in-depth-based framework is proposed in this study. A basic framework that utilizes diversity in the dynamic characteristics of items and also provides additional seismic margin to items important for safety when needed is proposed to prevent common cause failure and to avoid cliff-edge effects as far as practicable. The proposed method is demonstrated to be effective using an example calculation.

  17. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  18. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  19. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  20. AMI Go Home - Assessing the Realignment of U.S. Army Forces in Europe

    Science.gov (United States)

    2005-03-18

    a major U.S. investment.37 According to Stuart Drury of the Joint Chiefs of Staff, deploying would be much more difficult from Eastern Europe...35 Ibid, xvi. 36 Ibid,12. 37 Ibid, 29. 38 Stuart P. Drury , “The Argument Against Relocating U.S. Forces in Europe,” National Defense University...Europe in the 21st Century,” Parameters (Autumn 2004): 61. 53 Colin Powell, “A Strategy of Partnership,” Foreign Affairs (Jan/Feb 2004): 22. 54 Michael

  1. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  2. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  3. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  4. Corporate realignments in the natural gas industry: does the North American experience foretell the future for the European Union?

    Energy Technology Data Exchange (ETDEWEB)

    Rutledge, I.; Wright, Ph. [Sheffield Univ., Energy Studies Programme (United Kingdom); Wright, Ph. [Montpellier-1 Univ., CREDEN-LASER, 34 (France)

    2000-09-01

    This paper seeks to explore the extent to which the corporate realignments which have occurred in the North American Natural Gas Industry during a now relatively lengthy experience with liberalization involving a large number of players, will be imitated in the future by European Union countries other than the UK (which is of course already long-embarked along the path of Anglo-Saxon liberalization). The paper first of all catalogues the North American experience, drawing on company performance data assembled by the authors over the last decade (Rutledge and Wright, 1993, 1995, 1997, 1999, 2000). Secondly, this empirical exploration gives way to theoretical speculation: are there elements of the North American experience for which explanatory generalizations are possible? Thirdly, these empirical and theoretical insights are employed to identify and explore actual and potential differences in the corporate evolution of the European Union natural gas industry. (authors)

  5. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  6. The role of capital realignment versus in situ stabilization for the treatment of slipped capital femoral epiphysis.

    Science.gov (United States)

    Souder, Christopher D; Bomar, James D; Wenger, Dennis R

    2014-12-01

    Slipped capital femoral epiphysis (SCFE) can be treated by a variety of methods with the traditional method of in situ pin fixation being most commonly used. More recently, the Modified Dunn (Mod. Dunn) procedure consisting of capital realignment has been popularized as a treatment method for SCFE, particularly for more severe cases. Over the last 5 years, our institution has selectively used this method for more complex cases. The purpose of this article is to evaluate the differences between these 2 treatment methods in terms of avascular necrosis (AVN) rate, reoperation rate, and complication rate. Eighty-eight hips that were surgically treated for SCFE between July 2004 and June 2012 met our inclusion criteria. The in situ fixation group included 71 hips, whereas 17 hips were anatomically reduced with the Mod. Dunn procedure. Loder classification, severity, acuity, complication rate, and reoperation rate were determined for the 2 cohorts. The χ analysis was performed to evaluate the relationship between the treatment method and outcome. As expected, stable slips did well with in situ pinning with no cases of AVN, even in more severe slips. Ten stable slips were treated with the Mod. Dunn approach and 2 (20%) developed AVN. Unstable slips were more difficult to treat with 3 of the 7 hips stabilized in situ developing AVN (43%). Two of the 7 unstable slips treated by the Mod. Dunn procedure developed AVN (29%). The other outcomes studied (reoperation rate and complication rate) were not significantly related to the surgical treatment method (P = 0.732 and 0.261, respectively). In situ pinning remains a safe and predictable method for treatment of stable SCFE with no AVN noted, even in severe slips. Attempts to anatomically reduce stable slips led to severe AVN in 20% of cases, thus this treatment approach should be considered with caution. Treatment of unstable slips remains problematic with high AVN rates noted whether treated by in situ fixation or capital

  7. Using Genome-Editing Technologies to Mitigate Antimicrobial Resistance [CRISPR-Based Antibacterials: Transforming Bacterial Defense into Offense

    Energy Technology Data Exchange (ETDEWEB)

    Greene, Adrienne C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2018-02-07

    The development of antimicrobial-resistant (AMR) bacteria poses a serious worldwide health concern. CRISPR-based antibacterials, however, are a novel and adaptable method for building an arsenal of antibacterials potentially capable of targeting any pathogenic bacteria.

  8. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  9. Defense Management: Further Analysis Needed to Identify Guam’s Public Infrastructure Requirements and Costs for DOD’s Realignment Plan

    Science.gov (United States)

    2013-12-01

    47U.S. Department of the Interior Office of Inspector General, Tax Collection Activities Government of Guam: Revitalized Tax...A-11: Planning, Budgeting, and Acquisition of Capital Assets, app . 8 (ver. 3.0 (July 2013). 62GAO-09-3SP, pp. i and 182. DOD’s Cost Estimate to...Capital Assets, app . 8 (V 3.0 July 2013). According to our cost estimating guide, a reliable cost estimate is critical to successfully 64GAO-09-3SP

  10. Acquisition of a Surface Plasmon Resonance Imager, Digital Microscope, and Peristaltic Pumps for Defense-Based Research

    Science.gov (United States)

    2016-05-05

    drinking water supplies. Studies on Developing a Acetylcholinesterase (AChE) Assay In this project two MCE-SPR platforms with multiple analysis...agreement who graduated during this period and will receive scholarships or fellowships for further studies in science, mathematics, engineering or... electrochemical separation. Using electric fields, molecules are separated based on their different charges and molecular masses. Instrumental design for CE

  11. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  12. Siting Report for Theater Missile Defense Mid-Range Test Launch Complex at Ft. Wingate Depot Activity, NM: Based on Sit Survey, 14-18 February 1994

    National Research Council Canada - National Science Library

    1994-01-01

    This study is provided to assess the capability of Ft. Wingate Depot Activity to act as a Ballistic Missile Defense Test Support Complex for the launch of target missiles toward White Sands Missile Range...

  13. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  14. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  15. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  16. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  17. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  18. The development of coal-based technologies for Department of Defense facilities. Semi-annual report, March 28, 1996--September 27, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scarone, A.W. [and others

    1996-12-13

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. Phase I was completed on November 1, 1995. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included continuing bench-scale tests to identify an NO{sub x} reduction catalyst which is appropriate for industrial boiler applications. In addition, installation of a ceramic filtering device on the demonstration boiler started. Also, a sodium bicarbonate duct injection system was procured for installation on the demonstration boiler. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations,surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  19. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, March 28, 1997--September 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Morrison, J.L. [and others

    1998-01-06

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Phase I was completed on November 1, 1995. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included performing pilot-scale air toxics (i.e., trace elements and volatile organic compounds) testing and evaluating a ceramic filtering device on the demonstration boiler. Also, a sodium bicarbonate duct injection system was installed on the demonstration boiler. An economic analysis was conducted which investigated the benefits of decreased dependence on imported oil by using new coal combustion technologies. Work related to coal preparation and utilization was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, and surface-based separation processes. The evaluation of deeply-cleaned coal as boiler fuel included receiving three cleaned coals from Cyprus-Amax.

  20. Moderate Morality: An Interest-Based Contractarian Defense & its Applied Result in the Political Ethics of International Relations

    Directory of Open Access Journals (Sweden)

    Shirzad Peik Herfeh

    2017-12-01

    Full Text Available What is morality’s scope? Should all our actions be evaluated morally? Is it necessary to be causally responsible for harm to have a responsibility to reduce it? Is there a morally relevant distinction between those consequences of our actions which we intend or do and those which we foresee but do not intend or allow but do not do? Is helping others a matter of supererogation (i.e. beyond the call of moral duty or a matter of obligation? These are crucial questions that need to be debated in normative and applied ethics. However, they were not raised seriously and independently until the last decades of the 20th century. There are several answers to these questions. This paper defends the answers of an approach which is called “moderate morality.” So, at first, it defines “moderate morality,” and pays heed to the views of its opponents, including Peter Singer, Shelly Kagan, and Peter Unger. Then, it tries to defend “moderate morality” based on “interest-based contractarianism.” Finally, it examines “its result in applied ethics” and tries to find a reasonable answer to a crucial question in the “political ethics of international relations” in our globalized era: What moral obligation, if any, do we have individually and as a society toward the people whose basic human rights are being violated not only in our country but also all over the world?

  1. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  2. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  3. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  4. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  5. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, September 28, 1993--March 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R.; Shepard, J.F.; Scaroni, A.W.; Hogg, R.; Chander, S.; Cho, H.; Ityokumbul, M.T.; Klima, M.S. [and others

    1994-11-30

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. To achieve the objectives of the program, a team of researchers was assembled. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFS) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phases I and II are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  6. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  7. Historical storage budgets of organic carbon, nutrient and contaminant elements in saltmarsh sediments: Biogeochemical context for managed realignment, Humber Estuary, UK

    International Nuclear Information System (INIS)

    Andrews, J.E.; Samways, G.; Shimmield, G.B.

    2008-01-01

    Biogeochemical data from Welwick marsh (Humber Estuary, UK), an actively accreting saltmarsh, provides a decadal-centennial-scale natural analogue for likely future biogeochemical storage effects of managed realignment sites accreting either intertidal muds or saltmarsh. Marsh topographic profiles and progradation history from aerial photographs were combined with 137 Cs and niobium contamination history to establish and verify chronology and sediment mass accumulation. These data, combined with down-core measurements of particulate organic carbon (C org ), organic nitrogen (N org ), particle reactive phosphorus and selected contaminant metal (Zn, Pb, Cu, As and Nb) contents were then used to calculate sediment and chemical storage terms and to quantify changes in these over time. These data are used to help predict likely future biogeochemical storage changes at managed realignment sites in the estuary. The net effect of returning some 26 km 2 of reclaimed land to intertidal environments now (about 25% of the maximum possible realignment storage identified for the estuary) could result in the storage of some 40,000 tonnes a -1 of sediment which would also bury about 800 tonnes a -1 of C org and 40 tonnes a -1 of N org . Particulate contaminant P burial would be around 25 tonnes a -1 along with ∼ 6 tonnes a -1 contaminant Zn, 3 tonnes a -1 contaminant Pb, and ∼ 1 tonnes a -1 contaminant As and Cu. The study also shows that reclamation activities in the outer estuary since the mid-1700s has prevented, in total, the deposition of about 10 million tonnes of sediment, along with 320,000 tonnes of C org and 16,000 tonnes of N org . The study provides a mid-1990s baseline against which future measurements at the site can determine changes in burial fluxes and improvement or deterioration in contaminant metal contents of the sediments. The data are directly relevant for local managed realignment sites but also broadly indicative for sites generally on the European

  8. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  9. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, September 28, 1996--March 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Pisupati, S.V. [and others

    1997-07-22

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. Preliminary pilot-scale NO{sub x} reduction catalyst tests were conducted when firing natural gas in Penn State`s down-fired combustor. This is the first step in the scale-up of bench-scale results obtained in Phase II to the demonstration boiler scale when firing coal. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio. The evaluation of deeply-cleaned coal as boiler fuel included installing a ribbon mixer into Penn State`s micronized coal-water mixture circuit for reentraining filter cake. In addition, three cleaned coals were received from CQ Inc. and three cleaned coals were received from Cyprus-Amax.

  10. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1995--September 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Hatcher, P.; Knicker, H. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-21

    The U.S. Department of Defense (DOD), through the Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Mixture Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, preparation of the Phase I final report continued. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included initiating a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work started on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filter device will be used to demonstrate a more compact and efficient filtering device for retrofit applications. Coal preparation and utilization activities, and the economic analysis were completed and work focused on preparing the final report. Work on Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on selecting incentives for commercialization of coal using technologies, community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  11. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  12. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  13. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  14. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  15. Natural history-driven, plant-mediated RNAi-based study reveals CYP6B46's role in a nicotine-mediated antipredator herbivore defense.

    Science.gov (United States)

    Kumar, Pavan; Pandit, Sagar S; Steppuhn, Anke; Baldwin, Ian T

    2014-01-28

    Manduca sexta (Ms) larvae are known to efficiently excrete ingested nicotine when feeding on their nicotine-producing native hostplant, Nicotiana attenuata. Here we describe how ingested nicotine is co-opted for larval defense by a unique mechanism. Plant-mediated RNAi was used to silence a midgut-expressed, nicotine-induced cytochrome P450 6B46 (CYP6B46) in larvae consuming transgenic N. attenuata plants producing MsCYP6B46 dsRNA. These and transgenic nicotine-deficient plants were planted into native habitats to study the phenotypes of larvae feeding on these plants and the behavior of their predators. The attack-behavior of a native wolf spider (Camptocosa parallela), a major nocturnal predator, provided the key to understanding MsCYP6B46's function: spiders clearly preferred CYP6B46-silenced larvae, just as they had preferred larvae fed nicotine-deficient plants. MsCYP6B46 redirects a small amount (0.65%) of ingested nicotine from the midgut into hemolymph, from which nicotine is exhaled through the spiracles as an antispider signal. CYP6B46-silenced larvae were more susceptible to spider-attack because they exhaled less nicotine because of lower hemolymph nicotine concentrations. CYP6B46-silenced larvae were impaired in distributing ingested nicotine from midgut to hemolymph, but not in the clearing of hemolymph nicotine or in the exhalation of nicotine from hemolymph. MsCYP6B46 could be a component of a previously hypothesized pump that converts nicotine to a short-lived, transportable, metabolite. Other predators, big-eyed bugs, and antlion larvae were insensitive to this defense. Thus, chemical defenses, too toxic to sequester, can be repurposed for defensive functions through respiration as a form of defensive halitosis, and predators can assist the functional elucidation of herbivore genes.

  16. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  17. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  18. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  19. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  20. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  1. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  2. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  3. Primary Realignment for Pelvic Fracture Urethral Injury Is Associated With Prolonged Time to Urethroplasty and Increased Stenosis Complexity.

    Science.gov (United States)

    Horiguchi, Akio; Shinchi, Masayuki; Masunaga, Ayako; Okubo, Kazuki; Kawamura, Kazuki; Ojima, Kenichiro; Ito, Keiichi; Asano, Tomohiko; Azuma, Ryuichi

    2017-10-01

    To compare the clinical courses of patients with pelvic fracture urethral injury (PFUI) according to initial management strategy. We reviewed the clinical courses of 63 patients with PFUI who were initially treated elsewhere and underwent delayed anastomotic urethroplasty by a single surgeon between 2008 and 2015. Patients were grouped according to their initial treatment: by suprapubic tube placement alone (49 patients, SPT group) or primary realignment (14 patients, PR group). Time to urethroplasty was defined as the period between injury and delayed urethroplasty. Clinical data regarding the status of urethral stenosis, urethroplasty procedure, and treatment outcome were analyzed. The mean time to urethroplasty in the PR group was about 3 times than that in the SPT group (133 months vs 47 months, P = .035). Fifty percent of the PR group (7 of 14) had a history of repeated urethrotomy or dilation before referral, a percentage significantly higher than that of the SPT group (20.4%, 10 of 49, P = .027). The percentage of patients having a false passage and iatrogenic scar was significantly higher in the PR group (42.9% vs 16.3%, P = .035), but there was no significant between-group difference in urethral stenosis length, operative time, operative blood loss, or the percentage of patients requiring inferior pubectomy or urethral rerouting. PR does not facilitate delayed urethroplasty, and patients who undergo PR are at high risk of having a more complicated stenosis and longer time to urethroplasty, presumably because of repeated transurethral procedures. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. A predictive factor for acquiring an ideal lower limb realignment after opening-wedge high tibial osteotomy.

    Science.gov (United States)

    Bito, Haruhiko; Takeuchi, Ryohei; Kumagai, Ken; Aratake, Masato; Saito, Izumi; Hayashi, Riku; Sasaki, Yohei; Aota, Yoichi; Saito, Tomoyuki

    2009-04-01

    Obtaining a correct postoperative limb alignment is an important factor in achieving a successful clinical outcome after an opening-wedge high tibial osteotomy (OWHTO). To better predict some of the aspects that impact upon the clinical outcomes following this procedure, including postoperative correction loss and over correction, we examined the changes in the frontal plane of the lower limb in a cohort of patients who had undergone OWHTO using radiography. Forty-two knees from 33 patients (23 cases of osteoarthritis and 10 of osteonecrosis) underwent a valgus realignment OWHTO procedure and were radiographically assessed for changes that occurred pre- and post-surgery. The mean femorotibial angle (FTA) was found to be 182.1 +/- 2.0 degrees (12 +/- 2.0 anatomical varus angulation) preoperatively and 169.6 +/- 2.4 degrees (10.4 +/- 2.4 anatomical valgus angulation) postoperatively. These measurements thus revealed significant changes in the weight bearing line ratio (WBL), femoral axis angle (FA), tibial axis angle (TA), tibia plateau angle (TP), tibia vara angle (TV) and talar tilt angle (TT) following OWHTO. In contrast, no significant change was found in the weight bearing line angle (WBLA) after these treatments. To assess the relationship between the correction angle and these indexes, 42 knees were divided into the following three groups according to the postoperative FTA; a normal correction group (168 degrees FTA FTA FTA > 172 degrees ). There were significant differences in the delta angle [DA; calculated as (pre FTA - post FTA) - (pre TV - post TV)] among each group of patients. Our results thus indicate a negative correlation between the DA and preoperative TA (R(2) = 0.148, p < 0.05). Hence, given that the correction errors in our patients appear to negatively correlate with the preoperative TA, postoperative malalignments are likely to be predictable prior to surgery.

  5. 3D Surface Realignment Tracking for Medical Imaging: A Phantom Study with PET Motion Correction

    DEFF Research Database (Denmark)

    Olesen, Oline Vinter; Paulsen, Rasmus Reinhold; Jensen, Rasmus Ramsbøl

    2011-01-01

    We present a complete system for motion correction in high resolution brain positron emission tomography (PET) imaging. It is based on a compact structured light scanner mounted above the patient tunnel of the Siemens High Resolution Research Tomograph PET brain scanner. The structured light system...... is equipped with a near infrared diode and uses phase-shift interferometry to compute 3D representations of the forehead of the patient. These 3D point clouds are progressively aligned to a reference surface and thereby giving the head pose changes. The estimated pose changes are used to reposition a sequence...... of recon- structed PET frames. To align the structured light system with the PET coordinate system a novel registration algorithm based on the PET trans- mission scan and an initial surface has been developed. The performance of the complete setup has been evaluated using a custom made phantom based...

  6. Outsourcing of Defense Supply Center, Columbus, Bus and Taxi Service Operations

    National Research Council Canada - National Science Library

    Granetto, Paul

    1999-01-01

    Introduction. We performed the audit in response to allegations to the Defense Hotline that the Defense Supply Center, Columbus, outsourcing study for bus and taxi service operations was based on incorrect methodology...

  7. Developing a national food defense guideline based on a vulnerability assessment of intentional food contamination in Japanese food factories using the CARVER+Shock vulnerability assessment tool.

    Science.gov (United States)

    Kanagawa, Yoshiyuki; Akahane, Manabu; Hasegawa, Atsushi; Yamaguchi, Kentaro; Onitake, Kazuo; Takaya, Satoshi; Yamamoto, Shigeki; Imamura, Tomoaki

    2014-12-01

    The awareness of food terrorism has increased following the September 11, 2001 terrorist attacks in New York City, United States, and many measures and policies dealing with this issue have been established worldwide. Suspected deliberate food-poisoning crimes have occurred in Japan, although they are not regarded as acts of food terrorism. One area of concern is that the small- to medium-sized companies that dominate Japan's food industry are extremely vulnerable to deliberate food poisoning. We conducted a literature research on food defense measures undertaken by the World Health Organization and in the United States and Europe. Using the Carver+Shock vulnerability assessment tool, eight food factories and related facilities in Japan were evaluated and we found the level of awareness of food defense to be low and the measures inappropriate. On the basis of this evaluation, we developed a set of guidelines that Japanese food companies can use to help develop their food defense strategies and to serve as a reference in considering specific measures.

  8. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  9. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  10. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  11. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  12. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  13. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  14. Re-alignment: It is the tunnel floor which moves, isn't it?

    International Nuclear Information System (INIS)

    Pitthan, R.

    1995-10-01

    It is shown that on the months to years time scale, accelerator tunnels built in compacted geological strata exhibit a movement of the floor systematic (unidirectional) in each point. Attempts to characterize the movement through one global number (a deviation) based on a random model are conceptionally wrong and can only lead to erroneous design decisions for future accelerators. In the extrapolation limit, differences are especially pronounced for differential movements in the case of short (days) time spans, and for accumulated movements in the case of long (years) time spans

  15. Realigning Shared Governance With Magnet® and the Organization's Operating System to Achieve Clinical Excellence.

    Science.gov (United States)

    Moreno, Janette V; Girard, Anita S; Foad, Wendy

    2018-03-01

    In 2012, an academic medical center successfully overhauled a 15-year-old shared governance to align 6 house-wide and 30 unit-based councils with the new Magnet Recognition Program® and the organization's operating system, using the processes of LEAN methodology. The redesign improved cross-council communication structures, facilitated effective shared decision-making processes, increased staff engagement, and improved clinical outcomes. The innovative structural and process elements of the new model are replicable in other health institutions.

  16. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  17. National health information infrastructure model: a milestone for health information management education realignment.

    Science.gov (United States)

    Meidani, Zahra; Sadoughi, Farhnaz; Ahmadi, Maryam; Maleki, Mohammad Reza; Zohoor, Alireza; Saddik, Basema

    2012-01-01

    Challenges and drawbacks of the health information management (HIM) curriculum at the Master's degree were examined, including lack of well-established computing sciences and inadequacy to give rise to specific competencies. Information management was condensed to the hospital setting to intensify the indispensability of a well-organized educational campaign. The healthcare information dimensions of a national health information infrastructure (NHII) model present novel requirements for HIM education. Articles related to challenges and barriers to adoption of the personal health record (PHR), the core component of personal health dimension of an NHII, were searched through sources including Science Direct, ProQuest, and PubMed. Through a literature review, concerns about the PHR that are associated with HIM functions and responsibilities were extracted. In the community/public health dimension of the NHII the main components have been specified, and the targeted information was gathered through literature review, e-mail, and navigation of international and national organizations. Again, topics related to HIM were evoked. Using an information system (decision support system, artificial neural network, etc.) to support PHR media and content, patient education, patient-HIM communication skills, consumer health information, conducting a surveillance system in other areas of healthcare such as a risk factor surveillance system, occupational health, using an information system to analyze aggregated data including a geographic information system, data mining, online analytical processing, public health vocabulary and classification system, and emerging automated coding systems pose major knowledge gaps in HIM education. Combining all required skills and expertise to handle personal and public dimensions of healthcare information in a single curriculum is simply impractical. Role expansion and role extension for HIM professionals should be defined based on the essence of

  18. Hebbian plasticity realigns grid cell activity with external sensory cues in continuous attractor models

    Directory of Open Access Journals (Sweden)

    Marcello eMulas

    2016-02-01

    Full Text Available After the discovery of grid cells, which are an essential component to understand how the mammalian brain encodes spatial information, three main classes of computational models were proposed in order to explain their working principles. Amongst them, the one based on continuous attractor networks (CAN, is promising in terms of biological plausibility and suitable for robotic applications. However, in its current formulation, it is unable to reproduce important electrophysiological findings and cannot be used to perform path integration for long periods of time. In fact, in absence of an appropriate resetting mechanism, the accumulation of errors overtime due to the noise intrinsic in velocity estimation and neural computation prevents CAN models to reproduce stable spatial grid patterns. In this paper, we propose an extension of the CAN model using Hebbian plasticity to anchor grid cell activity to environmental landmarks. To validate our approach we used as input to the neural simulations both artificial data and real data recorded from a robotic setup. The additional neural mechanism can not only anchor grid patterns to external sensory cues but also recall grid patterns generated in previously explored environments. These results might be instrumental for next generation bio-inspired robotic navigation algorithms that take advantage of neural computation in order to cope with complex and dynamic environments.

  19. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1994--September 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Morrison, J.L. [and others

    1995-04-14

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. Activities this reporting period included performing coal beneficiation/preparation studies, conducting combustion performance evaluations, preparing retrofit engineering designs, determining retrofit economics, and installing a micronized coal-water mixture (MCWM) circuit.

  20. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  1. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  2. Tier One: Draft Environmental Impact Statement. Volume 2. Realignment of Mountain Home Air Force Base and Proposed Expanded Range Capability

    Science.gov (United States)

    1990-02-01

    recorded. Wolves were present in most timbered areas of Oregon in the 1800s, but they were extirpated from the state by 1946 (Olterman and Verts 1972...form of cutthroat trout developed in the Humboldt River drainage. The latter may be an undescribed subspecies (Behnke 1981) or a mixture of Yellowstone ...individual, in which case its chances of surviving and reproducing would not be high. The presence of other gray wolves in the area is possible but not likely

  3. Scoping Summary Report, Los Angeles AFB, California. Air Force Base Closure and Realignment Environmental Impact Analysis Process Support

    Science.gov (United States)

    1990-07-01

    Mexico 87123 Dayton, Ohio 45402 * Richard A. Lampson Butch Maki Hydro Conduit Corp. Congressman Bill Richardson - 4801 Yucatan N.E. 548 Agua Fria...some chile con queso; however, that would be too much, and I think that might be considered a bribe. The Mayor asked me to convey his regrets. He’s tied...that God sends you here. Also, the small momento that Loretta is giving you, which is our state symbol, has a chile on it; and that’s to remind you

  4. Geographic Perspectives on the Relationship of Air Force Base Realignments to Rural Community Welfare in the United States.

    Science.gov (United States)

    1982-11-15

    as a "boom and bust" economy tied to the destiny of Larson AFB. Two basic activities have served to underpin and sustai4n the local economy; these...may seem. The ombudsznanship role played by the then embryo Office of Economic Adjustment, several federal agencies and the Maine congressional...civilian aviation purposes proved to be of vital importance to successful operation of the embryo port district. A source of funds was desperately

  5. Environmental Assessment for the Routine and Recurring Realignment of Units and Personnel at Edwards Air Force Base, California

    Science.gov (United States)

    2014-09-01

    atmosphere. The following gases are considered the major greenhouse gases of concern: carbon dioxide, methane, nitrous oxide, and fluorinated gases...create a lead hazard. The U.S. EPA has established that paint, varnish , shellac, or other coatings on surfaces that contain more than 5,000 ppm of lead

  6. Military Base Realignments and Closures: DOD Has Improved Environmental Cleanup Reporting but Should Obtain and Share More Information

    Science.gov (United States)

    2017-01-01

    million), and BRAC planning and compliance funding ($19.2 million) in fiscal year 2015 for cleanup at BRAC installations. 20DOD’s financial statement...Closures: Impact of Terminating, Relocating, or Outsourcing the Services of the Armed Forces Institute of Pathology. GAO-08-20. Washington, D.C

  7. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  8. 一种基于Cloud-P2P计算模型的恶意代码联合防御网络%Malicious code united-defense network based on Cloud-P2P model

    Institute of Scientific and Technical Information of China (English)

    徐小龙; 吴家兴; 杨庚

    2012-01-01

    The current anti-virus systems are usually unable io respond to endless emerging malicious codes in time. To sohe this problem, this paper proposed and constructed a new malicious code united-defense network based on the Cloud-P2P computing model. The Cloud-P2P model integrated the cloud computing and the P2P computing systems together organically. Servers and user terminals in the malicious code united-defense network carry out their own duties, forming a high-security collaborative defense network against malicious cooes and obtaining the whole group immunity quickly. It also proposed two kinds of hierarchical network topology, C-DHT and D-DHT, which were based on the distributed hash table technology and suitable for the Cloud-P2P computing model. By the introduction of mobile agent technology, realized vaccine agent and patrol agent of the malicious code defense united-network. The malicious code united-defense network based on the Cloud-P2P computing model has ideal performances, such as the network load balance, the rapid response, the comprehensive defense and the good compatibility.%针对目前的反病毒系统在应对恶意代码时通常具有的滞后性,提出并构建了一种新颖的基于CloudP2P计算模型的恶意代码联合防御网络.Cloud-P2P计算模型将云计算与对等计算进行有机融合.恶意代码联合防御网络系统中的集群服务器与用户终端群体联合组成了一个高安全防御网,协同防御恶意代码,并快速产生群体免疫力.为了提高系统的性能表现,提出适用于Cloud-P2P融合计算环境的两种基于分布式哈希表的层次式网络结构C-DHT和D-DHT,并通过引入移动agent技术实现了恶意代码联合防御网络中的疫苗agent和巡警agent.基于Cloud-P2P计算模型的恶意代码联合防御网络具有负载均衡、反应快捷、防御全面和兼容性良好等性能表现.

  9. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  10. Effect of fiber distribution and realignment on the nonlinear and inhomogeneous mechanical properties of human supraspinatus tendon under longitudinal tensile loading.

    Science.gov (United States)

    Lake, Spencer P; Miller, Kristin S; Elliott, Dawn M; Soslowsky, Louis J

    2009-12-01

    Tendon exhibits nonlinear stress-strain behavior that may be partly due to movement of collagen fibers through the extracellular matrix. While a few techniques have been developed to evaluate the fiber architecture of other soft tissues, the organizational behavior of tendon under load has not been determined. The supraspinatus tendon (SST) of the rotator cuff is of particular interest for investigation due to its complex mechanical environment and corresponding inhomogeneity. In addition, SST injury occurs frequently with limited success in treatment strategies, illustrating the need for a better understanding of SST properties. Therefore, the objective of this study was to quantitatively evaluate the inhomogeneous tensile mechanical properties, fiber organization, and fiber realignment under load of human SST utilizing a novel polarized light technique. Fiber distributions were found to become more aligned under load, particularly during the low stiffness toe-region, suggesting that fiber realignment may be partly responsible for observed nonlinear behavior. Fiber alignment was found to correlate significantly with mechanical parameters, providing evidence for strong structure-function relationships in tendon. Human SST exhibits complex, inhomogeneous mechanical properties and fiber distributions, perhaps due to its complex loading environment. Surprisingly, histological grade of degeneration did not correlate with mechanical properties.

  11. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  12. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  13. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  14. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  15. Effects of diets based on foods from conventional versus organic production on intake and excretion of flavonoids and markers of antioxidative defense in humans

    DEFF Research Database (Denmark)

    Grinder-Pedersen, Lisbeth; Rasmussen, Salka E.; Bügel, Susanne

    2003-01-01

    selection of more resistant varieties is of central importance to organic farming, it cannot be excluded that the observed effects originate from these differences. The food production method affected the content of the major flavonoid, quercetin, in foods and also affected urinary flavonoids and markers......Different food production methods may result in differences in the content of secondary metabolites such as polyphenolic compounds. The present study compared conventionally (CPD) and organically produced (OPD) diets in a human crossover intervention study (n = 16) with respect to the intake...... both interventions. Most markers of antioxidative defense did not differ between the diets, but intake of OPD resulted in an increased protein oxidation and a decreased total plasma antioxidant capacity compared to baseline (P

  16. Defense Transformation: Background and Oversight Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    .... The Administration's vision for defense transformation calls for shifting the U.S. military toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower...

  17. Allegations Concerning Defense Reutilization and Marketing Service Business Practices

    National Research Council Canada - National Science Library

    2001-01-01

    We performed this audit in response to a request from Senator John Warner. The request was based on several allegations the senator's office received concerning the operations of the Defense Reutilization and Marketing Service (DRMS...

  18. Major Management Challenges and Program Risks Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    .... The report also addresses corrective actions that DOD has taken or initiated on these issues- including DOD'S blueprint for a strategy-based, balanced, and affordable defense program as outlined...

  19. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  20. Performance-Based Acquisition: A tool to reduce costs and improve performance at US Army environmental remediation sites

    International Nuclear Information System (INIS)

    Kosko, Nancy; Gilman, Janet; White, Debbie

    2007-01-01

    The US Army, like most US federal and state environmental organizations, is faced with limited resources to conduct environmental work, an increasing workload, and challenges in achieving closeout of its environmental cleanup programs. In 2001, in an effort to incorporate proven private sector tools into federal cleanup programs, the Department of Defense (DoD) Business Initiative Council (BIC), initiated the use of Performance-Based Acquisition (PBA) for environmental cleanup. Since fiscal year 2000, the US Army Environmental Command (USAEC) has successfully awarded more than 55 performance-based contracts for environmental remediation. These contracts range in size from $500,000 to $52.4 million, and include closing properties (Base Realignment and Closure (BRAC)) and some of the US Army's most complex active installations. The contracts address a range of activities including investigation through monitoring and site completion, as well as various technical challenges including dense non-aqueous phase liquids (DNAPL) in ground water, karst systems, munitions and explosives of concern, and biological agents. The contracts are most often firm-fixed price, and 50 percent of the contracts required contractors to purchase environmental insurance in the form of remediation stop loss insurance (also known as cleanup cost cap insurance). The USAEC has conducted continuous process improvement since inception of the initiative. This paper presents results of two studies that were conducted in 2005-2006 to determine what lessons learned can be applied to future activities and to measure performance of contractors currently executing work under the performance based contracts. (authors)

  1. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  2. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  3. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  4. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  5. Long-term clinical and radiographic outcome of patello-femoral realignment procedures: a minimum of 15-year follow-up.

    Science.gov (United States)

    Vivod, Gregor; Verdonk, Peter; Drobnič, Matej

    2014-11-01

    A retrospective single-centre study was focused on the long-term outcome after different patello-femoral (PF) realignment procedures. Thirty-nine patients treated for recurrent PF instability were examined after a mean post-operative time of 22.5 years. Their 78 knees were divided into: non-operated knees (NON-OPERATED)-N = 24, isolated proximal procedures (PROXIMAL)-N = 22, isolated distal procedures (DISTAL)-N = 10, and combined procedures (COMBINED)-N = 22. PF-related medical history together with clinical, subjective (KOOS and Kujala scores), and radiographic (Caton-Deschamps PF height index, Kellgren-Lawrence scale for tibio-femoral OA, and Iwano classification for PF OA) evaluation was conducted. PF re-dislocation rate was comparable between PROXIMAL (36%), DISTAL (20%), and COMBINED (32%). Isolated proximal procedures revealed less central patella positions (PROXIMAL 64%; DISTAL 90%; COMBINED 95%) and more frequent PF apprehension test (PROXIMAL 82%; DISTAL 40%, COMBINED 50%). KOOS and Kujala scores were similar in all three surgical subgroups, but significantly lower than in NON-OPERATED. Patellas were positioned lower after DISTAL, 0.8 (0.5-1.0) or COMBINED, 0.9 (0.4-1.3). Kellgren-Lawrence scores ≥2 were found in 42% NON-OPERATED, 37% PROXIMAL, 70% DISTAL, and 59% COMBINED, whereas Iwano classification ≥2 was confirmed in 46% NON-OPERATED, 64% PROXIMAL, 80% DISTAL, and 86% COMBINED. High PF re-dislocation rates together with a very high incidence of PF OA indicate that PF realignment strategies used traditionally had failed to reach their long-term expectations. The transfer of tibial tuberosity resulted in more constrained PF joints than isolated proximal procedures which allowed for more residual PF instability. Distal procedures additionally increased the likelihood for tibio-femoral OA. III.

  6. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  7. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  8. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  9. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  10. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  11. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  12. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  13. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  14. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  15. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  16. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  17. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  18. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  19. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  20. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  1. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  2. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  3. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  4. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  5. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  6. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  7. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  8. Hyaluronic Acid-Based Nanogels Produced by Microfluidics-Facilitated Self-Assembly Improves the Safety Profile of the Cationic Host Defense Peptide Novicidin

    DEFF Research Database (Denmark)

    Water, Jorrit J; Kim, YongTae; Maltesen, Morten J

    2015-01-01

    have hampered their commercial development. To overcome these challenges a novel nanogel-based drug delivery system was designed. METHOD: The peptide novicidin was self-assembled with an octenyl succinic anhydride-modified analogue of hyaluronic acid, and this formulation was optimized using...... a microfluidics-based quality-by-design approach. RESULTS: By applying design-of-experiment it was demonstrated that the encapsulation efficiency of novicidin (15% to 71%) and the zeta potential (-24 to -57 mV) of the nanogels could be tailored by changing the preparation process parameters, with a maximum...

  9. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  10. Physics Based Modeling in Design and Development for U.S. Defense Held in Denver, Colorado on November 14-17, 2011. Volume 2: Audio and Movie Files

    Science.gov (United States)

    2011-11-17

    Mr. Frank Salvatore, High Performance Technologies FIXED AND ROTARY WING AIRCRAFT 13274 - “CREATE-AV DaVinci : Model-Based Engineering for Systems... Tools for Reliability Improvement and Addressing Modularity Issues in Evaluation and Physical Testing”, Dr. Richard Heine, Army Materiel Systems

  11. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  12. Defense meteorological satellite measurements of total ozone

    International Nuclear Information System (INIS)

    Lovill, J.E.; Ellis, J.S.; Luther, F.M.; Sullivan, R.J.; Weichel, R.L.

    1992-01-01

    A multichannel filter radiometer (MFR) on Defense Meteorological Satellites (DMS) that measured total ozone on a global-scale from March 1977 - February 1980 is described. The total ozone data measured by the MFR were compared with total ozone data taken by surfaced-based Dobson spectrophotometers. When comparisons were made for five months, the Dobson spectrophotometer measured 2-5% more total ozone than the MFR. Comparisons between the Dobson spectrophotometer and the MFR showed a reduced RMS difference as the comparisons were made at closer proximity. A Northern Hemisphere total ozone distribution obtained from MFR data is presented

  13. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  14. Contemporary strategic management approach in the defense system by U.S. methodology concept

    Directory of Open Access Journals (Sweden)

    Veselin I. Mrdak

    2013-12-01

    Full Text Available The paper wants to emphasize the importance of contemporary strategic management approachs in the defense system. Displays the work of American author Leslie Lewis and C. Robert Roll "Strategy-to- tasks: a methodology for resource allocation and management". It were used by parts of the discussion above, in order to describe the strategy-to-tasks methodology for planning, programming and budgeting system (PPBS. In developed Western countries adopted some elements of strategic management to determine and monitor the execution of strategic plans in the defense system. This trend is spreading to other countries as a result of the necessity of obeying certain methodological and technological achievements. The uncritical acceptance of a strategic management approach can cause great confusion and problems, and the terminology and scientific explanation for this trend is of great importance. Introduction PPBS is a resource management framework based on force planning concept. It was developed at the lRand Company during the late eighties and is adapted to the special needs of several DoD organization. The planning, programming and budgeting system (PPBS PPBS is DoD`ş primary system for planning and managing defense resources. It links the overall U.S. national security strategy to specific programs. It was designed to facilitate fiscally-constrained planning, programming and budgeting in terms of complete programs (i.e. forces and systems rather than through artificial budget categories. The goal is to determine forces, systems and program costs. Strategy-to-tasks and the PPBS The Strategy-To-Tasks methodology, regardless of its application, it must be consistent and supportive of each phase of the PPBS. This section describes the basics frameworks of which are adapted to resource allocation and management activities for the Special Operations Command (USSOCOM. The authors have used it during the various phases of the PPBS. The National Security

  15. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  16. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  17. Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    Concepts for aircraft interior decon • Concepts for wide area/fixed site decon • Supercritical fluid-based decon for sensitive equipment; •Demo enzymatic ...and special purpose clothing; improved closure systems for ensembles; microencapsulated phase change materials for special purpose applications, and...development of microencapsulated phase change materials for heating and cooling in response to extreme temperature changes. Participants in this work are

  18. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  19. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  20. Alcohol-induced blackout as a criminal defense or mitigating factor: an evidence-based review and admissibility as scientific evidence.

    Science.gov (United States)

    Pressman, Mark R; Caudill, David S

    2013-07-01

    Alcohol-related amnesia--alcohol blackout--is a common claim of criminal defendants. The generally held belief is that during an alcohol blackout, other cognitive functioning is severely impaired or absent. The presentation of alcohol blackout as scientific evidence in court requires that the science meets legal reliability standards (Frye, FRE702/Daubert). To determine whether "alcohol blackout" meets these standards, an evidence-based analysis of published scientific studies was conducted. A total of 26 empirical studies were identified including nine in which an alcohol blackout was induced and directly observed. No objective or scientific method to verify the presence of an alcoholic blackout while it is occurring or to confirm its presence retrospectively was identified. Only short-term memory is impaired and other cognitive functions--planning, attention, and social skills--are not impaired. Alcoholic blackouts would not appear to meet standards for scientific evidence and should not be admissible. © 2013 American Academy of Forensic Sciences.

  1. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  2. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  3. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  4. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  5. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  6. Defense-in-depth and diversity evaluation to cope with design bases events concurrent with common mode failure in digital plant protection system for KNGR

    International Nuclear Information System (INIS)

    Shin, Lee Cheol; Park, Chan Eok; Jin, Choi Chul; Tae, Seo Jong

    2001-01-01

    The Korean Next Generation Reactor (KNGR) has been evolved to adopt an advanced design feature, a digital Plant Protection System (PPS) as an effort of enhancing reliability and safety of the plant. Although the digital PPS can be designed with high reliability, it is considered to be vulnerable to the Common Mode Failure (CMF) in the system software resulting in a total loss of the built-in hardware redundancy. Therefore, a comprehensive evaluation has been performed to demonstrate the intrinsic capability of the KNGR design in coping with the design basis events concurrent with CMF in the digital PPS. Instead of the conservative bounding analysis methodology, a best-estimate analysis methodology has been developed and utilized since the design basis events accompanied by CMF in the digital PPS are categorized as beyond design bases events. A variety of diverse means such as Alternate Protection System (APS), process control systems, and timely operator actions have been verified to be effective in mitigating the design basis events with CMF in the digital PPS

  7. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  8. The development of coal-based technologies for Department of Defense facilities. Volume 1, Technical report. Semiannual technical progress report, September 28, 1994--March 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Hatcher, P. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-15

    This program is being conducted as a cooperative agreement between the Consortium for Coal Water Mixture Technology and the U.S. Department of Energy. Activities this reporting period are summarized by phase. Phase I is nearly completed. During this reporting period, coal beneficiation/preparation studies, engineering designs and economics for retrofitting the Crane, Indiana boiler to fire coal-based fuels, and a 1,000-hour demonstration of dry, micronized coal were completed. In addition, a demonstration-scale micronized-coal water mixture (MCWM) preparation circuit was constructed and a 1,000-hour demonstration firing MCWM began. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations involved literature surveys of NO{sub x}, SO{sub 2}, trace metals, volatile organic compounds, and fine particulate matter capture. In addition, vendors and engineering firms were contacted to identify the appropriate emissions technologies for the installation of commercial NO{sub x} and SO{sub 2} removal systems on the demonstration boiler. Information from the literature surveys and engineering firms will be used to identify, design, and install a control system(s). Work continued on the refinement and optimization of coal grinding and MCWM preparation procedures, and on the development of advanced processes for beneficiating high ash, high sulfur coals. Work also continued on determining the basic cost estimation of boiler retrofits, and evaluating environmental, regulatory, and regional economic impacts. In addition, the feasibility of technology adoption, and the public`s perception of the benefits and costs of coal usage was studied. A coal market analysis was completed. Work in Phase III focused on coal preparation studies, emissions reductions and economic analyses of coal use.

  9. An approach based on defense-in-depth and diversity (3D) for the reliability assessment of digital instrument and control systems of nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Paulo Adriano da; Saldanha, Pedro L.C., E-mail: pasilva@cnen.gov.b, E-mail: Saldanha@cnen.gov.b [Comissao Nacional de Energia Nuclear (CNEN), Rio de Janeiro, RJ (Brazil). Coord. Geral de Reatores Nucleares; Melo, Paulo F. Frutuoso e, E-mail: frutuoso@nuclear.ufrj.b [Universidade Federal do Rio de Janeiro (PEN/COPPE/UFRJ), RJ (Brazil). Coordenacao dos Programas de Pos-Graduacao em Engenharia. Programa de Engenharia Nuclear; Araujo, Ademir L. de [Associacao Brasileira de Ensino Universitario (UNIABEU), Angra dos Reis, RJ (Brazil)

    2011-07-01

    The adoption of instrumentation and control (I and C) digital technology has been slower in nuclear power plants. The reason has been unfruitful efforts to obtain evidence in order to prove that I and C systems can be used in nuclear safety systems, for example, the Reactor Protection System (RPS), ensuring the proper operation of all its functions. This technology offers a potential improvement for safety and reliability. However, there still no consensus about the model to be adopted for digital systems software to be used in reliability studies. This paper presents the 3D methodology approach to assess digital I and C reliability. It is based on the study of operational events occurring in NPPs. It is easy to identify, in general, the level of I and C system reliability, showing its key vulnerabilities, enabling to trace regulatory actions to minimize or avoid them. This approach makes it possible to identify the main types of digital I and C system failure, with the potential for common cause failures as well as evaluating the dominant failure modes. The MAFIC-D software was developed to assist the implementation of the relationships between the reliability criteria, the analysis of relationships and data collection. The results obtained through this tool proved to be satisfactory and complete the process of regulatory decision-making from licensing I and C digital of NPPs and call still be used to monitor the performance of I and C digital post-licensing during the lifetime of the system, providing the basis for the elaboration of checklists of regulatory inspections. (author)

  10. An approach based on defense-in-depth and diversity (3D) for the reliability assessment of digital instrument and control systems of nuclear power plants

    International Nuclear Information System (INIS)

    Silva, Paulo Adriano da; Saldanha, Pedro L.C.

    2011-01-01

    The adoption of instrumentation and control (I and C) digital technology has been slower in nuclear power plants. The reason has been unfruitful efforts to obtain evidence in order to prove that I and C systems can be used in nuclear safety systems, for example, the Reactor Protection System (RPS), ensuring the proper operation of all its functions. This technology offers a potential improvement for safety and reliability. However, there still no consensus about the model to be adopted for digital systems software to be used in reliability studies. This paper presents the 3D methodology approach to assess digital I and C reliability. It is based on the study of operational events occurring in NPPs. It is easy to identify, in general, the level of I and C system reliability, showing its key vulnerabilities, enabling to trace regulatory actions to minimize or avoid them. This approach makes it possible to identify the main types of digital I and C system failure, with the potential for common cause failures as well as evaluating the dominant failure modes. The MAFIC-D software was developed to assist the implementation of the relationships between the reliability criteria, the analysis of relationships and data collection. The results obtained through this tool proved to be satisfactory and complete the process of regulatory decision-making from licensing I and C digital of NPPs and call still be used to monitor the performance of I and C digital post-licensing during the lifetime of the system, providing the basis for the elaboration of checklists of regulatory inspections. (author)

  11. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  12. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  13. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  14. The CODE: a revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H. R.; Olff, M.; Ursin, H.

    1997-01-01

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  15. The CODE : A revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H.R; Olff, M.; Ursin, H

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  16. A Conceptual Framework for Defense Acquisition Decision Makers: Giving the Schedule its Due

    Science.gov (United States)

    2014-01-01

    Principles from microeconomic theory and operations research can provide insight into acquisition decisions to produce military capabili- ties in an...models based on economic and operations research principles can yield valuable insight into defense acquisition decisions. This article focuses on models...Department Edmund Conrow (1995) developed an excellent microeconomic framework to investigate the incentives of buyers and sellers in the defense

  17. Problems and Mitigation Strategies for Developing and Validating Statistical Cyber Defenses

    Science.gov (United States)

    2014-04-01

    such as Firewalls , HTTP proxies, and application-level Attribute Based Ac- cess Control [1] to provide a layered defense in depth. The spe- cific...research and technology develop- ment in several areas including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum

  18. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  19. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  20. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier.

    Directory of Open Access Journals (Sweden)

    Yuki Ishikawa

    Full Text Available In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA and tyramine (TA, as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG and the OA level in brain were increased in soldiers than in pseudergates (worker caste. Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes.

  1. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  2. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  3. Civilian applications for superconducting magnet technology developed for defense

    International Nuclear Information System (INIS)

    Johnson, R.A.; Klein, S.W.; Gurol, H.

    1986-01-01

    Seventy years after its discovery, superconducting technology is beginning to play an important role in the civilian sector. Strategic defense initiative (SDI)-related research in space- and ground-based strategic defense weapons, particularly research efforts utilizing superconducting magnet energy storage, magnetohydrodynamics (MHD), and superconducting pulsed-power devices, have direct applications in the civilian sector as well and are discussed in the paper. Other applications of superconducting magnets, which will be indirectly enhanced by the overall advancement in superconducting technology, include high-energy physics accelerators, magnetic resonance imaging, materials purifying, water purifying, superconducting generators, electric power transmission, magnetically levitated trains, magnetic-fusion power plants, and superconducting computers

  4. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  5. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  6. Artificial Intelligence: The Bumpy Path Through Defense Acquisition

    Science.gov (United States)

    2017-12-01

    we must prepare for. 2. AI Industry Leaders Throughout history many technological breakthroughs have occurred due to the guidance and curation of... technology demonstrations, and exercises that aim to capture technology -based lessons learned. Failure to address AI essentials causes problems in...defense acquisition: system requirements are impossible to define; transition of AI technology fails; testing cannot be evaluated with confidence; and

  7. Defensive enrolment in mantis shrimp larvae (Malacostraca: Stomatopoda)

    NARCIS (Netherlands)

    Haug, C.; Haug, J.T.

    2014-01-01

    We describe a possible new defensive behaviour of larval stages of mantis shrimps (Stomatopoda). Mantis shrimp larvae are rarely observed in nature, thus the study is based on postures of museum material and functional morphological aspects. Specimens described here are tightly enrolled, their pleon

  8. 77 FR 51970 - Renewal of Missile Defense Advisory Committee

    Science.gov (United States)

    2012-08-28

    ... limitation also applies to any DoD authorized subcommittees. The Secretary of Defense, based upon the... required to be in attendance at all Committee and subcommittee meetings for the entire duration of each and... Designated Federal Officer shall attend the entire duration of the Committee or subcommittee meeting. The...

  9. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors endash the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. The report is necessarily based on a limited review of the defense production reactors. It does not address whether any of the reactors are ''safe,'' because such an analysis would involve a determination of acceptable risk endash a matter of obvious importance, but one that was beyond the purview of the committee. It also does not address whether the safety of the production reactors is comparable to that of commercial nuclear power stations, because even this narrower question extended beyond the charge to the committee and would have involved detailed analyses that the committee could not undertake

  10. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  11. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    Science.gov (United States)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  12. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  13. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  14. 论国防概念在信息化战争条件下的再认识%Reflection on the definition of national defense in the information-based war

    Institute of Scientific and Technical Information of China (English)

    赵岚

    2012-01-01

      The modernization of national defense has encountered many new issues in the information warfare. Therefore, a fresh recognition and comprehensive interpretation of the concept of national defense is required be it for its objectives or purposes. To enhance the dynamic adaptation of national defense concept to the diverse circumstances, it counts to focus on the subject of national defense and to highlight the idea of sovereignty.%  在信息化战争条件下,目前对国防定义的认识与我国现代国防建设的发展已经出现不相适应的情况,无论是从国防对象还是国防目的来看都有需要重新认识和全新解读的必要。为了适应不断发展的实际变化,回归国防主体,突出主权概念,有利于增强国防定义的动态适应性。

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  17. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  18. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  19. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  20. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  1. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  2. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  3. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  4. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  5. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  6. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  7. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  8. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  9. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  10. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  11. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  12. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  13. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  14. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  15. Accuracy of a commercial optical 3D surface imaging system for realignment of patients for radiotherapy of the thorax

    International Nuclear Information System (INIS)

    Schoeffel, Philipp J; Harms, Wolfgang; Sroka-Perez, Gabriele; Schlegel, Wolfgang; Karger, Christian P

    2007-01-01

    Accurate and reproducible patient setup is a prerequisite to fractionated radiotherapy. To evaluate the applicability and technical performance of a commercial 3D surface imaging system for repositioning of breast cancer patients, measurements were performed in a rigid anthropomorphic phantom as well as in healthy volunteers. The camera system records a respiration-gated surface model of the imaged object, which may be registered to a previously recorded reference model. A transformation is provided, which may be applied to the treatment couch to correct the setup of the patient. The system showed a high stability and detected pre-defined shifts of phantoms and healthy volunteers with an accuracy of 0.40 ± 0.26 mm and 1.02 ± 0.51 mm, respectively (spatial deviation between pre-defined shift and suggested correction). The accuracy of the suggested rotational correction around the vertical axis was always better than 0.3 0 in phantom measurements and 0.8 0 in volunteers, respectively. Comparison of the suggested setup correction with that detected by a second and independently operated marker-based optical system provided consistent results. The results demonstrate that the camera system provides highly accurate setup corrections in a phantom and healthy volunteers. The most efficient use of the system for improving the setup accuracy in breast cancer patients has to be investigated in routine patient treatments

  16. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  17. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  18. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  19. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control

    Directory of Open Access Journals (Sweden)

    Michel Nicolas

    2017-12-01

    Full Text Available The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six (N = 296 athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  20. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    Science.gov (United States)

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  1. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  2. Sequestered Alkaloid Defenses in the Dendrobatid Poison Frog Oophaga pumilio Provide Variable Protection from Microbial Pathogens.

    Science.gov (United States)

    Hovey, Kyle J; Seiter, Emily M; Johnson, Erin E; Saporito, Ralph A

    2018-03-01

    Most amphibians produce their own defensive chemicals; however, poison frogs sequester their alkaloid-based defenses from dietary arthropods. Alkaloids function as a defense against predators, and certain types appear to inhibit microbial growth. Alkaloid defenses vary considerably among populations of poison frogs, reflecting geographic differences in availability of dietary arthropods. Consequently, environmentally driven differences in frog defenses may have significant implications regarding their protection against pathogens. While natural alkaloid mixtures in dendrobatid poison frogs have recently been shown to inhibit growth of non-pathogenic microbes, no studies have examined the effectiveness of alkaloids against microbes that infect these frogs. Herein, we examined how alkaloid defenses in the dendrobatid poison frog, Oophaga pumilio, affect growth of the known anuran pathogens Aeromonas hydrophila and Klebsiella pneumoniae. Frogs were collected from five locations throughout Costa Rica that are known to vary in their alkaloid profiles. Alkaloids were isolated from individual skins, and extracts were assayed against both pathogens. Microbe subcultures were inoculated with extracted alkaloids to create dose-response curves. Subsequent spectrophotometry and cell counting assays were used to assess growth inhibition. GC-MS was used to characterize and quantify alkaloids in frog extracts, and our results suggest that variation in alkaloid defenses lead to differences in inhibition of these pathogens. The present study provides the first evidence that alkaloid variation in a dendrobatid poison frog is associated with differences in inhibition of anuran pathogens, and offers further support that alkaloid defenses in poison frogs confer protection against both pathogens and predators.

  3. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  4. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  5. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  6. Factors Influencing the Effectiveness of Systems Engineering Training and Education in the Department of Defense

    Science.gov (United States)

    2011-04-30

    learning. Recommendations are also presented for additional research into a more effective systems engineering andragogy . 15. SUBJECT TERMS 16...into a more effective systems engineering andragogy . Purpose Competency-based training for defense acquisition workers in the systems engineering

  7. Prolonged Adaptive Evolution of a Defensive Gene in the Solanaceae.

    Science.gov (United States)

    Rausher, Mark D; Huang, Jie

    2016-01-01

    Although plants and their natural enemies may coevolve for prolonged periods, little is known about how long individual plant defensive genes are involved in the coevolutionary process. We address this issue by examining patterns of selection on the defensive gene threonine deaminase (TD). Tomato (Solanum lycopersicum) has two copies of this gene. One performs the canonical housekeeping function in amino acid metabolism of catalyzing the first reaction in the conversion of threonine to isoleucine. The second copy functions as an antinutritive defense against lepidopteran herbivores by depleting threonine in the insect gut. Wild tobacco (Nicotiana attenuata) also contains a defensive copy. We show that a single copy of TD underwent two or three duplications near the base of the Solanaceae. One copy retains the housekeeping function, whereas a second copy evolved defensive functions. Positive selection occurred on the branch of the TD2 gene tree subtending the common ancestor of the Nicotianoideae and Solanoideae. It also occurred within the Solanoideae clade but not within the Nicotianoideae clade. Finally, it occurred on most branches leading from the common ancestor to S. lycopersicum. Based on recent calibrations of the Solanaceae phylogeny, TD2 experienced adaptive substitutions for a period of 30-50 My. We suggest that the most likely explanation for this result is fluctuating herbivore abundances: When herbivores are rare, relaxed selection increases the likelihood that slightly disadvantageous mutations will be fixed by drift; when herbivores are common, increased selection causes the evolution of compensatory adaptive mutations. Alternative explanations are also discussed. © The Author 2015. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. Egg Production Constrains Chemical Defenses in a Neotropical Arachnid.

    Directory of Open Access Journals (Sweden)

    Taís M Nazareth

    Full Text Available Female investment in large eggs increases the demand for fatty acids, which are allocated for yolk production. Since the biosynthetic pathway leading to fatty acids uses the same precursors used in the formation of polyketides, allocation trade-offs are expected to emerge. Therefore, egg production should constrain the investment in chemical defenses based on polyketides, such as benzoquinones. We tested this hypothesis using the harvestman Acutiosoma longipes, which produces large eggs and releases benzoquinones as chemical defense. We predicted that the amount of secretion released by ovigerous females (OFs would be smaller than that of non-ovigerous females (NOF. We also conducted a series of bioassays in the field and in the laboratory to test whether egg production renders OFs more vulnerable to predation. OFs produce less secretion than NOFs, which is congruent with the hypothesis that egg production constrains the investment in chemical defenses. Results of the bioassays show that the secretion released by OFs is less effective in deterring potential predators (ants and spiders than the secretion released by NOFs. In conclusion, females allocate resources to chemical defenses in a way that preserves a primary biological function related to reproduction. However, the trade-off between egg and secretion production makes OFs vulnerable to predators. We suggest that egg production is a critical moment in the life of harvestman females, representing perhaps the highest cost of reproduction in the group.

  9. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  10. Environmental Assessment for the Army Aviation Support Facility and Administrative Support Facility and the Joint Forces Headquarters, Readiness Center, and Field Maintenance Shop at Francis E. Warren Air Force Base, Cheyenne, Wyoming

    Science.gov (United States)

    2006-08-01

    are specific numerical limits established by regulation or industry standard. These criteria are based on existing regulatory standards, scientific ...Buildings/Structures 100 ft Buffer Proposed Site Locations Installation Boundary Comunication Lines LEGEND Prepared for: Environmental Assessment for...regulatory standards, scientific and environmental documentation, and/or professional judgment. 5.1.1 CONSEQUENCES OF THE REALIGNMENT (PREFERRED

  11. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  12. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  13. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  14. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  15. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  16. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  17. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  18. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  19. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  20. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  1. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  2. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  3. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  4. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  5. Who might realign with OPEC?

    International Nuclear Information System (INIS)

    Djamarani, M.

    1994-01-01

    Opec's influence has waned since the heady days of the mid to late 1970s when its concerted actions first quadrupled oil prices in the wake of the Yom Kippur war in 1973 and then trebled again in 1979-80 to almost $40/barrel in the aftermath of the Iranian revolution and the start of the first Iran-Iraq war. Today OPEC member states are struggling to prevent oil prices from falling below $14/b spot prices. To boost sagging oil prices and to reassert its control over the world oil market, OPEC has been considering widening its membership or at least developing closer relations with other oil producers. (Author)

  6. Consciousness operationalized, a debate realigned.

    Science.gov (United States)

    Carruthers, Peter; Veillet, Bénédicte

    2017-10-01

    This paper revisits the debate about cognitive phenomenology. It elaborates, defends, and improves on our earlier proposal for resolving that debate, according to which the test for irreducible phenomenology is the presence of explanatory gaps. After showing how proposals like ours have been misunderstood or misused by others, we deploy our operationalization to argue that the correct way to align the debate over cognitive phenomenology is not between sensory and (alleged) cognitive phenomenology, but rather between non-conceptual and (alleged) conceptual or propositional phenomenology. In doing so we defend three varieties of non-sensory (amodal) 1 non-conceptual phenomenology: valence, a sense of approximate number, and a sense of elapsed time. Copyright © 2017 Elsevier Inc. All rights reserved.

  7. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  8. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  9. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  10. Evaluation of the defensive behavior of two honeybee ecotypes using a laboratory test

    Directory of Open Access Journals (Sweden)

    Cecilia Andere

    2002-01-01

    Full Text Available Honeybee defensive behavior is a useful selection criterion, especially in areas with Africanized honeybees (Apis mellifera L. In all genetic improvement programs the selected characters must be measured with precision, and because of this we evaluated a metabolic method for testing honeybee defensive behavior in the laboratory for its usefulness in distinguishing between honeybee ecotypes and selecting honeybees based on their level of defensive responses. Ten honeybee colonies were used, five having been produced by feral queens from a subtropical region supposedly colonized by Africanized honeybees and five by queens from a temperate region apparently colonized by European honeybees. We evaluate honeybee defensive behavior using a metabolic test based on oxygen consumption after stimulation with an alarm pheromone, measuring the time to the first response, time to maximum oxygen consumption, duration of activity, oxygen consumption at first response, maximum oxygen consumption and total oxygen consumption, colonies being ranked according to the values obtained for each variable. Significant (p < 0.05 differences were detected between ecotypes for each variable but for all variables the highest rankings were obtained for colonies of subtropical origin, which had faster and more intense responses. All variables were highly associated (p < 0.05. Total oxygen consumption was the best indicator of metabolic activity for defensive behavior because it combined oxygen consumption and the length of the response. This laboratory method may be useful for evaluating the defensive behavior of honey bees in genetic programs designed to select less defensive bees.

  11. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  12. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  13. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  14. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  15. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  16. Review and Implementation Status of Prior Defense Business Board Recommendations

    Science.gov (United States)

    2007-04-01

    key recommendation to appoint a single Fund Manager – Improved training programs, including eLearning , underway – Capabilities-Based Budgeting allowed...framework focused on et. al. enterprise enhancements, support for the Global War on Terror, progress on implementation of the Quadrennial Defense...Improve Global Mail Operations – MPSA in receipt of all industry responses by Aug 2006 – On December 12th MPSA will brief the Postal Oversight Board on

  17. Department of the Navy FY 1993 Budget Estimates, DoD Base Closure and Realignment Program 2. Justification Data Submitted to Congress January 1992

    Science.gov (United States)

    1992-01-01

    System Command (NAVSUP) Naval Regional Contracting Center (NRCC), and Oceanographer ( OCEANO ) Weather Det. Military Personnel: Fifty percent of the active...ON DD 1391C)* FOR1 PREVIOUS EDITIONS MAY BE USED INTERNALLYUNTIL EXHAUSTED PAGE NO. Sol 0102-0P -001 - 391041 1. COKOONENT 2. DATE FY 1993_MILITARY

  18. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  19. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  20. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  1. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    Science.gov (United States)

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  2. [Psychometric assessment of defense mechanisms: correlation between questionnaire and expert rating. Initial study of validity].

    Science.gov (United States)

    Reister, G; Fellhauer, R F; Franz, M; Wirth, T; Schellberg, D; Schepank, H; Tress, W

    1993-01-01

    Within the limits of an epidemiological longitudinal field survey on prevalence and course of psychogenic disorders a high-risk-population suffering from medical psychogenic impairment was investigated. The study was conducted in order to verify an etiological multi-level-model of psychogenic disorders in relation to the socialempiric variables "critical life events" and "social support" as well as the depth psychological oriented construct "personality". Besides other instruments a self rating scale based on Vallant's hierarchical model of defense, i.e. the german adaptation of the DSQ (Defense Style Questionnaire) of Bond and coworkers, was used for the accurate measurement of relevant personality parameters. Although defense processes predominantly work unconscious, manifestations of defense mechanisms could be measured indirectly by means of the rating scale. Its essential dimensions separated clinical patients from a group of healthy controls. Furthermore an immature organisation of defense was found to be related to psychogenic impairment. Concerning self- and expert-rating a significant correlation between "immature defense" and the defense mechanisms "schizoid phantasy", "projection" and "acting out" was proved.

  3. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  4. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  5. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    Science.gov (United States)

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  6. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  7. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  8. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  9. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  10. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  11. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  12. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  13. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  14. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  15. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  16. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  17. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  18. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  19. A line of defense approach to fissile material control

    International Nuclear Information System (INIS)

    Holloway, S.P.; Holloway, N.J.

    1995-01-01

    A crucial element of the safety policy of the UK Atomic Weapons Establishment (AWE) is that concerned with the safe control of fissile material in order to minimize the potential for unplanned criticality. The principles by which AWE controls fissile material advocate a simple Line of Defense (LOD) approach to assessing criticality-safety related aspects of fissile operations. An LOD assessment provides a measure of the depth of defense available to prevent general types of criticality accident and can be used to demonstrate compliance with the risk-based Basic Safety Limits (BSLs) and Objectives (BSOs) used by the UK Nuclear Installations Inspectorate (NII) to judge the safety of operations in accordance with its Safety Assessment Principles (SAPs) for Nuclear Plants. This paper discusses the LOD concept, the basis of LOD assessment and describes LODs specific to criticality control

  20. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  1. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  2. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  3. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  4. Vehicle-network defensive aids suite

    Science.gov (United States)

    Rapanotti, John

    2005-05-01

    Defensive Aids Suites (DAS) developed for vehicles can be extended to the vehicle network level. The vehicle network, typically comprising four platoon vehicles, will benefit from improved communications and automation based on low latency response to threats from a flexible, dynamic, self-healing network environment. Improved DAS performance and reliability relies on four complementary sensor technologies including: acoustics, visible and infrared optics, laser detection and radar. Long-range passive threat detection and avoidance is based on dual-purpose optics, primarily designed for manoeuvring, targeting and surveillance, combined with dazzling, obscuration and countermanoeuvres. Short-range active armour is based on search and track radar and intercepting grenades to defeat the threat. Acoustic threat detection increases the overall robustness of the DAS and extends the detection range to include small calibers. Finally, detection of active targeting systems is carried out with laser and radar warning receivers. Synthetic scene generation will provide the integrated environment needed to investigate, develop and validate these new capabilities. Computer generated imagery, based on validated models and an acceptable set of benchmark vignettes, can be used to investigate and develop fieldable sensors driven by real-time algorithms and countermeasure strategies. The synthetic scene environment will be suitable for sensor and countermeasure development in hardware-in-the-loop simulation. The research effort focuses on two key technical areas: a) computing aspects of the synthetic scene generation and b) and development of adapted models and databases. OneSAF is being developed for research and development, in addition to the original requirement of Simulation and Modelling for Acquisition, Rehearsal, Requirements and Training (SMARRT), and is becoming useful as a means for transferring technology to other users, researchers and contractors. This procedure

  5. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  6. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  7. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  8. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  9. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  11. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  12. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  13. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    .37). State-based medical legal environment is not a significant driver of increased defensive medicine associated with neurosurgical spine procedures. 3.

  14. Evaluation of elastix-based propagated align algorithm for VOI- and voxel-based analysis of longitudinal (18)F-FDG PET/CT data from patients with non-small cell lung cancer (NSCLC).

    Science.gov (United States)

    Kerner, Gerald Sma; Fischer, Alexander; Koole, Michel Jb; Pruim, Jan; Groen, Harry Jm

    2015-01-01

    Deformable image registration allows volume of interest (VOI)- and voxel-based analysis of longitudinal changes in fluorodeoxyglucose (FDG) tumor uptake in patients with non-small cell lung cancer (NSCLC). This study evaluates the performance of the elastix toolbox deformable image registration algorithm for VOI and voxel-wise assessment of longitudinal variations in FDG tumor uptake in NSCLC patients. Evaluation of the elastix toolbox was performed using (18)F-FDG PET/CT at baseline and after 2 cycles of therapy (follow-up) data in advanced NSCLC patients. The elastix toolbox, an integrated part of the IMALYTICS workstation, was used to apply a CT-based non-linear image registration of follow-up PET/CT data using the baseline PET/CT data as reference. Lesion statistics were compared to assess the impact on therapy response assessment. Next, CT-based deformable image registration was performed anew on the deformed follow-up PET/CT data using the original follow-up PET/CT data as reference, yielding a realigned follow-up PET dataset. Performance was evaluated by determining the correlation coefficient between original and realigned follow-up PET datasets. The intra- and extra-thoracic tumors were automatically delineated on the original PET using a 41% of maximum standardized uptake value (SUVmax) adaptive threshold. Equivalence between reference and realigned images was tested (determining 95% range of the difference) and estimating the percentage of voxel values that fell within that range. Thirty-nine patients with 191 tumor lesions were included. In 37/39 and 12/39 patients, respectively, thoracic and non-thoracic lesions were evaluable for response assessment. Using the EORTC/SUVmax-based criteria, 5/37 patients had a discordant response of thoracic, and 2/12 a discordant response of non-thoracic lesions between the reference and the realigned image. FDG uptake values of corresponding tumor voxels in the original and realigned reference PET correlated well (R

  15. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  16. Construction and characteristics of questionnaire for the assessment of defense mechanisms: MOD

    Directory of Open Access Journals (Sweden)

    Džamonja-Ignjatović Tamara

    2014-01-01

    Full Text Available Defense mechanisms are psychological constructs of key importance for the assessment of personality and planning therapeutic process. Their assessment is mainly based on interview, observation and projective techniques. Questionnaires, as the self-assessment techniques, apparently are not suitable method for unconscious processes such as defense mechanisms. The paper presents the results of construction of the questionnaire for the assessment of defense mechanisms, abbreviated called MOD (Mechanisms of Defense, which represents an attempt to clarify conceptualization and operationalization of these constructs through a variety of behavioral and emotional manifestations, personal attitudes and beliefs, patterns of interpersonal relationships and feedback from environment. Research objectives included testing of metric characteristics and the factor structure of the questionnaire, as well as its validity for differentiating subjects from clinical and non-clinical populations. The questionnaire has 110 items assessed at the 5-point Likert scale for evaluation of 20 defense mechanisms. The sample consisted of 194 subjects of both sexes, of which 136 students of psychology and social work and 58 nonpsychotic patients from clinical populations. The results showed that the reliability of the scale varies from high to unsatisfactory (Cronbach alpha .82- .35, although for most subscales is around .65-.70. The most of defense mechanisms has one factor structure, whereas from about a third of the subscales two principal components were isolated. Analysis of the structure of mature defense mechanisms clearly derived out four factors corresponding to the presumed mechanisms of defense, while for the groups of neurotic and immature mechanisms were not obtained pure solutions. The questionnaire successfully differentiate clinical from non-clinical sample, based on higher scores on mature and lower scores on immature mechanisms, while the groups did not differ

  17. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  18. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  19. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  20. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  1. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  2. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  3. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  4. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  5. Accelerator requirments for strategic defense

    International Nuclear Information System (INIS)

    Gullickson, R.L.

    1987-01-01

    The authors discuss how directed energy applications require accelerators with high brightness and large gradients to minimize size and weight for space systems. Several major directed energy applications are based upon accelerator technology. The radio-frequency linear accelerator is the basis for both space-based neutral particle beam (NPB) and free electron laser (FEL) devices. The high peak current of the induction linac has made it a leading candidate for ground based free electron laser applications

  6. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  7. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  8. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  9. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  10. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  11. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  12. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  13. The Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Defensive Functioning Scale: a validity study.

    Science.gov (United States)

    Porcerelli, John H; Cogan, Rosemary; Markova, Tsveti; Miller, Kristen; Mickens, Lavonda

    2011-01-01

    We assess the convergent and predictive validity of the Defensive Functioning Scale (DFS) with measures of life events, including childhood abuse and adult partner victimization; dimensions of psychopathology, including axis I (depressive) and axis II (borderline personality disorder) symptoms; and quality of object relations. One hundred and ten women from a university-based urban primary care clinic completed a research interview from which defense mechanisms were assessed. The quality of object relations was also assessed from interview data. The women completed self-report measures assessing depression, borderline personality disorder symptoms, childhood physical and sexual abuse, and adult partner physical and sexual victimization. Inter-rater reliability of the scoring of the DFS levels was good. High adaptive defenses were positively correlated with the quality of object relations and pathological defenses were positively correlated with childhood and adult victimization and symptom measures. Although major image distorting defenses were infrequently used, they were robustly correlated with all study variables. In a stepwise multiple regression analysis, major image distorting defenses, depressive symptoms, and minor image distorting defenses significantly predict childhood victimization, accounting for 37% of the variance. In a second stepwise multiple regression analysis, borderline personality disorder symptoms and disavowal defenses combined to significantly predict adult victimization, accounting for 16% of the variance. The DFS demonstrates good convergent validity with axis I and axis II symptoms, as well as with measures of childhood and adult victimization and object relations. The DFS levels add nonredundant information to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition beyond axis I and axis II. Copyright © 2011 Elsevier Inc. All rights reserved.

  14. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  15. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  16. Defense programs beryllium good practice guide

    International Nuclear Information System (INIS)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D ampersand D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is

  17. Ultraviolet Radiations: Skin Defense-Damage Mechanism.

    Science.gov (United States)

    Mohania, Dheeraj; Chandel, Shikha; Kumar, Parveen; Verma, Vivek; Digvijay, Kumar; Tripathi, Deepika; Choudhury, Khushboo; Mitten, Sandeep Kumar; Shah, Dilip

    2017-01-01

    UV-radiations are the invisible part of light spectra having a wavelength between visible rays and X-rays. Based on wavelength, UV rays are subdivided into UV-A (320-400 nm), UV-B (280-320 nm) and UV-C (200-280 nm). Ultraviolet rays can have both harmful and beneficial effects. UV-C has the property of ionization thus acting as a strong mutagen, which can cause immune-mediated disease and cancer in adverse cases. Numbers of genetic factors have been identified in human involved in inducing skin cancer from UV-radiations. Certain heredity diseases have been found susceptible to UV-induced skin cancer. UV radiations activate the cutaneous immune system, which led to an inflammatory response by different mechanisms. The first line of defense mechanism against UV radiation is melanin (an epidermal pigment), and UV absorbing pigment of skin, which dissipate UV radiation as heat. Cell surface death receptor (e.g. Fas) of keratinocytes responds to UV-induced injury and elicits apoptosis to avoid malignant transformation. In addition to the formation of photo-dimers in the genome, UV also can induce mutation by generating ROS and nucleotides are highly susceptible to these free radical injuries. Melanocortin 1 receptor (MC1R) has been known to be implicated in different UV-induced damages such as pigmentation, adaptive tanning, and skin cancer. UV-B induces the formation of pre-vitamin D3 in the epidermal layer of skin. UV-induced tans act as a photoprotection by providing a sun protection factor (SPF) of 3-4 and epidermal hyperplasia. There is a need to prevent the harmful effects and harness the useful effects of UV radiations.

  18. Maize terpene volatiles serve as precursors to an array of defensive phytoalexins following insect and pathogen attack

    Science.gov (United States)

    Phytoalexins are inducible biochemicals that locally protect plant tissues against biotic attack. Due to their agronomic significance, maize and rice have been extensively investigated for their terpenoid-based defenses which include insect-inducible monoterpene and sesquiterpene vol...

  19. Special Technology Area Review on Spintronics. Report of Department of Defense Advisory Group on Electron Devices Working Group B (Microelectronics)

    National Research Council Canada - National Science Library

    Dunbridge, Barry; Palkuti, Les; Wolf, Stuart

    2004-01-01

    ...) as it applies to nonvolatile memories and quantum-based logic and computing. In addition, the information provided at the STAR is expected to be of use to the Services and Department of Defense (DoD...

  20. Knowledge Loss: A Defensive Model In Nuclear Research Organization Memory

    International Nuclear Information System (INIS)

    Mohamad Safuan Bin Sulaiman; Muhd Noor Muhd Yunus

    2013-01-01

    Knowledge is an essential part of research based organization. It should be properly managed to ensure that any pitfalls of knowledge retention due to knowledge loss of both tacit and explicit is mitigated. Audit of the knowledge entities exist in the organization is important to identify the size of critical knowledge. It is very much related to how much know-what, know-how and know-why experts exist in the organization. This study conceptually proposed a defensive model for Nuclear Malaysia's organization memory and application of Knowledge Loss Risk Assessment (KLRA) as an important tool for critical knowledge identification. (author)