WorldWideScience

Sample records for defense base realignment

  1. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  2. Defense Base Realignment and Closure Budget Data for the Realignment of the Bureau of Naval Personnel, Washington, D.C., to Naval Air Station Memphis, Tennessee

    National Research Council Canada - National Science Library

    Granetto, Paul

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  3. Defense Base Realignment and Closure Budget Data for Realignment of Construction Battalion Unit 416 from Naval Air Station Alameda, California, to Naval Air Station Fallon, Nevada

    National Research Council Canada - National Science Library

    1995-01-01

    ... requested for each military construction project associated with Defense base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  4. 75 FR 29322 - Base Closure and Realignment

    Science.gov (United States)

    2010-05-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Base Closure and Realignment AGENCY: Office of...)(ii) of the Defense Base Closure and Realignment Act of 1990. It provides a partial list of military installations closing or realigning pursuant to the 2005 Base Closure and Realignment (BRAC) Report. It also...

  5. Defense Base Realignment and Closure Budget Data for the Closure of Marine Corps Air Station El Toro and Tustin, California, and the Realignment to Naval Air Station Miramar, California

    National Research Council Canada - National Science Library

    1994-01-01

    ... requested for each military construction project associated with base realignment and closure does not exceed the original estimated cost provided to the Commission on Defense Base Closure and Realignment (the Commission...

  6. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Year 1992 and 1993

    Science.gov (United States)

    1993-05-25

    OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FISCAL YEARS 1992 AND 1993...ASSISTANT SECRETARY OF DEFENSE (INSTALLATIONS) SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Years...1992 and 1993 (Report No. 93-100) We are providing this final summary report for your information and use. The audit was required by Public Law

  7. Joint Cross-Service Group for Laboratories 1995 Defense Base Realignment and Closure Process

    National Research Council Canada - National Science Library

    Reed, Donald

    1995-01-01

    This report is one in a series of reports that discusses the Joint Cross-Service Group implementation of the internal control plan developed by the 1995 Defense Base Closure and Realignment Steering Group (the Steering Group...

  8. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYS 1993 and 1994

    Science.gov (United States)

    1994-02-14

    Jl%«~~ /&■ OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FYS 1993 AND...COMPTROLLER) AUDITOR GENERAL, DEPARTMENT OF THE ARMY SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for FYs...Therefore, we are publishing this report in final form. We appreciate the courtesies and cooperation extended to the audit staff. If you have any

  9. Defense Base Realignment and Closure Budget Data for the Closure of Gentile Air Force Station, Dayton, Ohio, and Realignment of Defense Logistics Agency Components to Wright-Patterson Air Force Base, Ohio

    National Research Council Canada - National Science Library

    1996-01-01

    .... This report provides the results of the audit of two projects, valued at $5.5 million, for the closure of Gentile Air Force Station, Dayton, Ohio, and realignment to Wright-Patterson Air Force Base, Ohio, of two Defense Logistics Agency components...

  10. 32 CFR 989.25 - Base closure and realignment.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Base closure and realignment. 989.25 Section 989... PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.25 Base closure and realignment. Base closure or realignment may entail special requirements for environmental analysis. The permanent base closure...

  11. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Training Center Great Lakes, Illinois

    Science.gov (United States)

    1994-05-19

    the audit of project P-608T, Building Modifications, as they relate to project P-557S. Because...project P-608T was addressed in Report No. 94-108, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California, May 19,

  12. Military Base Closures: Updated Status of Prior Base Realignments and Closures

    Science.gov (United States)

    As the Department of Defense (DOD) prepares for the 2005 base realignment and closure (BRAC) round, questions continue to be raised about the transfer and environmental cleanup of unneeded property arising from the prior four BRAC rounds and their impact on cost and savings and on local economies.

  13. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California

    Science.gov (United States)

    1994-05-19

    the audit of two projects: P-608T, Building Modifications, valued at...Island, California, to the Naval Training Center Great Lakes, Illinois. The audit also evaluated the implementation of the DoD Internal Management...related to the two projects in this report and is discussed in Report No. 94-109, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for the Naval Training Center Great Lakes, Illinois, May 19,

  14. Defense Base Realignment and Closure Budget Data for Naval Air Stations Dallas, Texas, and Memphis, Tennessee, Realigning to Carswell Air Reserve Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 16 projects, valued at $122 million, for the realignment of the Naval Air Stations Memphis, Tennessee, and Dallas, Texas, to Carswell Air Reserve Base, Texas...

  15. Defense Base Closure and Realignment Budget Data for the Naval Surface Warfare Center

    National Research Council Canada - National Science Library

    1993-01-01

    ... and realignment military construction projects. This report provides the results of the audit related to the realignment of Naval Surface Warfare Centers elements in White Oak, Maryland, and Panama City, Florida, to Dahlgren, Virginia...

  16. Report on 2005 Defense Base Closure and Realignment Implementation

    Science.gov (United States)

    2007-04-01

    California 681 1 World Trade Center Long Beach 683 2180 Burbank Boulevard Woodland Hills 684 ASW Center Point Loma 685 Fallbrook Detachment NSWC Crane...Sep 30 2009 680 California 681 682 1 World Trade Center Long Beach, CA Commission recommendation(s) affected by this installation: Number...184 Create a Naval Intergrated Weapons & Armaments Research, Development & Acquisition, Test & Evaluation Center Closure or realignment actions taken

  17. Marshall Application Realignment System (MARS) Architecture

    Science.gov (United States)

    Belshe, Andrea; Sutton, Mandy

    2010-01-01

    The Marshall Application Realignment System (MARS) Architecture project was established to meet the certification requirements of the Department of Defense Architecture Framework (DoDAF) V2.0 Federal Enterprise Architecture Certification (FEAC) Institute program and to provide added value to the Marshall Space Flight Center (MSFC) Application Portfolio Management process. The MARS Architecture aims to: (1) address the NASA MSFC Chief Information Officer (CIO) strategic initiative to improve Application Portfolio Management (APM) by optimizing investments and improving portfolio performance, and (2) develop a decision-aiding capability by which applications registered within the MSFC application portfolio can be analyzed and considered for retirement or decommission. The MARS Architecture describes a to-be target capability that supports application portfolio analysis against scoring measures (based on value) and overall portfolio performance objectives (based on enterprise needs and policies). This scoring and decision-aiding capability supports the process by which MSFC application investments are realigned or retired from the application portfolio. The MARS Architecture is a multi-phase effort to: (1) conduct strategic architecture planning and knowledge development based on the DoDAF V2.0 six-step methodology, (2) describe one architecture through multiple viewpoints, (3) conduct portfolio analyses based on a defined operational concept, and (4) enable a new capability to support the MSFC enterprise IT management mission, vision, and goals. This report documents Phase 1 (Strategy and Design), which includes discovery, planning, and development of initial architecture viewpoints. Phase 2 will move forward the process of building the architecture, widening the scope to include application realignment (in addition to application retirement), and validating the underlying architecture logic before moving into Phase 3. The MARS Architecture key stakeholders are most

  18. Department of Defense Base Closure and Realignment Report

    Science.gov (United States)

    1993-03-01

    Polygriph Instituite (I)ODP) to Fort Lzonard Wood, Misouri. Transfer as’countability for Peiham Range and other ,required training support faciities...federal civilian homeowners who, through no fault of their own, face a financial loss when selling their homes in an area where real estate values have...Defense determines that the financial re- sources available to the community (by grant or otherwise) for such purposes are inadequate, and may use

  19. Defense Base Realignment and Closure Budget Data for Naval Air Technical Training Center, Naval Air Station Pensacola, Florida

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... This report provides the results of the audit of 19 projects, valued at $288.9 million, for the realignment of the Naval Air Technical Training Center from Naval Air Station Memphis, Tennessee, to Naval Air Station Pensacola, Florida...

  20. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Training Center Great Lakes, Illinois

    National Research Council Canada - National Science Library

    Granetto, Paul

    1994-01-01

    .... The Hull Technician School will share building 520 with the Advanced Hull Technician School, which is being realigned from the Naval Training Center San Diego, California, under project P-608T...

  1. Defense Base Realignment and Closure Budget Data for the Realignment of Navy and Air Force Food Services Training at Lackland Air Force Base, Texas

    National Research Council Canada - National Science Library

    Granetto, Paul

    1996-01-01

    ... of the FY 1997 audit coverage. Public Law 102-190, "National Defense Authorization Act for Fiscal Years 1992 and 1993," December 5, 1991, directs the Secretary of Defense to ensure that the amount of the authorization that DoD...

  2. Cleanups In My Community (CIMC) - Base Realignment and Closure (BRAC) Superfund Sites, National Layer

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data layer provides access to Base Realignment and Closure (BRAC) Superfund Sites as part of the CIMC web service. EPA works with DoD to facilitate the reuse...

  3. Cleanups In My Community (CIMC) - RCRA and Base Realignment and Closure (BRAC) Federal Facilities, National Layer

    Data.gov (United States)

    U.S. Environmental Protection Agency — This data layer provides access to Resource Conservation and Recovery Act (RCRA) Base Realignment and Closure (BRAC) sites as part of the CIMC web service. The...

  4. Military Bases: Opportunities Exist to Improve Future Base Realignment and Closure Rounds

    Science.gov (United States)

    2013-03-01

    Operational Army—realigns Fort Bliss , TX; Fort Hood, TX; Fort Riley, KS; Fort Campbell, KY; and Fort Sill, OK to include rebasing of units from overseas to...Committee on Appropriations United States Senate The Honorable Tim Johnson Chairman The Honorable Mark Kirk Ranking Member Subcommittee on Military

  5. 77 FR 3503 - Guam Military Base Realignment Contractor Recruitment Standards

    Science.gov (United States)

    2012-01-24

    ... Contractor Recruitment Standards AGENCY: Employment and Training Administration, Labor. ACTION: Notice... issuing this notice to announce the recruitment standards that construction contractors are required to... contractors engaged in construction projects related to the realignment of U.S. military forces from Okinawa...

  6. Realigning thunder and lightning: temporal adaptation to spatiotemporally distant events.

    Directory of Open Access Journals (Sweden)

    Jordi Navarra

    Full Text Available The brain is able to realign asynchronous signals that approximately coincide in both space and time. Given that many experience-based links between visual and auditory stimuli are established in the absence of spatiotemporal proximity, we investigated whether or not temporal realignment arises in these conditions. Participants received a 3-min exposure to visual and auditory stimuli that were separated by 706 ms and appeared either from the same (Experiment 1 or from different spatial positions (Experiment 2. A simultaneity judgment task (SJ was administered right afterwards. Temporal realignment between vision and audition was observed, in both Experiment 1 and 2, when comparing the participants' SJs after this exposure phase with those obtained after a baseline exposure to audiovisual synchrony. However, this effect was present only when the visual stimuli preceded the auditory stimuli during the exposure to asynchrony. A similar pattern of results (temporal realignment after exposure to visual-leading asynchrony but not after exposure to auditory-leading asynchrony was obtained using temporal order judgments (TOJs instead of SJs (Experiment 3. Taken together, these results suggest that temporal recalibration still occurs for visual and auditory stimuli that fall clearly outside the so-called temporal window for multisensory integration and appear from different spatial positions. This temporal realignment may be modulated by long-term experience with the kind of asynchrony (vision-leading that we most frequently encounter in the outside world (e.g., while perceiving distant events.

  7. Early endoscopic realignment in posterior urethral injuries.

    Science.gov (United States)

    Shrestha, B; Baidya, J L

    2013-01-01

    Posterior urethral injury requires meticulous tertiary care and optimum expertise to manage successfully. The aim of our study is to describe our experiences with pelvic injuries involving posterior urethra and their outcome after early endoscopic realignment. A prospective study was carried out in 20 patients with complete posterior urethral rupture, from November 2007 till October 2010. They presented with blunt traumatic pelvic fracture and underwent primary realignment of posterior urethra in our institute. The definitive diagnosis of urethral rupture was made after retrograde urethrography and antegrade urethrography where applicable. The initial management was suprapubic catheter insertion after primary trauma management in casualty. After a week of conservative management with intravenous antibiotics and pain management, patients were subjected to the endoscopic realignment. The follow up period was at least six months. The results were analyzed with SPSS software. After endoscopic realignment, all patients were advised CISC for the initial 3 months. All patients voided well after three months of CISC. However, 12 patients were lost to follow up by the end of 6 postoperative months. Out of eight remaining patients, two had features of restricture and were managed with DVU followed by CISC again. One patient with restricture had some degree of erectile dysfunction who improved significantly after phospodiesterase inhibitors. None of the patients had features of incontinence. Early endoscopic realignment of posterior urethra is a minimally invasive modality in the management of complete posterior urethral injury with low rates of incontinence and impotency.

  8. Managed Realignment in Europe: Achievements and Challenges

    Science.gov (United States)

    Esteves, L. S.

    2017-12-01

    Environmental and financial sustainability associated with climate change adaptation needs are the key drivers leading to the development of national and regional strategies which promote managed realignment. Managed realignment aims to maximise environmental and socioeconomic benefits by creating space for coastal habitats to evolve more naturally. Therefore, the natural adaptive capacity of coastal habitats and the range of ecosystem services they provide are paramount to the success of these strategies. In Europe, most projects involve the creation of intertidal areas by artificially restoring tidal flow into embanked land. Projects generally involve at least one of the following: removal, breach, or realignment of existing coastal protection, controlled tidal restoration and managed retreat (i.e. relocation from risk areas). Since early 1980s, over 140 managed realignment projects have been implemented (or are under construction) in Europe, mainly in the UK, France, Germany, Netherlands, Belgium and Spain, resulting in approximately 15,800 ha of habitat creation. This paper will present an overview of managed realignment initiatives in Europe, summarise achievements so far and discuss ways to overcome commonly faced challenges, focusing on high-level strategy; delivery of objectives at the project level; and public perception. Projects vary greatly as planning must take into account local social and environmental characteristics and constraints. Evidence of benefits gained in each project and their contribution to high level targets need to be quantified and widely disseminated to help attract public support. However, the lack of information and/or undisputable evidence about the realisation of tangible socioeconomic benefits is still hindering public acceptance. The knowledge about how the many social, economic, and technical aspects interact is evolving fast as new policies are formulated, more projects are implemented, and monitoring data are made available.

  9. [Endoscopic realignment for post-traumatic rupture of posterior urethra].

    Science.gov (United States)

    Tazi, Hicham; Ouali, Mohammed; Lrhorfi, My Hfid; Moudouni, Saïd; Tazi, Karim; Lakrissa, Ahmed

    2003-12-01

    To analyse the long-term results of treatment of posterior urethral disruptions with endoscopic realignment, and to assess the efficacy, simplicity and benefit of this technique. Between 1989 and 2001, thirty six patients were treated by endoscopic realignment for traumatic rupture of the posterior urethra. The analysis of the results took in consideration the quality of urinary stream, the continence and the erectile function. With a mean follow-up of thirty four months (12 to 72 months), the 36 patients treated by endoscopic realignment are continent and urinate with a satisfactory urine output. This result was obtained after internal urethrotomy in 13 patients (36.1%), and after transperineal urethroplasty in two patients. Only 7 patients (19.4%) developed an impotence. The endoscopic realignment can be considered like initial treatment of all post-traumatic rupture of the posterior urethra. This simple and little aggressive technique doesn't compromise the recourse to another type of ulterior treatment and resulted in negligible morbidity. The secondary urethral strictures are short and accessible to an endoscopic urethrotomy.

  10. Deferred endoscopic urethral realignment: Role in management of traumatic posterior urethral disruption

    Directory of Open Access Journals (Sweden)

    M.A. Elgammal

    2014-06-01

    Conclusion: When early realignment is postponed for any reason, deferred endoscopic realignment is considered an adequate substitute because urethral continuity can be achieved in a group of patients without increase incidence of impotence and incontinence.

  11. Realignment Surgery for Malunited Ankle Fracture.

    Science.gov (United States)

    Guo, Chang-Jun; Li, Xing-Cheng; Hu, Mu; Xu, Yang; Xu, Xiang-Yang

    2017-02-01

    To investigate the characteristics and the results of realignment surgery for the treatment of malunited ankle fracture. Thirty-three patients with malunited fractures of the ankle who underwent reconstructive surgery at our hospital from January 2010 to January 2014 were reviewed. The tibial anterior surface angle (TAS), the tibiotalar tilt angle (TTA), the malleolar angle (MA), and the tibial lateral surface angle (TLS) were measured. Clinical assessment was performed with use of the American Orthopaedic Foot and Ankle Society (AOFAS) scale and visual analogue scale (VAS) scores, and the osteoarthritis stage was determined radiographically with the modified Takakura classification system. The Wilcoxon matched-pairs test was used to analyze the difference between the preoperative and the postoperative data. The mean follow-up was 36 months (range, 20-60 months). The mean age at the time of realignment surgery was 37.1 years (range, 18-62 years). Compared with preoperation, the TAS at the last follow-up showed a significant increase (88.50° ± 4.47° vs. 90.80° ± 3.49°, P = 0.0035); similar results were observed in TTA (1.62° ± 1.66° vs. 0.83° ± 0.90°, P ankle osteoarthritis, and was treated by ankle joint distraction. Realignment surgery for a malunited ankle fracture can reduce pain, improve function, and delay ankle arthrodesis or total ankle replacement. Postoperative large talar tilt and advanced stages of ankle arthritis are the risk factors for the surgery. © 2017 Chinese Orthopaedic Association and John Wiley & Sons Australia, Ltd.

  12. Chronostratigraphy and geochronology: A proposed realignment

    NARCIS (Netherlands)

    Zalasiewicz, J.; Cita, M.B.; Hilgen, F.; Pratt, B.R.; Strasser, A.; Thierry, J.; Weissert, H.

    2013-01-01

    We propose a realignment of the terms geochronology and chronostratigraphy that brings them broadly into line with current use, while simultaneously resolving the debate over whether the Geological Time Scale should have a “single” or “dual” hierarchy of units: Both parallel sets of units are

  13. Influence of rheology on realignment of mantle convective structure with plate motion after a plate reorganization

    Science.gov (United States)

    van Hunen, J.; Zhong, S.

    2006-08-01

    Small-scale convection (SSC) rolls below the oceanic lithosphere have the tendency to align with the large-scale shearing direction and thus with the plate motion direction relative to the deep mantle. Understanding the timescales of and processes responsible for realignment would contribute significantly to our understanding of the unresolved phenomena in the Pacific such as gravity lineations, small-scale seismic velocity variations, and intraplate volcanism that cannot be explained by hot spots. In this study we examine the evolution of those convection rolls when this relative plate motion direction is suddenly changed, as suggested by the kink in the Hawaii-Emperor seamount chain. Using three-dimensional numerical flow models, we investigate the realignment of SSC rolls after a change in plate motion direction. From the nature of the SSC, it is expected that rheological parameters dominate the characteristics of this realignment. Our results show that this is indeed the case. We find that (1) using constraints from onset timing of SSC, realignment of rolls can occur as fast as within 20 Ma, but might also take much longer, dependent on the rheology; (2) the realignment period is strongly correlated to the sum of large-scale shear stress induced by plate motion and small-scale shear stress from the SSC itself; (3) in a mantle deforming by dislocation creep, realignment occurs faster than by diffusion creep, because dislocation creep SSC is more vigorous; and (4) activation energy has little influence on the realignment time. Possible evidence for the realignment period might come from precise age determination of intraplate volcanism or azimuthal seismic anisotropy.

  14. 7 CFR 1210.501 - Realignment of districts.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Realignment of districts. 1210.501 Section 1210.501 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING..., Hutchinson, Roberts, Hemphill, Oldham, Potter, Carson, Gray, Wheeler, Deaf Smith, Randall, Armstrong, Donley...

  15. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  16. When to remove the urethral catheter after endoscopic realignment of traumatic disruption of the posterior urethra?

    Science.gov (United States)

    El Darawany, H M

    2017-09-01

    To detect the optimal time for urethral stent removal after endoscopic urethral realignment and its effect on the incidence of development of urethral stricture. Eighteen patients underwent endoscopic urethral realignment after traumatic disruption of the posterior urethra. Post-operative urethroscopy was done using the flexible cystoscope to assess progress of urethral healing. The urethral Foley catheter that served as a stent and for urine drainage was removed only when complete mucosal healing was observed by flexible urethroscopy. There was a post-operative follow-up period of 12-36months. Uroflowmetry was performed at the end of the follow-up period. Endoscopy 6weeks after realignment showed 50-75% mucosal epithelialization at the site of urethral disruption in all patients. Epithelialization was complete at 9weeks in 15/18 patients (83%) and at 12weeks in the remaining 3 patients (17%). One patient (5.6%) developed a mild symptomatic stricture 5months post stent removal that was successfully treated by a single session of visual urethrotomy. All 18 patients had normal uroflowmetry readings at 12-36months after realignment. Urethral stenting should be continued till mucosal healing at the site of urethral disruption became complete. Removal of the stent at this optimal time decreases the incidence of post-operative urethral stricture. Flexible urethroscopy was a safe procedure for post-operative follow-up of endoscopic urethral realignment to assess the progress and completion of mucosal healing at the site of realignment. 4. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  17. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  18. Delayed primary realignment of posterior urethral rupture | Shittu ...

    African Journals Online (AJOL)

    The treatment of acute posterior urethral rupture is controversial. Twelve patients who presented with acute posterior urethral rupture over a five--year period were treated by delayed primary realignment of the injury. The technique of this procedure and the outcome are the subject of this presentation. Eight patients had ...

  19. Defense Industrial Base (DIB): Munitions Realignment for 2020

    Science.gov (United States)

    2013-03-01

    munitions DIB by companies like Coca Cola , Quaker Oats, and Eastman Kodak. As industrial mobilization quickly increased, the requirements decreased...industry and the munitions DIB. This report documented the volatility associated with the production of munitions and financial risks to which

  20. Computed tomographic evaluation of realignment surgery for patellar subluxation

    International Nuclear Information System (INIS)

    Inoue, Masahiro; Shino, Konsei; Maeda, Akira; Nakata, Ken; Ono, Hiroo.

    1994-01-01

    Forty-two patients with patellar subluxation underwent realignment surgery of the knee extensor mechanism. The surgery included, lateral release, advancement and reefing of the vastus medialis and the medial capsule and tibial tubercle transfer (Elmslie-Trillat procedure). The effect of surgery was evaluated using computed tomograms of the pre- and post-operative knees at 0, 15, 30 and 45 degrees of knee flexion. The degree of patellofemoral incongruence on CT was expressed using two parameters of patellar tilt and patellar shift. Thirty-three volunteers without any patello-femoral symptoms served as controls. Postoperatively both the patellar tilt and the patellar shift improved significantly. The average patellar tilt and the patellar shift of the patient group at 45 degrees were comparable with those of controls. However, it was found by CT that the realignment surgery was less effective between 0 and 30 degrees of knee flexion. (author)

  1. Computed tomographic evaluation of realignment surgery for patellar subluxation

    Energy Technology Data Exchange (ETDEWEB)

    Inoue, Masahiro (Kansai Rosai Hospital, Amagasaki (Japan)); Shino, Konsei; Maeda, Akira; Nakata, Ken; Ono, Hiroo

    1994-01-01

    Forty-two patients with patellar subluxation underwent realignment surgery of the knee extensor mechanism. The surgery included, lateral release, advancement and reefing of the vastus medialis and the medial capsule and tibial tubercle transfer (Elmslie-Trillat procedure). The effect of surgery was evaluated using computed tomograms of the pre- and post-operative knees at 0, 15, 30 and 45 degrees of knee flexion. The degree of patellofemoral incongruence on CT was expressed using two parameters of patellar tilt and patellar shift. Thirty-three volunteers without any patello-femoral symptoms served as controls. Postoperatively both the patellar tilt and the patellar shift improved significantly. The average patellar tilt and the patellar shift of the patient group at 45 degrees were comparable with those of controls. However, it was found by CT that the realignment surgery was less effective between 0 and 30 degrees of knee flexion. (author).

  2. Electromyographic investigation of unstable patella before and after its realignment operation

    Directory of Open Access Journals (Sweden)

    D D Baksi

    2011-01-01

    Full Text Available Background: Patellar dislocations are either due to superolateral contracture of the soft tissue or imbalance of the power between the vastus medialis (VM and the vastus lateralis (VL. The imbalance of muscle power as an etiology of patellar dislocation has not been studied. Hence, we studied the recurrent, habitual and permanent dislocations of the patella with an electromyogram (EMG of the vastus medialis, vastus lateralis, and pes anserinus, before and after realignment operations, to document the muscle imbalance and effectiveness of the realignment operation. Materials and Methods: An electromyographic investigation was carried out on the vastus medialis and vastus lateralis in nine recurrent, 20 habitual, and 13 permanent dislocations of the patella, before and after their realignment operations. Pes anserinus transposition, which acted as a medial stabilizer of the patella, was also investigated with an EMG study, to understand its role on patellar stability at 0΀, 30΀, 60΀, 90΀, 120΀, 150΀, and full flexion of the knee. The age of the patients varied from nine to 30 (mean 15 years. There were 24 males and 18 females. Twenty-six patellar dislocations were on the right and 16 were on the left side. Results: Electromyographic pictures reveal subnormal activity of the vastus medialis in all types of dislocations and similar activities of the vastus lateralis in permanent and habitual dislocations recorded pre operatively, which recovered to almost normal values postoperatively, at the mean one-year follow-up. Pes anserinus, which was used for medial stabilization of the patella after its realignment, maintained normal EMG activity before and after the operation. Conclusion: This study is significant for understanding the imbalance of muscle activities in patients with an unstable patella, which can be rectified without recurrence after pes anserinus transposition.

  3. Early endoscopic realignment of traumatic anterior and posterior urethral disruptions under caudal anaesthesia - a 5-year review.

    Science.gov (United States)

    Olapade-Olaopa, E O; Atalabi, O M; Adekanye, A O; Adebayo, S A; Onawola, K A

    2010-01-01

    We recently described early rigid retrograde endoscopic realignment of the disrupted urethra under caudal anaesthesia in the outpatient setting. This retrospective study was performed to evaluate our medium-term results. A retrospective review of patients who had early rigid retrograde endoscopic realignment of traumatic urethral disruptions in our institution over a 5-year period was done and the relevant data extracted and analyzed. Fourteen acutely ruptured urethras (10 posterior and four anterior) were endoscopically realigned early in the study period. Nine (90%) of the posterior disruptions occurred at bulbo-membranous urethra (distal to the external sphincter mechanism). Thirteen of the ruptured urethras (93%) were successfully realigned (nine posterior and four anterior) and postoperative clean intermittent self-calibration (CIC) was instituted in 10 patients. The mean follow-up period was 36.6 months (range 18-54 months). The mean operating time and the median hospital stay were 22 min (range 8-68 min) and 3 days (range 1-10 days), respectively, and were shorter in patients with injuries of the anterior urethra than those with posterior urethral tears (p < or = 0.0001). Post-realignment, all 13 patients were potent and continent. Two patients required additional procedures (direct vision internal urethrotomy or urethral dilation) and one patient has remained on CIC i.e. a stricture rate of 21%. Early retrograde endoscopic realignment under caudal analgesia is suitable and cost-effective for patients with acute traumatic urethral disruptions and has good medium-term results. In addition, an early postoperative regimen of CIC significantly reduced stricture-formation in our series.

  4. Endoscopic urethral realignment of traumatic urethral disruption: A monocentric experience

    Directory of Open Access Journals (Sweden)

    Hamed Mohamed El Darawany

    2018-01-01

    Conclusions: Endoscopic primary realignment of posterior urethral rupture is less invasive and a safer procedure, without pelvic hemorrhage or additional injuries. It has low incidence of severe urethral stricture and avoids the need for delayed open urethral reconstruction.

  5. A motion correction algorithm for an image realignment programme useful for sequential radionuclide renography

    International Nuclear Information System (INIS)

    De Agostini, A.; Moretti, R.; Belletti, S.; Maira, G.; Magri, G.C.; Bestagno, M.

    1992-01-01

    The correction of organ movements in sequential radionuclide renography was done using an iterative algorithm that, by means of a set of rectangular regions of interest (ROIs), did not require any anatomical marker or manual elaboration of frames. The realignment programme here proposed is quite independent of the spatial and temporal distribution of activity and analyses the rotational movement in a simplified but reliable way. The position of the object inside a frame is evaluated by choosing the best ROI in a set of ROIs shifted 1 pixel around the central one. Statistical tests have to be fulfilled by the algorithm in order to activate the realignment procedure. Validation of the algorithm was done for different acquisition set-ups and organ movements. Results, summarized in Table 1, show that in about 90% of the stimulated experiments the algorithm is able to correct the movements of the object with a maximum error less of equal to 1 pixel limit. The usefulness of the realignment programme was demonstrated with sequential radionuclide renography as a typical clinical application. The algorithm-corrected curves of a 1-year-old patient were completely different from those obtained without a motion correction procedure. The algorithm may be applicable also to other types of scintigraphic examinations, besides functional imaging in which the realignment of frames of the dynamic sequence was an intrinsic demand. (orig.)

  6. Neural mechanisms underlying spatial realignment during adaptation to optical wedge prisms.

    Science.gov (United States)

    Chapman, Heidi L; Eramudugolla, Ranmalee; Gavrilescu, Maria; Strudwick, Mark W; Loftus, Andrea; Cunnington, Ross; Mattingley, Jason B

    2010-07-01

    Visuomotor adaptation to a shift in visual input produced by prismatic lenses is an example of dynamic sensory-motor plasticity within the brain. Prism adaptation is readily induced in healthy individuals, and is thought to reflect the brain's ability to compensate for drifts in spatial calibration between different sensory systems. The neural correlate of this form of functional plasticity is largely unknown, although current models predict the involvement of parieto-cerebellar circuits. Recent studies that have employed event-related functional magnetic resonance imaging (fMRI) to identify brain regions associated with prism adaptation have discovered patterns of parietal and cerebellar modulation as participants corrected their visuomotor errors during the early part of adaptation. However, the role of these regions in the later stage of adaptation, when 'spatial realignment' or true adaptation is predicted to occur, remains unclear. Here, we used fMRI to quantify the distinctive patterns of parieto-cerebellar activity as visuomotor adaptation develops. We directly contrasted activation patterns during the initial error correction phase of visuomotor adaptation with that during the later spatial realignment phase, and found significant recruitment of the parieto-cerebellar network--with activations in the right inferior parietal lobe and the right posterior cerebellum. These findings provide the first evidence of both cerebellar and parietal involvement during the spatial realignment phase of prism adaptation. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  7. Long-term outcome of primary endoscopic realignment for bulbous urethral injuries: risk factors of urethral stricture.

    Science.gov (United States)

    Seo, Ill Young; Lee, Jea Whan; Park, Seung Chol; Rim, Joung Sik

    2012-12-01

    Although endoscopic realignment has been accepted as a standard treatment for urethral injuries, the long-term follow-up data on this procedure are not sufficient. We report the long-term outcome of primary endoscopic realignment in bulbous urethral injuries. Patients with bulbous urethral injuries were treated by primary endoscopic realignment between 1991 and 2005. The operative procedure included suprapubic cystostomy and transurethral catheterization using a guide wire, within 72 hours of injury. The study population included 51 patients with a minimum follow-up duration of 5 years. The most common causes of the injuries were straddle injury from falling down (74.5%), and pelvic bone fracture (7.8%). Gross hematuria was the most common complaint (92.2%). Twenty-three patients (45.1%) had complete urethral injuries. The mean time to operation after the injury was 38.8±43.2 hours. The mean operation time and mean indwelling time of a urethral Foley catheter were 55.5±37.6 minutes and 22.0±11.9 days, respectively. Twenty out of 51 patients (39.2%) were diagnosed with urethral stricture in 89.1±36.6 months after surgery. A multivariate analysis revealed that young age and operation time were independent risk factors for strictures as a complication of urethral realignment (hazard ratio [HR], 6.554, P=0.032; HR, 6.206, P=0.035). Urethral stricture commonly developed as a postoperative complication of primary endoscopic urethral realignment for bulbous urethral injury, especially in young age and long operation time.

  8. Early Primary Endoscopic Realignment of Posterior Urethral Injury- Evaluation and Follow-Up

    Directory of Open Access Journals (Sweden)

    Prasad Mylarappa

    2013-07-01

    Full Text Available Background: The management of complete orpartial posterior urethral disruption is contro-versial and much debate continues regarding theimmediate, early and delayed definitive therapy.Objective: We report our institutional experi-ence and long term result of early endoscopicrealignment of traumatic posterior urethral in-jury. Method and Materials: Between Septem-ber 1996 and March 2012, ninety six men witheither complete (84 or partial (12 posteriorurethral injury secondary to blunt trauma (11or pelvic fractures (85, presented to our insti-tution and these patients underwent immediatesuprapubic cystostomy followed by early pri-mary endoscopic realignment done 3-8 daysafter injury. Result: Seventy four patients(92.5% were continent after catheter removal.Urethral stricture was seen in seventy two pa-tients (90% of which fifty patients (69.4%had simple urethral stricture who were managedby urethral dilatation on outpatient basis. Four-teen patients (19.4% developed short stric-tures which were successfully treated with vi-sual internal urethrotomy. Eight patients(11.1% required anastomotic urethroplasty fordense stricture. Potency was retained in sev-enty five patients (93.75%. Urinary flow mea-surements at follow-up evaluation were satis-factory.Conclusion:Early primary endoscopic realign-ment in our experience reduces time to spon-taneous voiding, decrease the need for majorreconstructive surgery and long term supra pub-lic urinary diversion.

  9. Cine MR imaging before and after realignment surgery for patellar maltracking - comparison with axial radiographs

    Energy Technology Data Exchange (ETDEWEB)

    Brossmann, J. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Muhle, C. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Buell, C.C. [Rheumaklinik, Bad Bramstedt (Germany); Zieplies, J. [Lubinus Klinik, Kiel (Germany); Melchert, U.H. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Brinkmann, G. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Schroeder, C. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany); Heller, M. [Klinik fuer Radiologische Diagnostik der Univ. Kiel (Germany)

    1995-04-01

    Comparison of motion-triggered cine magnetic resonance (MR) imaging and conventional radiographs for the assessment of operative results of patellar realignment. Fifteen patients with recurrent patellar dislocation or patellar subluxation were evaluated with conventional axial radiographs before and after realignment surgery by measuring the congruence angle (CA), lateral patellofemoral angle (LPFA), and lateral displacement (d). In eight patients the patellofemoral joint was additionally evaluated pre- and postoperatively with motion-triggered cine MR imaging by determining the bisect offset (BSO), lateral patellar displacement (LPD), and patellar tilt angle (PTA). Significant differences between the pre- and postoperative measurements were found for all MR imaging parameters (BSO, LPD, PTA: p<0.01) but not for the conventional X-ray parameters (CA: p=0.70, LPFA: p=0.56; d: p=0.04). Motion-triggered cine MR imaging was superior to conventional tangential radiographs for assessing the effectiveness of patellar realignment surgery. (orig.)

  10. Cine MR imaging before and after realignment surgery for patellar maltracking - comparison with axial radiographs

    International Nuclear Information System (INIS)

    Brossmann, J.; Muhle, C.; Buell, C.C.; Zieplies, J.; Melchert, U.H.; Brinkmann, G.; Schroeder, C.; Heller, M.

    1995-01-01

    Comparison of motion-triggered cine magnetic resonance (MR) imaging and conventional radiographs for the assessment of operative results of patellar realignment. Fifteen patients with recurrent patellar dislocation or patellar subluxation were evaluated with conventional axial radiographs before and after realignment surgery by measuring the congruence angle (CA), lateral patellofemoral angle (LPFA), and lateral displacement (d). In eight patients the patellofemoral joint was additionally evaluated pre- and postoperatively with motion-triggered cine MR imaging by determining the bisect offset (BSO), lateral patellar displacement (LPD), and patellar tilt angle (PTA). Significant differences between the pre- and postoperative measurements were found for all MR imaging parameters (BSO, LPD, PTA: p<0.01) but not for the conventional X-ray parameters (CA: p=0.70, LPFA: p=0.56; d: p=0.04). Motion-triggered cine MR imaging was superior to conventional tangential radiographs for assessing the effectiveness of patellar realignment surgery. (orig.)

  11. Military Base Realignments and Closures: More Guidance and Information Needed to Take Advantage of Opportunities to Consolidate Training

    Science.gov (United States)

    2016-02-01

    Management Training, (2) Joint Center of Excellence for Culinary Training, (3) Joint Center of Excellence for Religious Training and Education, (4...Realignments and Closures For the remaining three training functions— Culinary training, Transportation Management training, and Religious training— the... culinary , transportation management , and chaplain training programs did not have data for various reasons, including a change in accounting systems, and

  12. Vesicourethral fistula after retrograde primary endoscopic realignment in posterior urethral injury.

    Science.gov (United States)

    Arora, Rajat; John, Nirmal Thampi; Kumar, Santosh

    2015-01-01

    A 22-year-old male patient presented with iatrogenic vesicourethral fistula after immediate retrograde endoscopic realignment of urethra after a posterior urethral injury associated with pelvic fracture. Copyright © 2015 Elsevier Inc. All rights reserved.

  13. Internal Versus External Fixation of Charcot Midfoot Deformity Realignment.

    Science.gov (United States)

    Lee, Daniel J; Schaffer, Joseph; Chen, Tien; Oh, Irvin

    2016-07-01

    Internal and external fixation techniques have been described for realignment and arthrodesis of Charcot midfoot deformity. There currently is no consensus on the optimal method of surgical reconstruction. This systematic review compared the clinical results of surgical realignment with internal and external fixation, specifically in regard to return to functional ambulation, ulcer occurrence, nonunion, extremity amputation, unplanned further surgery, deep infection, wound healing problems, peri- or intraoperative fractures, and total cases with any complication. A search of multiple databases for all relevant articles published from January 1, 1990, to March 22, 2014, was performed. A logistic regression model evaluated each of the outcomes and its association with the type of fixation method. The odds of returning to functional ambulation were 25% higher for internal fixation (odds ratio [OR], 1.259). Internal fixation had a 42% reduced rate of ulcer occurrence (OR, 0.578). External fixation was 8 times more likely to develop radiographic nonunion than internal fixation (OR, 8.2). Internal fixation resulted in a 1.5-fold increase in extremity amputation (OR, 1.488), a 2-fold increase in deep infection (OR, 2.068), a 3.4-fold increase in wound healing complications (OR, 3.405), and a 1.5-fold increase in the total number of cases experiencing any complication (OR, 1.525). This was associated with a 20% increase in the need for unplanned further surgery with internal fixation (OR, 1.221). Although internal fixation may decrease the risk of nonunion and increase return to functional ambulation, it had a higher rate of overall complications than external fixation for realignment and arthrodesis of Charcot midfoot deformity. [Orthopedics. 2016; 39(4):e595-e601.]. Copyright 2016, SLACK Incorporated.

  14. Movement analysis of chest MR image under rest breath using realignment of SPM

    International Nuclear Information System (INIS)

    Kitamura, Shigemi; Usui, Shuji; Horiguchi, Takayoshi; Akiyama, Mitoshi

    2007-01-01

    Analyses of diaphragm and chest wall motion are good indicators to evaluate clinical status and pulmonary function before and after surgery for respiratory disease. Noninvasive MR images using fast gradient recalled echo techniques recently have received a great deal of attention for their assessment of inspiratory motion. However, it is laborious to analyze a large number of dynamic MR images. Therefore, we performed movement analyses of chest two-dimensional (2D) MR images by using the public domain software statistical parametric mapping (SPM) Realignment sub-routine, which is commonly used for the motion correction of brain functional MRI analyses. First, dynamic 2D MR images of a glue-stick phantom were measured as a simple reciprocal movement model and were numerically analyzed by the SPM Realignment. The resulting translation to each axis coincided with the measured values. Then the dynamic images of normal volunteers under free breathing were analyzed by the same method, and we found that the inspiratory motions were quantitatively shown as the translation to each axis. These results revealed that the SPM Realignment is a useful tool for screening the magnitude and characteristics of inspiratory motion. (author)

  15. Dynamic photoinduced realignment processes in photoresponsive block copolymer films: effects of the chain length and block copolymer architecture.

    Science.gov (United States)

    Sano, Masami; Shan, Feng; Hara, Mitsuo; Nagano, Shusaku; Shinohara, Yuya; Amemiya, Yoshiyuki; Seki, Takahiro

    2015-08-07

    A series of block copolymers composed of an amorphous poly(butyl methacrylate) (PBMA) block connected with an azobenzene (Az)-containing liquid crystalline (PAz) block were synthesized by changing the chain length and polymer architecture. With these block copolymer films, the dynamic realignment process of microphase separated (MPS) cylinder arrays of PBMA in the PAz matrix induced by irradiation with linearly polarized light was studied by UV-visible absorption spectroscopy, and time-resolved grazing incidence small angle X-ray scattering (GI-SAXS) measurements using a synchrotron beam. Unexpectedly, the change in the chain length hardly affected the realignment rate. In contrast, the architecture of the AB-type diblock or the ABA-type triblock essentially altered the realignment feature. The strongly cooperative motion with an induction period before realignment was characteristic only for the diblock copolymer series, and the LPL-induced alignment change immediately started for triblock copolymers and the PAz homopolymer. Additionally, a marked acceleration in the photoinduced dynamic motions was unveiled in comparison with a thermal randomization process.

  16. The Transformational Quality of Base Realignment and Closure 2005

    National Research Council Canada - National Science Library

    Lathroum, John A

    2006-01-01

    ...) our infrastructure with defense strategy.. .by maximiz(ing) warfighting capability and efficiency." This study examines the transformational capability of BRAC 2005 by analyzing three recommendations (USA: Operational Army (IGPBS), E&T...

  17. Carbon degradation in agricultural soils flooded with seawater after managed coastal realignment

    Science.gov (United States)

    Sjøgaard, Kamilla S.; Treusch, Alexander H.; Valdemarsen, Thomas B.

    2017-09-01

    Permanent flooding of low-lying coastal areas is a growing threat due to climate change and related sea-level rise. An increasingly common solution to protect coastal areas lying below sea level is intentional flooding by "managed coastal realignment". However, the biogeochemical implications of flooding agricultural soils with seawater are still not well understood. We conducted a 1-year mesocosm experiment to investigate microbial carbon degradation processes in soils flooded with seawater. Agricultural soils were sampled on the northern coast of the island Fyn (Denmark) at Gyldensteen Strand, an area that was subsequently flooded in a coastal realignment project. We found rapid carbon degradation to TCO2 1 day after experimental flooding and onwards and microbial sulfate reduction established quickly as an important mineralization pathway. Nevertheless, no free sulfide was observed as it precipitated as Fe-S compounds with Fe acting as a natural buffer, preventing toxic effects of free sulfide in soils flooded with seawater. Organic carbon degradation decreased significantly after 6 months, indicating that most of the soil organic carbon was refractory towards microbial degradation under the anoxic conditions created in the soil after flooding. During the experiment only 6-7 % of the initial soil organic carbon pools were degraded. On this basis we suggest that most of the organic carbon present in coastal soils exposed to flooding through sea-level rise or managed coastal realignment will be permanently preserved.

  18. Cleanups In My Community (CIMC) - Base Realignment and Closure (BRAC) Superfund Sites, National Layer

    Science.gov (United States)

    This data layer provides access to Base Realignment and Closure (BRAC) Superfund Sites as part of the CIMC web service. EPA works with DoD to facilitate the reuse and redevelopment of BRAC federal properties. When the BRAC program began in the early 1990s, EPA worked with DoD and the states to identify uncontaminated areas and these parcels were immediately made available for reuse. Since then EPA has worked with DoD to clean up the contaminated portions of bases. These are usually parcels that were training ranges, landfills, maintenance facilities and other past waste-disposal areas. Superfund is a program administered by the EPA to locate, investigate, and clean up worst hazardous waste sites throughout the United States. EPA administers the Superfund program in cooperation with individual states and tribal governments. These sites include abandoned warehouses, manufacturing facilities, processing plants, and landfills - the key word here being abandoned.This data layer shows Superfund Sites that are located at BRAC Federal Facilities. Additional Superfund sites and other BRAC sites (those that are not Superfund sites) are included in other data layers as part of this web service.BRAC Superfund Sites shown in this web service are derived from the epa.gov website and include links to the relevant web pages within the attribute table. Data about BRAC Superfund Sites are located on their own EPA web pages, and CIMC links to those pages. The CIMC web service

  19. Slipped upper femoral epiphysis: Outcome after in situ fixation and capital realignment technique

    Directory of Open Access Journals (Sweden)

    Sanjay Arora

    2013-01-01

    Results: Clinical outcome as assessed by Merle d′ Aubigne score was excellent in 6, good in 10, fair in 6 and poor in 1. Half of the in situ fixation patients underwent osteoplasty procedure for femoroacetabular impingement and 5 more were symptomatic. The head neck offset and α angle after in situ pinning were -1.12 ± 3 mm and 66.05 ± 9.7°, respectively and this improved to 8.7 mm and 49°, respectively, after osteoplasty. One child in the pinning group had chondrolysis. Eight patients with severe slip underwent capital realignment. Mean followup was 20.15 months. The anterior head neck offset and α angle were corrected to 6.8 ± 1.72 mm and 44.6 ± 7.0° mm, respectively. Two children with unstable slip in the capital realignment group had avascular necrosis which was diagnosed at presentation by bone scan. Conclusion: High BMI, vitamin D deficiency and endocrine disorders are associated with SUFE in India and should be evaluated as some of these are amenable to prevention and treatment. Most patients treated with in situ pinning developed femoroacetabular impingement. The early results after capital realignment procedure are encouraging and help to avoid a second procedure which is needed in a majority of patients who underwent in situ pinning.

  20. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  1. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  2. Carbon degradation in agricultural soils flooded with seawater after managed coastal realignment

    DEFF Research Database (Denmark)

    Sjøgaard, Kamilla Schneekloth; Treusch, Alexander H.; Valdemarsen, Thomas Bruun

    2017-01-01

    Strand) that was planned to be flooded in a coastal realignment project. We found rapid carbon degradation almost immediately after flooding and microbial sulfate reduction rapidly established as the dominant mineralization pathway. Nevertheless, no free sulfide was observed as it precipitated as Fe...

  3. Implementing Set Based Design into Department of Defense Acquisition

    Science.gov (United States)

    2016-12-01

    The team employed a tailored waterfall process model in order to explore SBD applications in the support of defense acquisition and PORs. Figure 1...Engineering Model . Additionally, the team reviewed DOD case studies that implemented SBD. The SBD principles, along with the common themes from the...acquisition. 14. SUBJECT TERMS set based design, set based thinking, model based systems engineering, concurrent engineering, defense acquisition

  4. Priorities for a 21st-century defense: aligning u.s. Army environmental science and engineering officer resources with the department of defense strategic guidance.

    Science.gov (United States)

    Licina, Derek; Rufolo, Dennis; Story, Mike

    2013-01-01

    The recently published Department of Defense (DoD) strategic guidance highlights the need to ?shape a joint force for the future.? Supporting requirements to shape the joint force while the overall DoD force structure is reduced will be challenging. Fortunately, based on its unique training and experience, the Army Environmental Science and Engineering Officer (ESEO) profession is positioned today to fill anticipated joint public health requirements. Obtaining the U.S. Army Medical Department (AMEDD) approval to meet these requirements will have near-term consequences for the ESEO profession as some existing (albeit antiquated) authorizations may go unfilled. However, long-term dividends for the Medical Service Corps (MSC), AMEDD, Army, and DoD will be achieved by realigning critical resources to future joint and interagency requirements. Assigning ESEOs now to organizations such as the Theater Special Operations Commands (TSOCs), U.S. Agency for International Development (USAID), and the North Atlantic Treaty Organization (NATO) with perceived and real joint force health protection/public health requirements through unique means will ensure our profession remains relevant today and supports the joint force of tomorrow. 2013.

  5. Realignment process of actin stress fibers in single living cells studied by focused femtosecond laser irradiation

    OpenAIRE

    Yasukuni, Ryohei; Spitz, Jean-Alexis; Meallet-Renault, Rachel; Negishi, Takayuki; Tada, Takuji; Hosokawa, Yoichiroh; Asahi, Tsuyoshi; Shukunami, Chisa; Hiraki, Yuji; Masuhara, Hiroshi

    2007-01-01

    Three-dimensional dissection of a single actin stress fiber in a living cell was performed based on multi-photon absorption of a focused femtosecond laser pulse. The realignment process of an actin stress fiber was investigated after its direct cutting by a single-shot femtosecond laser pulse irradiation by high-speed transmission and fluorescence imaging methods. It was confirmed that mechanical force led by the femtosecond laser cutting propagates to entire cell through the cytockelton in a...

  6. Reconfiguring and Realigning the Assessment Feedback Processes for an Undergraduate Criminology Degree

    Science.gov (United States)

    Case, Stephen

    2007-01-01

    A reconfigured and realigned system of assessment feedback was implemented with undergraduates taking criminology modules at Swansea University. The reformulated system integrated explicit engagement with assessment criteria in feedback given on an electronic template form with the use of a statement bank and the offer of follow-up, feedback…

  7. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  8. Ground-Based Midcourse Defense (GMD) Initial Defensive Operations Capability (IDOC) at Vandenberg Air Force Base Environmental Assessment

    Science.gov (United States)

    2003-08-28

    Zielinski , EDAW, Inc., concerning utilities supply and demand for Vandenberg Air Force Base, 1 August. Rush, P., 2002. Personal communication between...Pernell W. Rush, Technical Sergeant, Water Utilities/Water Treatment NCO, USAF 30th CES/CEOIU, Vandenberg Air Force Base, and James E. Zielinski ... Dave Savinsky, Environmental Consultant, 30 CES/CEVC, Vandenberg Air Force Base, on the Preliminary Draft Ground-Based Midcourse Defense (GMD

  9. Nomenclatural realignment of Neotyphodium species with genus Epicholë.

    Science.gov (United States)

    Leuchtmann, Adrian; Bacon, Charles W; Schardl, Christopher L; White, James F; Tadych, Mariusz

    2014-01-01

    Nomenclatural rule changes in the International Code of Nomenclature for algae, fungi and plants, adopted at the 18th International Botanical Congress in Melbourne, Australia, in 2011, provide for a single name to be used for each fungal species. The anamorphs of Epichloë species have been classified in genus Neotyphodium, the form genus that also includes most asexual Epichloë descendants. A nomenclatural realignment of this monophyletic group into one genus would enhance a broader understanding of the relationships and common features of these grass endophytes. Based on the principle of priority of publication we propose to classify all members of this clade in the genus Epichloë. We have reexamined classification of several described Epichloë and Neotyphodium species and varieties and propose new combinations and states. In this treatment we have accepted 43 unique taxa in Epichloë, including distinct species, subspecies, and varieties. We exclude from Epichloë the two taxa Neotyphodium starrii, as nomen dubium, and Neotyphodium chilense, as an unrelated taxon.

  10. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  11. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  12. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  13. Some thoughts to realignment of PortalU

    International Nuclear Information System (INIS)

    Konstantinidis, Stefanie; Kruse, Fred

    2013-01-01

    Environmental information is the basis for improving the environmental situation in the EU. The challenge poses the tailoring of information to a defined group of interest and not only the technical possibility to retrieve the environmental information. Even though, the technical infrastructure for retrieving public environmental information is the first step. Hence, the clear understanding of the needs of the general public is essential for a successful environmental information portal for the interest group ''general public''. What does this mean referring to the German Environmental Information Portal PortalU? Since the launch of PortalU the focus of the portal is set on making available official environmental information especially on German Federal Republic and Federal States level. Currently, information from web pages represents the greatest amount of information. In contrast, information from environmental data catalogs and further data bases represent a smaller amount of information within PortalU. But quantity itself does not tell anything about the demand of a target group. The experience of the last years has shown that environmental interested citizens use mainly general search engines like Google to find information from public environmental web pages. Thus it would be worth thinking about a realignment of PortalU. The idea of a prospective alignment of PortalU is to concentrate on important environmental information, which is not easily found via Google and other general search engines. This information is mainly provided via environmental data catalogs and possibly further data bases. Some thoughts about the potential form and design of a respectively aligned environmental portal are discussed in the paper. (orig.)

  14. The Sociolinguistic Realignment in the Chinese Community in Kuala Lumpur: Past, Present and Future

    Science.gov (United States)

    Wang, Xiaomei

    2010-01-01

    The language situation in the Malaysian Chinese community has undergone great changes in the past century. This paper aims to account for such changes in the framework of sociolinguistic realignment, which is both descriptive and predictive. The triglossic situation in the colonial period (1859-1957) is described; with the support of a language…

  15. The Impact of Osseous Malalignment and Realignment Procedures in Knee Ligament Surgery: A Systematic Review of the Clinical Evidence.

    Science.gov (United States)

    Tischer, Thomas; Paul, Jochen; Pape, Dietrich; Hirschmann, Michael T; Imhoff, Andreas B; Hinterwimmer, Stefan; Feucht, Matthias J

    2017-03-01

    Failure rates of knee ligament surgery may be high, and the impact of osseous alignment on surgical outcome remains controversial. Basic science studies have demonstrated that osseous malalignment can negatively affect ligament strain and that realignment procedures may improve knee joint stability. The purpose of this review was to summarize the clinical evidence concerning the impact of osseous malalignment and realignment procedures in knee ligament surgery. The hypotheses were that lower extremity malalignment would be an important contributor to knee ligament surgery failure and that realignment surgery would contribute to increased knee stability and improved outcome in select cases. Systematic review; Level of evidence, 4. According to the PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) guidelines, a systematic electronic search of the PubMed database was performed in November 2015 to identify clinical studies investigating (A) the influence of osseous alignment on postoperative stability and/or failure rates after knee ligament surgery and (B) the impact of osseous realignment procedures in unstable knees with or without additional knee ligament surgery on postoperative knee function and stability. Methodological quality of the studies was assessed using the Oxford Centre for Evidence-Based Medicine Levels of Evidence and the Coleman Methodological Score (CMS). Of the 1466 potentially relevant articles, 28 studies fulfilled the inclusion and exclusion criteria. Average study quality was poor (CMS, 40). For part A, studies showed increased rerupture rate after anterior cruciate ligament (ACL) replacement in patients with increased tibial slope. Concerning the posterior cruciate ligament (PCL)/posterolateral corner (PLC)/lateral collateral ligament (LCL), varus malalignment was considered a significant risk factor for failure. For part B, studies showed decreased anterior tibial translation after slope-decreasing high tibial

  16. The role of the California Base Closure Environmental Committee's (CBCEC) Radioactive and Mixed Waste Process Action Team (RMWPAT) in expediting site restoration and reuse

    International Nuclear Information System (INIS)

    Laudon, L.S.

    1994-01-01

    The Base Realignment and Closure Act (BRAC) mandated the closing and transfer of Department of Defense (DoD) properties within specific timeframes. Due to requirements of federal and state laws, closing bases must be environmentally remediated to alleviate threats to human health and the environment upon transfer. Certain barriers such as legislative, regulatory, administrative, and technical issues, have been identified which threaten the timely restoration and transfer of these BRAC properties. The state of California, faced with the scheduled closure or realignment of 26 military bases, recognized the need to establish a base closure environmental committee to address issues affecting the timely cleanup and reuse of DoD properties and promote accelerated restoration. Accordingly, the California Base Closure Environmental Committee (CBCEC) was formed by executive order of Governor Pete Wilson. One of the barriers identified by the CBCEC is the potential contamination of DoD facilities with radioactive materials. As a result of the difficulties encountered in assessing the nature and extent of radioactive contamination at DoD sites in California, the CBCEC formed the Radioactive and Mixed Waste Process Action Team (RMWPAT). The RMWPAT was tasked with ''demystifying'' and working to address issues associated with radioactive contamination

  17. 76 FR 43664 - Announcement of Federal Funding Opportunity (FFO)

    Science.gov (United States)

    2011-07-21

    ... anticipated receipt) of all environmental approvals necessary for the construction project to proceed to... related to recommendations of the 2005 Defense Base Closure and Realignment Commission. This notice... Infrastructure Comments'' or ``Transportation Infrastructure Proposal'' on the subject line of the message and...

  18. Some thoughts to realignment of PortalU

    Energy Technology Data Exchange (ETDEWEB)

    Konstantinidis, Stefanie; Kruse, Fred [Lower Saxony Ministry of Environment and Climate Protection, Hannover (Germany). Coordination Centre PortalU

    2013-07-01

    Environmental information is the basis for improving the environmental situation in the EU. The challenge poses the tailoring of information to a defined group of interest and not only the technical possibility to retrieve the environmental information. Even though, the technical infrastructure for retrieving public environmental information is the first step. Hence, the clear understanding of the needs of the general public is essential for a successful environmental information portal for the interest group ''general public''. What does this mean referring to the German Environmental Information Portal PortalU? Since the launch of PortalU the focus of the portal is set on making available official environmental information especially on German Federal Republic and Federal States level. Currently, information from web pages represents the greatest amount of information. In contrast, information from environmental data catalogs and further data bases represent a smaller amount of information within PortalU. But quantity itself does not tell anything about the demand of a target group. The experience of the last years has shown that environmental interested citizens use mainly general search engines like Google to find information from public environmental web pages. Thus it would be worth thinking about a realignment of PortalU. The idea of a prospective alignment of PortalU is to concentrate on important environmental information, which is not easily found via Google and other general search engines. This information is mainly provided via environmental data catalogs and possibly further data bases. Some thoughts about the potential form and design of a respectively aligned environmental portal are discussed in the paper. (orig.)

  19. Tensile Mechanical Properties and Dynamic Collagen Fiber Re-Alignment of the Murine Cervix are Dramatically Altered Throughout Pregnancy.

    Science.gov (United States)

    Barnum, Carrie E; Fey, Jennifer L; Weiss, Stephanie N; Barila, Guillermo; Brown, Amy G; Connizzo, Brianne K; Shetye, Snehal S; Elovitz, Michal A; Soslowsky, Louis J

    2017-06-01

    The cervix is a unique organ able to dramatically change its shape and function by serving as a physical barrier for the growing fetus and then undergoing dramatic dilation allowing for delivery of a term infant. As a result, the cervix endures changing mechanical forces from the growing fetus. There is an emerging concept that the cervix may change or remodel "early" in many cases of spontaneous preterm birth (sPTB). However, the mechanical role of the cervix in both normal and preterm birth remains unclear. Therefore, the primary objective of this study was to determine the mechanical and structural responses of murine cervical tissue throughout a normal gestational time course. In this study, both tissue structural and material properties were determined via a quasi-static tensile load-to-failure test, while simultaneously obtaining dynamic collagen fiber re-alignment via cross-polarization imaging. This study demonstrated that the majority of the mechanical properties evaluated decreased at midgestation and not just at term, while collagen fiber re-alignment occurred earlier in the loading curve for cervices at term. This suggests that although structural changes in the cervix occur throughout gestation, the differences in material properties function in combination with collagen fiber re-alignment as mechanical precursors to regulate term gestation. This work lays a foundation for investigating cervical biomechanics and the role of the cervix in preterm birth.

  20. Investigating an approach to the alliance based on interpersonal defense theory.

    Science.gov (United States)

    Westerman, Michael A; Muran, J Christopher

    2017-09-01

    Notwithstanding consistent findings of significant relationships between the alliance and outcome, questions remain to be answered about the relatively small magnitude of those correlations, the mechanisms underlying the association, and how to conceptualize the alliance construct. We conducted a preliminary study of an approach to the alliance based on interpersonal defense theory, which is an interpersonal reconceptualization of defense processes, to investigate the promise of this alternative approach as a way to address the outstanding issues. We employed qualitative, theory-building case study methodology, closely examining alliance processes at four time points in the treatment of a case in terms of a case formulation based on interpersonal defense theory. The results suggested that our approach made it possible to recognize key processes in the alliance and that it helps explain how the alliance influences outcome. Our analyses also provided a rich set of concrete illustrations of the alliance phenomena identified by the theory. The findings suggest that an approach to the alliance based on interpersonal defense theory holds promise. However, although the qualitative method we employed has advantages, it also has limitations. We offer suggestions about how future qualitative and quantitative investigations could build on this study.

  1. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  2. Competition: A Means to Transform the Defense Industrial Base

    National Research Council Canada - National Science Library

    Hansen, Richard

    2003-01-01

    .... The defense acquisition process and its industrial base comprise a significant economic institution in need of transformation to ensure that research, development, and acquisition efforts remain...

  3. Early Realignment Versus Delayed Urethroplasty in Management of Pelvic Fracture Urethral Injury: A Meta-analysis

    Directory of Open Access Journals (Sweden)

    Rama Firmanto

    2016-09-01

    Full Text Available Aim: this meta-analysis study will evaluate the incidence of urethral stricture as a successfull parameter in the management of PFUI through early realignment, compared with delayed urethroplasty. Long-term complications such as erectile dysfunction and incontinence on both methods will also be evaluated. Methods: online literature was sourced from Pubmed, Embase, Cochrane, and Google Scholar. The incidence of stricture was evaluated from the entire study group of ER and DU. Stricture of the urethra is diagnosed by the symptoms such as the obstruction that felt by the patient, uroflowmetry examination, and urine residual post micturition that supported by urethrography examination at regular interval. In some cases the incidence of stricture also diagnosed by urethroscopy. The patient is assessed as not having stricture when it is no longer needed to do urethral dilatation or advanced urethrotomy. The rate of incontinence was assessed subjectively from the patient’s complaints. The erectile function assessed subjectively; decreased of tumesen’s degree, reduced the duration of erection, and penetration failure diagnosed as erection dysfunction. The data were processed as dichotomy data to calculate the risk ratio using Review Manager 5.1. Results: five relevant literatures reviewed in this study. The incidence of urethral strictures are statistically significant lower in early realignment group (RR=0.70, 95% CI 0.50-0.99, P<0.05. There were no statistically significant differences between both treatment groups on the incidence of erectile dysfunction (RR=0.72, 95% CI 0.39-1.34 nor the incidence of incontinence (RR=0.74, 95% CI 0.36-1.51. Conclusion: early realignment decrease the occurrence of stricture on PFUI treatment compared to delayed urethroplasty method. Between the two methos, the complications such as erectile dysfunction and incontinence; however, there was no significant difference.

  4. 76 FR 17841 - Record of Decision (ROD) for the Realignment, Growth, and Stationing of Army Aviation Assets

    Science.gov (United States)

    2011-03-31

    ... requirements and available aviation forces, and also improving training opportunities for aviation and ground... promote more effective training and force management. Existing CABs cannot meet the continuing high demand... units at JBLM with full CAB training capability and benefits when realigned units are added to JBLMs...

  5. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  6. "I didn't feel like I was a person anymore": realigning full adult personhood after ostomy surgery.

    Science.gov (United States)

    Ramirez, Michelle; Altschuler, Andrea; McMullen, Carmit; Grant, Marcia; Hornbrook, Mark; Krouse, Robert

    2014-06-01

    Colorectal cancer (CRC) is the third most common cancer in the United States. For some CRC patients, cancer treatment involves creating a permanent or temporary intestinal ostomy. Having an ostomy often results in complex social and physical concerns-including unpredictable and at times publicly noticeable bowel output. In this article, we discuss findings from 30 in-depth interviews with female CRC survivors with ostomies in the western United States. We highlight how having an ostomy disrupts culturally sanctioned practices of continence that mark the attainment of full-adult personhood. We discuss how survivors reclaim a sense of full personhood after ostomy surgery through a process of realignment that entails both learning how to manage ostomy equipment to conceal bowel activity and reappraising their illness and suffering. We suggest that the anthropological categories of personhood and personhood realignment be incorporated into research and interventions aimed at increasing support among cancer survivors living with bodily impairments. © 2014 by the American Anthropological Association.

  7. Defense Infrastructure: Realignment of Air Force Special Operations Command Units to Cannon Air Force Base, New Mexico

    National Research Council Canada - National Science Library

    Lepore, Brian J

    2008-01-01

    .... As a result, Cannon Air Force Base will remain open. While DOD has satisfied the intent of the recommendation by finding a new mission for the base, this BRAC recommendation was unusual because it contained a contingency clause...

  8. Research on moving target defense based on SDN

    Science.gov (United States)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  9. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  10. “I Didn’t Feel Like I Was a Person Anymore”: Realigning Full Adult Personhood after Ostomy Surgery

    Science.gov (United States)

    Ramirez, Michelle; Altschuler, Andrea; McMullen, Carmit; Grant, Marcia; Hornbrook, Mark; Krouse, Robert

    2016-01-01

    Colorectal cancer (CRC) is the third most common cancer in the United States. For some CRC patients, cancer treatment involves creating a permanent or temporary intestinal ostomy. Having an ostomy often results in complex social and physical concerns—including unpredictable and at times publicly noticeable bowel output. In this article, we discuss findings from 30 in-depth interviews with female CRC survivors with ostomies in the western United States. We highlight how having an ostomy disrupts culturally sanctioned practices of continence that mark the attainment of full-adult personhood. We discuss how survivors reclaim a sense of full personhood after ostomy surgery through a process of realignment that entails both learning how to manage ostomy equipment to conceal bowel activity and reappraising their illness and suffering. We suggest that the anthropological categories of personhood and personhood realignment be incorporated into research and interventions aimed at increasing support among cancer survivors living with bodily impairments. PMID:24782269

  11. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  12. [Ureteral realignment with the rendezvous procedure in complex ureteral injuries - aspects of technique and our experience].

    Science.gov (United States)

    Brandt, Alexander Sascha; von Rundstedt, F-C; Lazica, D A; Roth, S

    2010-07-01

    The rendezvous procedure for re-establishing ureteral continuity after complex ureteral injuries is introduced and we present our experience with this technique. Aspects of the technique are described in a detailed step-by-step instruction using intraoperative radiographs. We evaluated our patient data from 1998 until 2009 for cases in which the rendezvous procedure was attempted. The rendezvous procedure was used in a total of 11 patients. Realignment was successful in 10 cases (90.9 %) and the initial nephrostomy could be removed. In 3 of 7 cases postoperative removal of the JJ ureteric stent was successful. In 7 patients the final surgical ureter reconstruction was performed after a medium period of 7 months. 5 cases of ureteroneocystostomy and 2 cases of reconstruction of the ureter either with colon or ileum segments were accomplished. In 1 patient a permanent maintenance of the DJ ureteral stent was necessary. Ureteral realignment with the rendezvous procedure enables disposition of the ureteral stent in many cases, exclusively antegrade or retrograde procedures failed. By this means nephrostomy could be spared as a temporary or permanent solution and a better chance of restitutio ad integrum could be realised. Georg Thieme Verlag KG Stuttgart * New York.

  13. Expeditionary Air Base Defense: Historical Cases and Modern Implications

    Science.gov (United States)

    2017-06-01

    203. 50 As violence in Iraq’s urban areas surged in 2006, IDF attacks against Balad Air Base reached their peak, with approximately 475...defense operations when appropriate, but it is not a singular solution for quickly or completely reducing violence in the area of air bases. The case of...forces “drawing from the units available.”3 This is appropriate for small combat outposts ( COP ) or forward operating bases (FOB) in lower threat

  14. Preliminary results of anterior lumbar interbody fusion, anterior column realignment for the treatment of sagittal malalignment.

    Science.gov (United States)

    Hosseini, Pooria; Mundis, Gregory M; Eastlack, Robert K; Bagheri, Ramin; Vargas, Enrique; Tran, Stacie; Akbarnia, Behrooz A

    2017-12-01

    OBJECTIVE Sagittal malalignment decreases patients' quality of life and may require surgical correction to achieve realignment goals. High-risk posterior-based osteotomy techniques are the current standard treatment for addressing sagittal malalignment. More recently, anterior lumbar interbody fusion, anterior column realignment (ALIF ACR) has been introduced as an alternative for correction of sagittal deformity. The objective of this paper was to report clinical and radiographic results for patients treated using the ALIF-ACR technique. METHODS A retrospective study of 39 patients treated with ALIF ACR was performed. Patient demographics, operative details, radiographic parameters, neurological assessments, outcome measures, and preoperative, postoperative, and mean 1-year follow-up complications were studied. RESULTS The patient population comprised 39 patients (27 females and 12 males) with a mean follow-up of 13.3 ± 4.7 months, mean age of 66.1 ± 11.6 years, and mean body mass index of 27.3 ± 6.2 kg/m 2 . The mean number of ALIF levels treated was 1.5 ± 0.5. Thirty-three (84.6%) of 39 patients underwent posterior spinal fixation and 33 (84.6%) of 39 underwent posterior column osteotomy, of which 20 (60.6%) of 33 procedures were performed at the level of the ALIF ACR. Pelvic tilt, sacral slope, and pelvic incidence were not statistically significantly different between the preoperative and postoperative periods and between the preoperative and 1-year follow-up periods (except for PT between the preoperative and 1-year follow-up, p = 0.018). Sagittal vertical axis, T-1 spinopelvic inclination, lumbar lordosis, pelvic incidence-lumbar lordosis mismatch, intradiscal angle, and motion segment angle all improved from the preoperative to postoperative period and the preoperative to 1-year follow-up (p < 0.05). The changes in motion segment angle and intradiscal angle achieved in the ALIF-ACR group without osteotomy compared with the ALIF-ACR group with osteotomy

  15. Historical storage budgets of organic carbon, nutrient and contaminant elements in saltmarsh sediments: Biogeochemical context for managed realignment, Humber Estuary, UK

    International Nuclear Information System (INIS)

    Andrews, J.E.; Samways, G.; Shimmield, G.B.

    2008-01-01

    Biogeochemical data from Welwick marsh (Humber Estuary, UK), an actively accreting saltmarsh, provides a decadal-centennial-scale natural analogue for likely future biogeochemical storage effects of managed realignment sites accreting either intertidal muds or saltmarsh. Marsh topographic profiles and progradation history from aerial photographs were combined with 137 Cs and niobium contamination history to establish and verify chronology and sediment mass accumulation. These data, combined with down-core measurements of particulate organic carbon (C org ), organic nitrogen (N org ), particle reactive phosphorus and selected contaminant metal (Zn, Pb, Cu, As and Nb) contents were then used to calculate sediment and chemical storage terms and to quantify changes in these over time. These data are used to help predict likely future biogeochemical storage changes at managed realignment sites in the estuary. The net effect of returning some 26 km 2 of reclaimed land to intertidal environments now (about 25% of the maximum possible realignment storage identified for the estuary) could result in the storage of some 40,000 tonnes a -1 of sediment which would also bury about 800 tonnes a -1 of C org and 40 tonnes a -1 of N org . Particulate contaminant P burial would be around 25 tonnes a -1 along with ∼ 6 tonnes a -1 contaminant Zn, 3 tonnes a -1 contaminant Pb, and ∼ 1 tonnes a -1 contaminant As and Cu. The study also shows that reclamation activities in the outer estuary since the mid-1700s has prevented, in total, the deposition of about 10 million tonnes of sediment, along with 320,000 tonnes of C org and 16,000 tonnes of N org . The study provides a mid-1990s baseline against which future measurements at the site can determine changes in burial fluxes and improvement or deterioration in contaminant metal contents of the sediments. The data are directly relevant for local managed realignment sites but also broadly indicative for sites generally on the European

  16. Evaluation of early endoscopic realignment of post-traumatic complete posterior urethral rupture

    Directory of Open Access Journals (Sweden)

    Yaser M Abdelsalam

    2013-01-01

    Full Text Available Introduction: to report our experience with 41 patients treated by early endoscopic realignment of complete post-traumatic rupture urethra. Materials and Methods: The study includes patients presented to our institute, between May 2004 and April 2009, with post-traumatic complete posterior urethral disruption. Preoperative retrograde urethrography, voiding cystourethrography and abdominopelvic CT were performed to evaluate the urethral defect length, the bladder neck competence, the prostate position, and the extent of the pelvic hematoma. Within the first week after trauma, antegrade and retrograde urethroscopy were performed to identify both urethral ends and insert urethral catheter. Patients were followed up by pericatheter retrograde urethrogram monthly postoperatively till catheter removal on disappearance of extravasation. Retrograde urethrography, voiding cystourethrography and urethroscopy were performed 1 month after the removal of the catheter. Follow-up abdominal ultrasound and uroflowmetry monthly till 6 months, bimonthly till 1 year, and every 3 months thereafter were encouraged. Urinary continence and postoperative erectile dysfunction were assessed by direct patient interview. Results: Forty one patients in the age group 17-61 years (mean 37.9 were treated. Patients were followed up for 12-36 months (mean 17 months. Complete healing of the urethra occurred in 18 patients (43.9%. Passable urethral stricture developed in 15 patients (36.6%. Complete urethral obstruction occurred in eight patients (19.5%. Conclusions: Early endoscopic realignment for complete posterior urethral rupture is a feasible technique with no or minimal intraoperative complications. The technique is successful as the definitive line of therapy in reasonable number of patients and seems to render further future interventions for inevitable urethral stricture easier.

  17. Could the laser tracker AT401 replace digital levelling and "ecartometry" for the smoothing and realignment of the LHC?

    CERN Document Server

    Missiaen, D

    2012-01-01

    The laser tracker AT401 appeared on the market a couple of years ago with a very accurate distance meter, as a matter of fact the one of the Mekometer ME5000, and angular encoders almost as accurate as the ones of the best total stations. For the smoothing and realignment of the LHC components, the Survey team at CERN normally uses digital levelling measurements to determine the vertical position and offsets to a stretched wire measurements, also called “ecartometry”, for the horizontal one. During the last winter technical stop, a measurement of an LHC sector (3km) was realised using these three technologies in order to compare the AT401 capabilities with respect to the others. The paper will present the methodology applied, the data processing, the results obtained and the conclusions drawn for the future LHC realignment campaign which will take place during the long shut-down of 20 months starting at the end of 2012.

  18. Parasitic wasp responses to symbiont-based defense in aphids

    Directory of Open Access Journals (Sweden)

    Oliver Kerry M

    2012-02-01

    Full Text Available Abstract Background Recent findings indicate that several insect lineages receive protection against particular natural enemies through infection with heritable symbionts, but little is yet known about whether enemies are able to discriminate and respond to symbiont-based defense. The pea aphid, Acyrthosiphon pisum, receives protection against the parasitic wasp, Aphidius ervi, when infected with the bacterial symbiont Hamiltonella defensa and its associated bacteriophage APSE (Acyrthosiphon pisum secondary endosymbiont. Internally developing parasitoid wasps, such as A. ervi, use maternal and embryonic factors to create an environment suitable for developing wasps. If more than one parasitoid egg is deposited into a single aphid host (superparasitism, then additional complements of these factors may contribute to the successful development of the single parasitoid that emerges. Results We performed experiments to determine if superparasitism is a tactic allowing wasps to overcome symbiont-mediated defense. We found that the deposition of two eggs into symbiont-protected aphids significantly increased rates of successful parasitism relative to singly parasitized aphids. We then conducted behavioral assays to determine whether A. ervi selectively superparasitizes H. defensa-infected aphids. In choice tests, we found that A. ervi tends to deposit a single egg in uninfected aphids, but two or more eggs in H. defensa-infected aphids, indicating that oviposition choices may be largely determined by infection status. Finally, we identified differences in the quantity of the trans-β-farnesene, the major component of aphid alarm pheromone, between H. defensa-infected and uninfected aphids, which may form the basis for discrimination. Conclusions Here we show that the parasitic wasp A. ervi discriminates among symbiont-infected and uninfected aphids, and changes its oviposition behavior in a way that increases the likelihood of overcoming symbiont-based

  19. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    Science.gov (United States)

    2017-12-01

    CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL BASE GOING FORWARD? by Daniel J. Shipman December 2017 Thesis Advisor: Mie...2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HOW MIGHT CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL...the competitive business environment of Department of Defense (DOD) vendors and whether the market is favorable for non-traditional, technology

  20. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  1. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  2. Simulation of groundwater flow to assess future withdrawals associated with Base Realignment and Closure (BRAC) at Fort George G. Meade, Maryland

    Science.gov (United States)

    Raffensperger, Jeff P.; Fleming, Brandon J.; Banks, William S.L.; Horn, Marilee A.; Nardi, Mark R.; Andreasen, David C.

    2010-01-01

    Increased groundwater withdrawals from confined aquifers in the Maryland Coastal Plain to supply anticipated growth at Fort George G. Meade (Fort Meade) and surrounding areas resulting from the Department of Defense Base Realignment and Closure Program may have adverse effects in the outcrop or near-outcrop areas. Specifically, increased pumping from the Potomac Group aquifers (principally the Patuxent aquifer) could potentially reduce base flow in small streams below rates necessary for healthy biological functioning. Additionally, water levels may be lowered near, or possibly below, the top of the aquifer within the confined-unconfined transition zone near the outcrop area. A three-dimensional groundwater flow model was created to incorporate and analyze data on water withdrawals, streamflow, and hydraulic head in the region. The model is based on an earlier model developed to assess the effects of future withdrawals from well fields in Anne Arundel County, Maryland and surrounding areas, and includes some of the same features, including model extent, boundary conditions, and vertical discretization (layering). The resolution (horizontal grid discretization) of the earlier model limited its ability to simulate the effects of withdrawals on the outcrop and near-outcrop areas. The model developed for this study included a block-shaped higher-resolution local grid, referred to as the child model, centered on Fort Meade, which was coupled to the coarser-grid parent model using the shared node Local Grid Refinement capability of MODFLOW-LGR. A more detailed stream network was incorporated into the child model. In addition, for part of the transient simulation period, stress periods were reduced in length from 1 year to 3 months, to allow for simulation of the effects of seasonally varying withdrawals and recharge on the groundwater-flow system and simulated streamflow. This required revision of the database on withdrawals and estimation of seasonal variations in

  3. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  4. Summary Report on the Audit of Defense Base Realignment and Closure Budget Data

    Science.gov (United States)

    1996-04-03

    management control program as it applied to the audit objectives. This report summarizes the results of the specific objectives in Finding A and discusses the management control objective in Finding B.

  5. Early Realignment Versus Delayed Urethroplasty in Management of Pelvic Fracture Urethral Injury: A Meta-analysis.

    Science.gov (United States)

    Firmanto, Rama; Irdam, Gampo A; Wahyudi, Irfan

    2016-04-01

    this meta-analysis study will evaluate the incidence of urethral stricture as a successfull parameter in the management of PFUI through early realignment, compared with delayed urethroplasty. Long-term complications such as erectile dysfunction and incontinence on both methods will also be evaluated. online literature was sourced from Pubmed, Embase, Cochrane, and Google Scholar. The incidence of stricture was evaluated from the entire study group of ER and DU. Stricture of the urethra is diagnosed by the symptoms such as the obstruction that felt by the patient, uroflowmetry examination, and urine residual post micturition that supported by urethrography examination at regular interval. In some cases the incidence of stricture also diagnosed by urethroscopy. The patient is assessed as not having stricture when it is no longer needed to do urethral dilatation or advanced urethrotomy. The rate of incontinence was assessed subjectively from the patient's complaints. The erectile function assessed subjectively; decreased of tumesen's degree, reduced the duration of erection, and penetration failure diagnosed as erection dysfunction. The data were processed as dichotomy data to calculate the risk ratio using Review Manager 5.1. five relevant literatures reviewed in this study. The incidence of urethral strictures are statistically significant lower in early realignment group (RR=0.70, 95% CI 0.50-0.99, Purethroplasty method. Between the two methos, the complications such as erectile dysfunction and incontinence; however, there was no significant difference.

  6. 78 FR 69076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-18

    ... Medical Human Resources System internet (DMHRSi). DHA 12 EDHA 12 Third Party Collection System. DHA 16 DoD... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DoD-2013-OS-0216] Privacy Act of 1974... Defense Health Agency's compilation of Privacy Act SORNS. The realignment of the nineteen system...

  7. AFMC Civilian Retention: Forecasting Policy on the Future of the Civilian Workforce

    Science.gov (United States)

    2006-03-01

    encourage the expansion of flexible work schedules, job sharing, part-time employment , alternative work schedules, telecommuting , and satellite work...Daft & Steers, 1986). If a person is not receiving the same perceived benefits as another, he may feel inequity which leads to dissatisfaction (Daft... drawbacks were that the commission worked in a vacuum without guidance and faulty data. The Defense Base Closure and Realignment Act of 1990

  8. BRAC and Crime: Examining the Effects of an Installation’s Closure on Local Crime

    Science.gov (United States)

    2017-12-01

    Community Survey AFF American Fact Finder BLS Bureau of Labor Statistics BJS Bureau of Justice Statistics BRAC Base Realignment and Closure CJIS...Criminal Justice Information Services CPI Consumer Price Index DD Difference-in-Differences DOD Department of Defense DOJ Department of Justice FBI...at the Naval Postgraduate School. The education received here will prove invaluable. I also want to acknowledge the unwavering support of my advisors

  9. Risk Management and Simulation Based Live Fire Test and Evaluation in the Performance Based Defense Business Environment

    National Research Council Canada - National Science Library

    Brown, R

    1999-01-01

    The objective of this analysis is to reduce the policy and management process costs of Congressionally mandated Live Fire Test and Evaluation procedures in the new Performance Based Defense Acquisition environment...

  10. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  11. N-terminal domains of human DNA polymerase lambda promote primer realignment during translesion DNA synthesis

    Science.gov (United States)

    Taggart, David J.; Dayeh, Daniel M.; Fredrickson, Saul W.; Suo, Zucai

    2014-01-01

    The X-family DNA polymerases λ (Polλ) and β (Polβ) possess similar 5′-2-deoxyribose-5-phosphatelyase (dRPase) and polymerase domains. Besides these domains, Polλ also possesses a BRCA1 C-terminal (BRCT) domain and a proline-rich domain at its N terminus. However, it is unclear how these non-enzymatic domains contribute to the unique biological functions of Polλ. Here, we used primer extension assays and a newly developed high-throughput short oligonucleotide sequencing assay (HT-SOSA) to compare the efficiency of lesion bypass and fidelity of human Polβ, Polλ and two N-terminal deletion constructs of Polλ during the bypass of either an abasic site or a 8-oxo-7,8-dihydro-2′-deoxyguanosine (8-oxodG) lesion. We demonstrate that the BRCT domain of Polλ enhances the efficiency of abasic site bypass by approximately 1.6-fold. In contrast, deletion of the N-terminal domains of Polλ did not affect the efficiency of 8-oxodG bypass relative to nucleotide incorporations opposite undamaged dG. HT-SOSA analysis demonstrated that Polλ and Polβ preferentially generated −1 or −2 frameshift mutations when bypassing an abasic site and the single or double base deletion frequency was highly sequence dependent. Interestingly, the BRCT and proline-rich domains of Polλ cooperatively promoted the generation of −2 frameshift mutations when the abasic site was situated within a sequence context that was susceptible to homology-driven primer realignment. Furthermore, both N-terminal domains of Polλ increased the generation of −1 frameshift mutations during 8-oxodG bypass and influenced the frequency of substitution mutations produced by Polλ opposite the 8-oxodG lesion. Overall, our data support a model wherein the BRCT and proline-rich domains of Polλ act cooperatively to promote primer/template realignment between DNA strands of limited sequence homology. This function of the N-terminal domains may facilitate the role of Polλ as a gap-filling polymerase

  12. 32 CFR 174.4 - Policy.

    Science.gov (United States)

    2010-07-01

    ... COMMUNITIES AND ADDRESSING IMPACTS OF REALIGNMENT Policy § 174.4 Policy. It is DoD policy to: (a) Act... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 174.4 Section 174.4 National Defense... will, when feasible, be accelerated to facilitate the transfer of real property for community reuse. In...

  13. Naval War College Review. Volume 59, Number 2, Spring 2006

    Science.gov (United States)

    2006-01-01

    effectively dividing the French fleet in the process—the geo- graphical handicap of the Iberian Peninsula and France’s continuing need to base major units...conception of applying high technology in war. For the Defense Department, it is about: • A command climate that swept away preconceived notions of strategic...as counterterrorism. On the Korean Peninsula , our planned enhancements and realignments are intended to strengthen our overall military effectiveness

  14. Targeting the Mevalonate Pathway to Reduce Mortality from Ovarian Cancer

    Science.gov (United States)

    2017-12-01

    removed by Picard Tools, and base quality score recalibration and Indel (insert/deletion) realignment using the Genome Analysis Toolkit GATK (McKenna et...Analysis Toolkit : a MapReduce framework for analyzing next-generation DNA sequencing data. Genome research 20, 1297-1303. McLean, C. Y., Bristor, D...CA151683), a Department of Defense Career Development award (CA130247), and grants from Gabrielle’s Angel Foundation and Concern Foundation. GGW is also

  15. Epigenetic Therapy of Hematopoietic Malignancies: Novel Approaches for Tissue-Specific and Global Inhibition of EZH2 Enzymatic Activities

    Science.gov (United States)

    2017-10-01

    removed by Picard Tools, and base quality score recalibration and Indel (insert/deletion) realignment using the Genome Analysis Toolkit GATK (McKenna et...Analysis Toolkit : a MapReduce framework for analyzing next-generation DNA sequencing data. Genome research 20, 1297-1303. McLean, C. Y., Bristor, D...CA151683), a Department of Defense Career Development award (CA130247), and grants from Gabrielle’s Angel Foundation and Concern Foundation. GGW is also

  16. Shiningbank energy, Rodney, Ontario : natural channel realignment for protection of an oil field battery

    International Nuclear Information System (INIS)

    Hirvonen, J.

    2005-01-01

    The Rodney Unit 1 battery in Ontario has produced Devonian crude oil with some hydrogen sulfide since 1948. Waterflooding was initiated in 1968, and continues today using recycled produced water as a flushing agent. This presentation provided details of recent upgrades which included replacement of all storage tanks and production lines as well as new lines under the Fleming Creek drain. Upgrades of waterflooding injection systems and the reconstruction of a battery tank farm were also conducted, and old infrastructure and tanks were removed. An environmental conditions investigation revealed oil seepage from Fleming Drain Creek bank, as well as creek erosion which threatened the unit battery. Remediation options required addressing environmental issues due to regulations. Experts hired during the investigation included a hydrogeologist; a fluvial geomorphologist; a fisheries biologist and a restoration contractor. The aim of the project was to extract contaminants from the soil and provide site stability through a realignment of the creek. The site was also revegetated following construction. Various design options were outlined and a construction sequence was presented. A post-construction inspection showed that the Rodney Unit 1 Battery was remediated in accordance with Ontario standards. Soil and groundwater quality now meets Ministry of the Environment standards for the site. The realignment of Fleming Creek Drain in the vicinity of the battery has improved functionality of the drain, and reduced the erosive impact on the battery site as well as enhancing the aquatic habitat in the area. It was concluded that industry applications of ecosystem design solutions have improved pipeline crossings, temporary road impacts and erosion threats. Site decommissioning is also expected to be less costly and time-consuming due to the remediation methods used. refs., tabs., figs

  17. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  18. Identifying and Mitigating the Impact of the Budget Control Act on High Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks

    Science.gov (United States)

    2016-04-30

    Ü~åÖÉ= - 351 - products, similar to those found in a bill of material. Figure 3 provides an example of the relationship between sectors , sub- sectors ...defense aircraft. Defense aircraft are divided in three main sub- sectors : fixed-wing, rotary wing, and unmanned systems. The fixed-wing sub- sector ...Risk Sectors and Tiers of the Defense Industrial Base: Assessment Approach to Industrial Base Risks Lirio Avilés, Engineer, MIBP, OUSD(AT&L) Sally

  19. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  20. Effect of fiber distribution and realignment on the nonlinear and inhomogeneous mechanical properties of human supraspinatus tendon under longitudinal tensile loading.

    Science.gov (United States)

    Lake, Spencer P; Miller, Kristin S; Elliott, Dawn M; Soslowsky, Louis J

    2009-12-01

    Tendon exhibits nonlinear stress-strain behavior that may be partly due to movement of collagen fibers through the extracellular matrix. While a few techniques have been developed to evaluate the fiber architecture of other soft tissues, the organizational behavior of tendon under load has not been determined. The supraspinatus tendon (SST) of the rotator cuff is of particular interest for investigation due to its complex mechanical environment and corresponding inhomogeneity. In addition, SST injury occurs frequently with limited success in treatment strategies, illustrating the need for a better understanding of SST properties. Therefore, the objective of this study was to quantitatively evaluate the inhomogeneous tensile mechanical properties, fiber organization, and fiber realignment under load of human SST utilizing a novel polarized light technique. Fiber distributions were found to become more aligned under load, particularly during the low stiffness toe-region, suggesting that fiber realignment may be partly responsible for observed nonlinear behavior. Fiber alignment was found to correlate significantly with mechanical parameters, providing evidence for strong structure-function relationships in tendon. Human SST exhibits complex, inhomogeneous mechanical properties and fiber distributions, perhaps due to its complex loading environment. Surprisingly, histological grade of degeneration did not correlate with mechanical properties.

  1. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  2. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  3. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  4. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  5. DAG-based attack and defense modeling: don’t miss the forest for the attack trees

    NARCIS (Netherlands)

    Kordy, Barbara; Piètre-Cambacédès, Ludovic; Schweitzer, Patrick

    2015-01-01

    This paper presents the current state of the art on attack and defense modeling approaches that are based on directed acyclic graphs (DAGs). DAGs allow for a hierarchical decomposition of complex scenarios into simple, easily understandable and quantifiable actions. Methods based on threat trees and

  6. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  7. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  8. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  9. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  10. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  11. Evaluation of elastix-based propagated align algorithm for VOI- and voxel-based analysis of longitudinal (18)F-FDG PET/CT data from patients with non-small cell lung cancer (NSCLC).

    Science.gov (United States)

    Kerner, Gerald Sma; Fischer, Alexander; Koole, Michel Jb; Pruim, Jan; Groen, Harry Jm

    2015-01-01

    Deformable image registration allows volume of interest (VOI)- and voxel-based analysis of longitudinal changes in fluorodeoxyglucose (FDG) tumor uptake in patients with non-small cell lung cancer (NSCLC). This study evaluates the performance of the elastix toolbox deformable image registration algorithm for VOI and voxel-wise assessment of longitudinal variations in FDG tumor uptake in NSCLC patients. Evaluation of the elastix toolbox was performed using (18)F-FDG PET/CT at baseline and after 2 cycles of therapy (follow-up) data in advanced NSCLC patients. The elastix toolbox, an integrated part of the IMALYTICS workstation, was used to apply a CT-based non-linear image registration of follow-up PET/CT data using the baseline PET/CT data as reference. Lesion statistics were compared to assess the impact on therapy response assessment. Next, CT-based deformable image registration was performed anew on the deformed follow-up PET/CT data using the original follow-up PET/CT data as reference, yielding a realigned follow-up PET dataset. Performance was evaluated by determining the correlation coefficient between original and realigned follow-up PET datasets. The intra- and extra-thoracic tumors were automatically delineated on the original PET using a 41% of maximum standardized uptake value (SUVmax) adaptive threshold. Equivalence between reference and realigned images was tested (determining 95% range of the difference) and estimating the percentage of voxel values that fell within that range. Thirty-nine patients with 191 tumor lesions were included. In 37/39 and 12/39 patients, respectively, thoracic and non-thoracic lesions were evaluable for response assessment. Using the EORTC/SUVmax-based criteria, 5/37 patients had a discordant response of thoracic, and 2/12 a discordant response of non-thoracic lesions between the reference and the realigned image. FDG uptake values of corresponding tumor voxels in the original and realigned reference PET correlated well (R

  12. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  13. Air Warfare and Air Base Defense 1914-1973

    Science.gov (United States)

    1988-01-01

    338 X Conclusion ............................................. 343 A ppendices ...military operations. During the battle of Stalingrad, however, the need for a more focussed defense became acute . Between November 19, 1942, when the

  14. The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense

    International Nuclear Information System (INIS)

    Massa, R.J.

    1987-01-01

    This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training

  15. Military Base Realignments and Closures: Plan Needed to Monitor Challenges for Completing More Than 100 Armed Forces Reserve Centers

    National Research Council Canada - National Science Library

    Lepore, Brian J; Holman, Barry; Talbott, Laura; Arbogast, Shawn; Beers, Rachel; Coleman, Grace; Edwards, Jennifer; Matta, Julie; Perdue, Charles

    2007-01-01

    ...) and close 387 existing reserve components facilities. The Department of Defense (DoD) expects the new AFRCs to increase recruiting and retention and create greater efficiencies by fostering jointness and consolidating functions...

  16. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    Science.gov (United States)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of

  17. Consolidation of the U.S. Defense Industrial Base: Impact on Research Expenditures

    National Research Council Canada - National Science Library

    Linster, Bruce G; Slate, Stephen; Waller, Robert L

    2002-01-01

    ...: Boeing, Raytheon, Litton Industries, Lockheed Martin, and Northrop Grumman. The battle for the shrinking defense budget has resulted in not only mergers, but also an increased emphasis on the formation of partnerships among defense contractors...

  18. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  19. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  20. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  1. Deliberating A Contract Type Based Risk Mitigation Strategy For South African Defense Acquisitions

    Science.gov (United States)

    2016-06-01

    cash flow may lead to cost overruns and schedule slippage. Table 1 shows the description, schedule and cost performance status for two SA DOD...possibility of applying a contract-type based strategy to manage acquisition program costs and schedule risks for the South African (SA) Department of...deviations between technical, cost and schedule performance. 14. SUBJECT TERMS acquisition process, defense acquisition, contract-type, risk

  2. Long-term clinical and radiographic outcome of patello-femoral realignment procedures: a minimum of 15-year follow-up.

    Science.gov (United States)

    Vivod, Gregor; Verdonk, Peter; Drobnič, Matej

    2014-11-01

    A retrospective single-centre study was focused on the long-term outcome after different patello-femoral (PF) realignment procedures. Thirty-nine patients treated for recurrent PF instability were examined after a mean post-operative time of 22.5 years. Their 78 knees were divided into: non-operated knees (NON-OPERATED)-N = 24, isolated proximal procedures (PROXIMAL)-N = 22, isolated distal procedures (DISTAL)-N = 10, and combined procedures (COMBINED)-N = 22. PF-related medical history together with clinical, subjective (KOOS and Kujala scores), and radiographic (Caton-Deschamps PF height index, Kellgren-Lawrence scale for tibio-femoral OA, and Iwano classification for PF OA) evaluation was conducted. PF re-dislocation rate was comparable between PROXIMAL (36%), DISTAL (20%), and COMBINED (32%). Isolated proximal procedures revealed less central patella positions (PROXIMAL 64%; DISTAL 90%; COMBINED 95%) and more frequent PF apprehension test (PROXIMAL 82%; DISTAL 40%, COMBINED 50%). KOOS and Kujala scores were similar in all three surgical subgroups, but significantly lower than in NON-OPERATED. Patellas were positioned lower after DISTAL, 0.8 (0.5-1.0) or COMBINED, 0.9 (0.4-1.3). Kellgren-Lawrence scores ≥2 were found in 42% NON-OPERATED, 37% PROXIMAL, 70% DISTAL, and 59% COMBINED, whereas Iwano classification ≥2 was confirmed in 46% NON-OPERATED, 64% PROXIMAL, 80% DISTAL, and 86% COMBINED. High PF re-dislocation rates together with a very high incidence of PF OA indicate that PF realignment strategies used traditionally had failed to reach their long-term expectations. The transfer of tibial tuberosity resulted in more constrained PF joints than isolated proximal procedures which allowed for more residual PF instability. Distal procedures additionally increased the likelihood for tibio-femoral OA. III.

  3. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  4. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  5. Department of Defense Base Structure Report (A Summary of DOD's Real Property Inventory), Fiscal year 2005 Baseline

    National Research Council Canada - National Science Library

    2005-01-01

    The Base Structure Report represents a consolidated summary of the Services native real property inventories to provide an overall look at the physical infrastructure that makes up the Department of Defense...

  6. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  7. Research on air and missile defense task allocation based on extended contract net protocol

    Science.gov (United States)

    Zhang, Yunzhi; Wang, Gang

    2017-10-01

    Based on the background of air and missile defense distributed element corporative engagement, the interception task allocation problem of multiple weapon units with multiple targets under network condition is analyzed. Firstly, a mathematical model of task allocation is established by combat task decomposition. Secondly, the initialization assignment based on auction contract and the adjustment allocation scheme based on swap contract were introduced to the task allocation. Finally, through the simulation calculation of typical situation, the model can be used to solve the task allocation problem in complex combat environment.

  8. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  9. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  10. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  11. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  12. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  13. The role of capital realignment versus in situ stabilization for the treatment of slipped capital femoral epiphysis.

    Science.gov (United States)

    Souder, Christopher D; Bomar, James D; Wenger, Dennis R

    2014-12-01

    Slipped capital femoral epiphysis (SCFE) can be treated by a variety of methods with the traditional method of in situ pin fixation being most commonly used. More recently, the Modified Dunn (Mod. Dunn) procedure consisting of capital realignment has been popularized as a treatment method for SCFE, particularly for more severe cases. Over the last 5 years, our institution has selectively used this method for more complex cases. The purpose of this article is to evaluate the differences between these 2 treatment methods in terms of avascular necrosis (AVN) rate, reoperation rate, and complication rate. Eighty-eight hips that were surgically treated for SCFE between July 2004 and June 2012 met our inclusion criteria. The in situ fixation group included 71 hips, whereas 17 hips were anatomically reduced with the Mod. Dunn procedure. Loder classification, severity, acuity, complication rate, and reoperation rate were determined for the 2 cohorts. The χ analysis was performed to evaluate the relationship between the treatment method and outcome. As expected, stable slips did well with in situ pinning with no cases of AVN, even in more severe slips. Ten stable slips were treated with the Mod. Dunn approach and 2 (20%) developed AVN. Unstable slips were more difficult to treat with 3 of the 7 hips stabilized in situ developing AVN (43%). Two of the 7 unstable slips treated by the Mod. Dunn procedure developed AVN (29%). The other outcomes studied (reoperation rate and complication rate) were not significantly related to the surgical treatment method (P = 0.732 and 0.261, respectively). In situ pinning remains a safe and predictable method for treatment of stable SCFE with no AVN noted, even in severe slips. Attempts to anatomically reduce stable slips led to severe AVN in 20% of cases, thus this treatment approach should be considered with caution. Treatment of unstable slips remains problematic with high AVN rates noted whether treated by in situ fixation or capital

  14. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  15. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    Science.gov (United States)

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  16. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  17. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  18. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  19. Nonlinear Effects in Transformation Optics-Based Metamaterial Shields for Counter Directed Energy Weapon Defense

    Science.gov (United States)

    2016-06-01

    employs the in- variance of the Maxwell equations under coordinate transformations to convert the free- space wave solutions in a coordinate... ENERGY WEAPON DEFENSE by Jacob D. Thompson June 2016 Thesis Co-Advisors: James Luscombe Brett Borden Approved for public release; distribution is...2014 to 06-17-2016 4. TITLE AND SUBTITLE NONLINEAR EFFECTS IN TRANSFORMATION OPTICS-BASED METAMATE- RIAL SHIELDS FOR COUNTER DIRECTED ENERGY WEAPON

  20. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  1. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    Science.gov (United States)

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  2. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  3. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  4. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  5. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  6. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  7. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  8. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  9. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  10. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  11. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  12. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  13. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  14. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  15. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  16. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  17. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  18. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  19. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  20. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  1. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  2. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  3. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  4. Outsourcing of Defense Supply Center, Columbus, Bus and Taxi Service Operations

    National Research Council Canada - National Science Library

    Granetto, Paul

    1999-01-01

    Introduction. We performed the audit in response to allegations to the Defense Hotline that the Defense Supply Center, Columbus, outsourcing study for bus and taxi service operations was based on incorrect methodology...

  5. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  6. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  7. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  8. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  9. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  10. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  11. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  12. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  13. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  14. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  15. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  16. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  17. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  18. Final Environmental Assessment to Implement the Defense Base Closure and Realignment Commission Recommendations for Shaw Air Force Base, South Carolina

    Science.gov (United States)

    2007-07-01

    corresponding years. Year 2005 through 2009: VOCE = .016 * Trips NOxE = .015 * Trips PM10E = .0022 * Trips COE = .262 * Trips Year 2010 and beyond: VOCE ... VOCE * DPYII/2000 Nox (tons/yr) = NOxE * DPYII/2000 PM10(tons/yr) = PM10E * DPYII/2000 CO (tons/yr) = COE * DPYII/2000 Where: Commercial

  19. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  20. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  1. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  3. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  4. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  5. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  6. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  7. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  8. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  9. Final Base Realignment and Closure (BRAC) Environmental Assessment for Realignment of Nellis Air Force Base

    Science.gov (United States)

    2007-03-01

    weapons systems in support of potential technological improvements in hardware, software , tactics, and training. In recent years, the total amount of...communities in southeastern California, southern Nevada, western and southern Arizona, southwestern Utah, and through Sonora and northern Sinaloa, Mexico ...Publ ic Utilities Commi ssion Pete Konesky , Stat e Energy Of f i ce Rebecca Pa l me r , State Historic Preservation Office Alisa Huckle, ONR Libr a

  10. Problems and Mitigation Strategies for Developing and Validating Statistical Cyber Defenses

    Science.gov (United States)

    2014-04-01

    such as Firewalls , HTTP proxies, and application-level Attribute Based Ac- cess Control [1] to provide a layered defense in depth. The spe- cific...research and technology develop- ment in several areas including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum

  11. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  12. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  13. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  14. Consolidation Needed for Procurements of DoD H-60 Helicopter Spare Parts (REDACTED)

    Science.gov (United States)

    2016-10-12

    OFFICIAL USE ONLY FOR OFFICIAL USE ONLY The document contains information that may be exempt from mandatory disclosure under the Freedom of... methods . The Secretary of Defense made recommendations for BRAC in May 2005 that included the realignment or closure of military installations. The...Opportunities to Reduce Potential Duplication in Government Programs, Save Tax Dollars, and Enhance Revenue,” March 1, 2011. DLA obtained H-60

  15. Image Guidance Based on Prostate Position for Prostate Cancer Proton Therapy

    International Nuclear Information System (INIS)

    Vargas, Carlos; Wagner, Marcus; Indelicato, Daniel; Fryer, Amber; Horne, David; Chellini, Angela; McKenzie, Craig; Lawlor, Paula; Mahajan, Chaitali; Li Zuofeng; Lin Liyong; Keole, Sameer

    2008-01-01

    Purpose: To determine the target coverage for proton therapy with and without image guidance and daily prebeam reorientation. Methods and Materials: A total of 207 prostate positions were analyzed for 9 prostate cancer patients treated using our low-risk prostate proton therapy protocol (University of Florida Proton Therapy Institute 001). The planning target volume was defined as the prostate plus a 5-mm axial and 8-mm superoinferior extension. The prostate was repositioned using 5- and 10-mm shifts (anteriorly, inferiorly, posteriorly, and superiorly) and for Points A-D using a combination of 10-mm multidimensional movements (anteriorly or inferiorly; posteriorly or superiorly; and left or right). The beams were then realigned using the new prostate position. The prescription dose was 78 Gray equivalent (GE) to 95% of the planning target volume. Results: For small movements in the anterior, inferior, and posterior directions within the planning target volume (≤5 mm), treatment realignment demonstrated small, but significant, improvements in the clinical target volume (CTV) coverage to the prescribed dose (78 GE). The anterior and posterior shifts also significantly increased the minimal CTV dose (Δ +1.59 GE). For prostate 10-mm movements in the inferior, posterior, and superior directions, the beam realignment produced larger and significant improvements for both the CTV V 78 (Δ +6.4%) and the CTV minimal dose (Δ +8.22 GE). For the compounded 10-mm multidimensional shifts, realignment significantly improved the CTV V 78 (Δ +11.8%) and CTV minimal dose (Δ +23.6 GE). After realignment, the CTV minimal dose was >76.6 GE (>98%) for all points (A-D). Conclusion: Proton beam realignment after target shift will enhance CTV coverage for different prostate positions

  16. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  17. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  18. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  19. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  20. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  1. Corporate realignments in the natural gas industry: does the North American experience foretell the future for the European Union?

    Energy Technology Data Exchange (ETDEWEB)

    Rutledge, I.; Wright, Ph. [Sheffield Univ., Energy Studies Programme (United Kingdom); Wright, Ph. [Montpellier-1 Univ., CREDEN-LASER, 34 (France)

    2000-09-01

    This paper seeks to explore the extent to which the corporate realignments which have occurred in the North American Natural Gas Industry during a now relatively lengthy experience with liberalization involving a large number of players, will be imitated in the future by European Union countries other than the UK (which is of course already long-embarked along the path of Anglo-Saxon liberalization). The paper first of all catalogues the North American experience, drawing on company performance data assembled by the authors over the last decade (Rutledge and Wright, 1993, 1995, 1997, 1999, 2000). Secondly, this empirical exploration gives way to theoretical speculation: are there elements of the North American experience for which explanatory generalizations are possible? Thirdly, these empirical and theoretical insights are employed to identify and explore actual and potential differences in the corporate evolution of the European Union natural gas industry. (authors)

  2. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  3. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  4. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  5. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  6. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  7. The Availability of Judicial Review Regarding Military Base Closures and Realignments

    Science.gov (United States)

    2005-06-30

    held that the President is not subject to the APA, due to separation of powers principles.37 Base Closure Act Claims The Dalton Court distinguished...that the 1988 Base Closure Act violated the non-delegation doctrine and the separation of powers doctrine.53 However, the Base Closure Act has not yet been held unconstitutional by any federal appellate courts.

  8. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  9. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  10. Risk Management and Simulation Based Live Fire Test and Evaluation in the Performance Based Defense Business Environment

    National Research Council Canada - National Science Library

    Brown, R

    1999-01-01

    .... The service and acquisition program independent Live Fire Test and Evaluation Community has not fully recognized the changing defense acquisition business environment and modified policy and business...

  11. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  12. Base Realignment and Closure: An Evolution for Harvesting Efficiencies

    Science.gov (United States)

    2012-06-15

    JIOI .1 I’\\ ( a~~:c ...... cu t\\ pnl 17. 20 1::!!. 16 The Commiss ion’s review of the military force strucrure and basing requi rements wa~ geared...II I II,JII __ (lt_ ( )iloltll~_ ( <o• l t.\\tl __ [,q tllt<’ll\\ (’dl !<t~<.: C’-’- t.: d t\\ pnl :!(l. 21!1 :2). ’i U.S. Ctt~,·rnutt: lll At... pnl 2.\\. 2012 ). I ’ . - ll11ll. 6 1 Durin~ the BRJ\\C 2005 i nau~ural hcmi nu in IVlav nf 2005. G;\\0 ’"’"" a"ked w addre:-.s: .... .._ ..... - ( I

  13. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  14. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  15. Evaluation of the defensive behavior of two honeybee ecotypes using a laboratory test

    Directory of Open Access Journals (Sweden)

    Cecilia Andere

    2002-01-01

    Full Text Available Honeybee defensive behavior is a useful selection criterion, especially in areas with Africanized honeybees (Apis mellifera L. In all genetic improvement programs the selected characters must be measured with precision, and because of this we evaluated a metabolic method for testing honeybee defensive behavior in the laboratory for its usefulness in distinguishing between honeybee ecotypes and selecting honeybees based on their level of defensive responses. Ten honeybee colonies were used, five having been produced by feral queens from a subtropical region supposedly colonized by Africanized honeybees and five by queens from a temperate region apparently colonized by European honeybees. We evaluate honeybee defensive behavior using a metabolic test based on oxygen consumption after stimulation with an alarm pheromone, measuring the time to the first response, time to maximum oxygen consumption, duration of activity, oxygen consumption at first response, maximum oxygen consumption and total oxygen consumption, colonies being ranked according to the values obtained for each variable. Significant (p < 0.05 differences were detected between ecotypes for each variable but for all variables the highest rankings were obtained for colonies of subtropical origin, which had faster and more intense responses. All variables were highly associated (p < 0.05. Total oxygen consumption was the best indicator of metabolic activity for defensive behavior because it combined oxygen consumption and the length of the response. This laboratory method may be useful for evaluating the defensive behavior of honey bees in genetic programs designed to select less defensive bees.

  16. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  17. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  18. ξ common cause failure model and method for defense effectiveness estimation

    International Nuclear Information System (INIS)

    Li Zhaohuan

    1991-08-01

    Two issues have been dealt. One is to develop an event based parametric model called ξ-CCF model. Its parameters are expressed in the fraction of the progressive multiplicities of failure events. By these expressions, the contribution of each multiple failure can be presented more clearly. It can help to select defense tactics against common cause failures. The other is to provide a method which is based on the operational experience and engineering judgement to estimate the effectiveness of defense tactics. It is expressed in terms of reduction matrix for a given tactics on a specific plant in the event by event form. The application of practical example shows that the model in cooperation with the method can simply estimate the effectiveness of defense tactics. It can be easily used by the operators and its application may be extended

  19. Defense Transformation: Background and Oversight Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    .... The Administration's vision for defense transformation calls for shifting the U.S. military toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower...

  20. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  1. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  2. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  3. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  4. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  5. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  6. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  7. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    .37). State-based medical legal environment is not a significant driver of increased defensive medicine associated with neurosurgical spine procedures. 3.

  8. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  9. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  10. Environmental Assessment: Base Realignment and Closure (BRAC) 2005 Mission Realignments to Vandenberg AFB

    Science.gov (United States)

    2007-02-01

    implied by altered connective tissue metabolism and altered pulmonary morphology in animals after long-term exposures and pulmonary function...addition to the wildlife found in chaparral, other species include mammals like Heerman’s kangaroo rat (Dipodomys heermanni), Broad-footed mole (Scapanus

  11. Defense-in-depth evaluation for the New Waste Transfer Facility

    International Nuclear Information System (INIS)

    Hayes, T.G.; Kelly, J.L.

    1995-01-01

    This report fulfills part of the requirements of References 2 and 3 by documenting a Defense-In-Depth evaluation for the New Waste Transfer Facility (NWTF). This evaluation was performed using methodology similar to that used in an evaluation for the Defense Waste Processing Facility (DWPF). It differs because the DWPF evaluation was based on an existing Process Hazards Analysis (PHA) while NWTF's is based on a Preoperational Process Hazards Review (PHR) (Ref. 1). The accidents in the Process Hazards Review (PHR) were reviewed to determine those that might have significant consequences. Significance was based on the findings of the PHR, The facility design was reviewed to determine the Structures, Systems, and Components (SSCs) and administrative controls available before and after each accident. From this was developed a list of the Lines of Defense (LODs) available to contain the hazard associated with the accident. A summary of these LODs is given in Appendix C. Items are tabulated that are suggested for consideration in the functional classification as worker protection items. The specific criteria used in the evaluation is given in the methodology section of this report. The results are documented in Appendices A, B, C, and D

  12. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  13. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  14. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  15. Major Management Challenges and Program Risks Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    .... The report also addresses corrective actions that DOD has taken or initiated on these issues- including DOD'S blueprint for a strategy-based, balanced, and affordable defense program as outlined...

  16. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  18. Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems

    National Research Council Canada - National Science Library

    Lorell, Mark A; Graser, John C; Cook, Cynthia R

    2005-01-01

    .... Critics of this traditional, CBA method see it as imposing heavy regulatory burdens on the government and the contractor and tending to discourage potential non-defense contractors from competing...

  19. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  20. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  1. Construction and characteristics of questionnaire for the assessment of defense mechanisms: MOD

    Directory of Open Access Journals (Sweden)

    Džamonja-Ignjatović Tamara

    2014-01-01

    Full Text Available Defense mechanisms are psychological constructs of key importance for the assessment of personality and planning therapeutic process. Their assessment is mainly based on interview, observation and projective techniques. Questionnaires, as the self-assessment techniques, apparently are not suitable method for unconscious processes such as defense mechanisms. The paper presents the results of construction of the questionnaire for the assessment of defense mechanisms, abbreviated called MOD (Mechanisms of Defense, which represents an attempt to clarify conceptualization and operationalization of these constructs through a variety of behavioral and emotional manifestations, personal attitudes and beliefs, patterns of interpersonal relationships and feedback from environment. Research objectives included testing of metric characteristics and the factor structure of the questionnaire, as well as its validity for differentiating subjects from clinical and non-clinical populations. The questionnaire has 110 items assessed at the 5-point Likert scale for evaluation of 20 defense mechanisms. The sample consisted of 194 subjects of both sexes, of which 136 students of psychology and social work and 58 nonpsychotic patients from clinical populations. The results showed that the reliability of the scale varies from high to unsatisfactory (Cronbach alpha .82- .35, although for most subscales is around .65-.70. The most of defense mechanisms has one factor structure, whereas from about a third of the subscales two principal components were isolated. Analysis of the structure of mature defense mechanisms clearly derived out four factors corresponding to the presumed mechanisms of defense, while for the groups of neurotic and immature mechanisms were not obtained pure solutions. The questionnaire successfully differentiate clinical from non-clinical sample, based on higher scores on mature and lower scores on immature mechanisms, while the groups did not differ

  2. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  3. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  4. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  5. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  6. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  7. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  8. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  9. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  10. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  11. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  12. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Price, D E; Durling, R L

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  13. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  14. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  15. Air Base Defense in the Republic of Vietnam, 1961-1973,

    Science.gov (United States)

    1979-01-01

    that trying year at best the The same conditions prevailed at Pleiku. Maj. Perry J. Rawls , Chief of RVNAF responsible for external de- Security Police...which depend on yourself alone and your own ability. Niccolo Machiavelli , 1513. The local ground defense of Forces Vietnam, Seventh Air Force, USAF...in 23. EOTR, Maj Perry J. Rawls , Ch/ Vietnam, Part H: May-December 1965 SP, Pleiku AB, 30 May 69. (Hist Div, USMC, 1970), p 6:18; lItr, 24. Ltr, Ch/SP

  16. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  17. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  18. Allegations Concerning Defense Reutilization and Marketing Service Business Practices

    National Research Council Canada - National Science Library

    2001-01-01

    We performed this audit in response to a request from Senator John Warner. The request was based on several allegations the senator's office received concerning the operations of the Defense Reutilization and Marketing Service (DRMS...

  19. Defensive traits exhibit an evolutionary trade-off and drive diversification in ants.

    Science.gov (United States)

    Blanchard, Benjamin D; Moreau, Corrie S

    2017-02-01

    Evolutionary biologists have long predicted that evolutionary trade-offs among traits should constrain morphological divergence and species diversification. However, this prediction has yet to be tested in a broad evolutionary context in many diverse clades, including ants. Here, we reconstruct an expanded ant phylogeny representing 82% of ant genera, compile a new family-wide trait database, and conduct various trait-based analyses to show that defensive traits in ants do exhibit an evolutionary trade-off. In particular, the use of a functional sting negatively correlates with a suite of other defensive traits including spines, large eye size, and large colony size. Furthermore, we find that several of the defensive traits that trade off with a sting are also positively correlated with each other and drive increased diversification, further suggesting that these traits form a defensive suite. Our results support the hypothesis that trade-offs in defensive traits significantly constrain trait evolution and influence species diversification in ants. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  20. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  1. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  2. Silicate Based Glass Formulations for Immobilization of U.S. Defense Wastes Using Cold Crucible Induction Melters

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Gary L.; Kim, Dong-Sang; Schweiger, Michael J.; Marra, James C.; Lang, Jesse B.; Crum, Jarrod V.; Crawford, Charles L.; Vienna, John D.

    2014-05-22

    The cold crucible induction melter (CCIM) is an alternative technology to the currently deployed liquid-fed, ceramic-lined, Joule-heated melter for immobilizing of U.S. tank waste generated from defense related reprocessing. In order to accurately evaluate the potential benefits of deploying a CCIM, glasses must be developed specifically for that melting technology. Related glass formulation efforts have been conducted since the 1990s including a recent study that is first documented in this report. The purpose of this report is to summarize the silicate base glass formulation efforts for CCIM testing of U.S. tank wastes. Summaries of phosphate based glass formulation and phosphate and silicate based CCIM demonstration tests are reported separately (Day and Ray 2013 and Marra 2013, respectively). Combined these three reports summarize the current state of knowledge related to waste form development and process testing of CCIM technology for U.S. tank wastes.

  3. Defensive enrolment in mantis shrimp larvae (Malacostraca: Stomatopoda)

    NARCIS (Netherlands)

    Haug, C.; Haug, J.T.

    2014-01-01

    We describe a possible new defensive behaviour of larval stages of mantis shrimps (Stomatopoda). Mantis shrimp larvae are rarely observed in nature, thus the study is based on postures of museum material and functional morphological aspects. Specimens described here are tightly enrolled, their pleon

  4. Prolonged Adaptive Evolution of a Defensive Gene in the Solanaceae.

    Science.gov (United States)

    Rausher, Mark D; Huang, Jie

    2016-01-01

    Although plants and their natural enemies may coevolve for prolonged periods, little is known about how long individual plant defensive genes are involved in the coevolutionary process. We address this issue by examining patterns of selection on the defensive gene threonine deaminase (TD). Tomato (Solanum lycopersicum) has two copies of this gene. One performs the canonical housekeeping function in amino acid metabolism of catalyzing the first reaction in the conversion of threonine to isoleucine. The second copy functions as an antinutritive defense against lepidopteran herbivores by depleting threonine in the insect gut. Wild tobacco (Nicotiana attenuata) also contains a defensive copy. We show that a single copy of TD underwent two or three duplications near the base of the Solanaceae. One copy retains the housekeeping function, whereas a second copy evolved defensive functions. Positive selection occurred on the branch of the TD2 gene tree subtending the common ancestor of the Nicotianoideae and Solanoideae. It also occurred within the Solanoideae clade but not within the Nicotianoideae clade. Finally, it occurred on most branches leading from the common ancestor to S. lycopersicum. Based on recent calibrations of the Solanaceae phylogeny, TD2 experienced adaptive substitutions for a period of 30-50 My. We suggest that the most likely explanation for this result is fluctuating herbivore abundances: When herbivores are rare, relaxed selection increases the likelihood that slightly disadvantageous mutations will be fixed by drift; when herbivores are common, increased selection causes the evolution of compensatory adaptive mutations. Alternative explanations are also discussed. © The Author 2015. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  5. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  6. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  7. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  8. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  9. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  10. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  11. 76 FR 6455 - Final Programmatic Environmental Impact Statement (PEIS) for the Growth, Realignment, and...

    Science.gov (United States)

    2011-02-04

    ... alternative, the Army would retain its aviation force structure at its current levels, configurations, and.... The primary environmental issues evaluated include impacts to air quality, soil, airspace, cultural... DEPARTMENT OF DEFENSE Department of the Army Final Programmatic Environmental Impact Statement...

  12. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    Science.gov (United States)

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  13. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  14. Estimating Herd Immunity to Amphibian Chytridiomycosis in Madagascar Based on the Defensive Function of Amphibian Skin Bacteria

    Directory of Open Access Journals (Sweden)

    Molly C. Bletz

    2017-09-01

    Full Text Available For decades, Amphibians have been globally threatened by the still expanding infectious disease, chytridiomycosis. Madagascar is an amphibian biodiversity hotspot where Batrachochytrium dendrobatidis (Bd has only recently been detected. While no Bd-associated population declines have been reported, the risk of declines is high when invasive virulent lineages become involved. Cutaneous bacteria contribute to host innate immunity by providing defense against pathogens for numerous animals, including amphibians. Little is known, however, about the cutaneous bacterial residents of Malagasy amphibians and the functional capacity they have against Bd. We cultured 3179 skin bacterial isolates from over 90 frog species across Madagascar, identified them via Sanger sequencing of approximately 700 bp of the 16S rRNA gene, and characterized their functional capacity against Bd. A subset of isolates was also tested against multiple Bd genotypes. In addition, we applied the concept of herd immunity to estimate Bd-associated risk for amphibian communities across Madagascar based on bacterial antifungal activity. We found that multiple bacterial isolates (39% of all isolates cultured from the skin of Malagasy frogs were able to inhibit Bd. Mean inhibition was weakly correlated with bacterial phylogeny, and certain taxonomic groups appear to have a high proportion of inhibitory isolates, such as the Enterobacteriaceae, Pseudomonadaceae, and Xanthamonadaceae (84, 80, and 75% respectively. Functional capacity of bacteria against Bd varied among Bd genotypes; however, there were some bacteria that showed broad spectrum inhibition against all tested Bd genotypes, suggesting that these bacteria would be good candidates for probiotic therapies. We estimated Bd-associated risk for sampled amphibian communities based on the concept of herd immunity. Multiple amphibian communities, including those in the amphibian diversity hotspots, Andasibe and Ranomafana, were

  15. Estimating Herd Immunity to Amphibian Chytridiomycosis in Madagascar Based on the Defensive Function of Amphibian Skin Bacteria.

    Science.gov (United States)

    Bletz, Molly C; Myers, Jillian; Woodhams, Douglas C; Rabemananjara, Falitiana C E; Rakotonirina, Angela; Weldon, Che; Edmonds, Devin; Vences, Miguel; Harris, Reid N

    2017-01-01

    For decades, Amphibians have been globally threatened by the still expanding infectious disease, chytridiomycosis. Madagascar is an amphibian biodiversity hotspot where Batrachochytrium dendrobatidis ( Bd ) has only recently been detected. While no Bd -associated population declines have been reported, the risk of declines is high when invasive virulent lineages become involved. Cutaneous bacteria contribute to host innate immunity by providing defense against pathogens for numerous animals, including amphibians. Little is known, however, about the cutaneous bacterial residents of Malagasy amphibians and the functional capacity they have against Bd . We cultured 3179 skin bacterial isolates from over 90 frog species across Madagascar, identified them via Sanger sequencing of approximately 700 bp of the 16S rRNA gene, and characterized their functional capacity against Bd . A subset of isolates was also tested against multiple Bd genotypes. In addition, we applied the concept of herd immunity to estimate Bd -associated risk for amphibian communities across Madagascar based on bacterial antifungal activity. We found that multiple bacterial isolates (39% of all isolates) cultured from the skin of Malagasy frogs were able to inhibit Bd . Mean inhibition was weakly correlated with bacterial phylogeny, and certain taxonomic groups appear to have a high proportion of inhibitory isolates, such as the Enterobacteriaceae, Pseudomonadaceae, and Xanthamonadaceae (84, 80, and 75% respectively). Functional capacity of bacteria against Bd varied among Bd genotypes; however, there were some bacteria that showed broad spectrum inhibition against all tested Bd genotypes, suggesting that these bacteria would be good candidates for probiotic therapies. We estimated Bd -associated risk for sampled amphibian communities based on the concept of herd immunity. Multiple amphibian communities, including those in the amphibian diversity hotspots, Andasibe and Ranomafana, were estimated to be

  16. [Psychometric assessment of defense mechanisms: correlation between questionnaire and expert rating. Initial study of validity].

    Science.gov (United States)

    Reister, G; Fellhauer, R F; Franz, M; Wirth, T; Schellberg, D; Schepank, H; Tress, W

    1993-01-01

    Within the limits of an epidemiological longitudinal field survey on prevalence and course of psychogenic disorders a high-risk-population suffering from medical psychogenic impairment was investigated. The study was conducted in order to verify an etiological multi-level-model of psychogenic disorders in relation to the socialempiric variables "critical life events" and "social support" as well as the depth psychological oriented construct "personality". Besides other instruments a self rating scale based on Vallant's hierarchical model of defense, i.e. the german adaptation of the DSQ (Defense Style Questionnaire) of Bond and coworkers, was used for the accurate measurement of relevant personality parameters. Although defense processes predominantly work unconscious, manifestations of defense mechanisms could be measured indirectly by means of the rating scale. Its essential dimensions separated clinical patients from a group of healthy controls. Furthermore an immature organisation of defense was found to be related to psychogenic impairment. Concerning self- and expert-rating a significant correlation between "immature defense" and the defense mechanisms "schizoid phantasy", "projection" and "acting out" was proved.

  17. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  18. A Conceptual Framework for Defense Acquisition Decision Makers: Giving the Schedule its Due

    Science.gov (United States)

    2014-01-01

    Principles from microeconomic theory and operations research can provide insight into acquisition decisions to produce military capabili- ties in an...models based on economic and operations research principles can yield valuable insight into defense acquisition decisions. This article focuses on models...Department Edmund Conrow (1995) developed an excellent microeconomic framework to investigate the incentives of buyers and sellers in the defense

  19. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  20. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  1. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  2. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  3. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  4. Arsenal of elevated defense proteins fails to protect tomato against Verticillium dahliae.

    Science.gov (United States)

    Robb, Jane; Shittu, Hakeem; Soman, Kizhake V; Kurosky, Alexander; Nazar, Ross N

    2012-08-01

    Although the hypersensitive reaction in foliar plant diseases has been extensively described, little is clear regarding plant defense strategies in vascular wilt diseases affecting numerous economically important crops and trees. We have examined global genetic responses to Verticillium wilt in tomato (Lycopersicon esculentum Mill.) plants differing in Ve1 resistance alleles. Unexpectedly, mRNA analyses in the susceptible plant (Ve1-) based on the microarrays revealed a very heroic but unsuccessful systemic response involving many known plant defense genes. In contrast, the response is surprisingly low in plants expressing the Ve1+ R-gene and successfully resisting the pathogen. Similarly, whole-cell protein analyses, based on 2D gel electrophoresis and mass spectrometry, demonstrate large systemic increases in a variety of known plant defense proteins in the stems of susceptible plants but only modest changes in the resistant plant. Taken together, the results indicate that the large systemic increases in plant defense proteins do not protect the susceptible plant. Indeed, since a number of the highly elevated proteins are known to participate in the plant hypersensitive response as well as natural senescence, the results suggest that some or all of the disease symptoms, including ultimate plant death, actually may be the result of this exaggerated plant response.

  5. The CODE: a revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H. R.; Olff, M.; Ursin, H.

    1997-01-01

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  6. The CODE : A revised battery for coping and defense and its relations to subjective health

    NARCIS (Netherlands)

    Eriksen, H.R; Olff, M.; Ursin, H

    A condensed test battery (the CODE) based on the Utrecht Coping List (UCL) and part of the Defense Mechanisms Inventory (DMI) has been developed to assess coping and defense in large population studies. It was tested for reliability and validity in students and back pain patients. Principal

  7. Civilian applications for superconducting magnet technology developed for defense

    International Nuclear Information System (INIS)

    Johnson, R.A.; Klein, S.W.; Gurol, H.

    1986-01-01

    Seventy years after its discovery, superconducting technology is beginning to play an important role in the civilian sector. Strategic defense initiative (SDI)-related research in space- and ground-based strategic defense weapons, particularly research efforts utilizing superconducting magnet energy storage, magnetohydrodynamics (MHD), and superconducting pulsed-power devices, have direct applications in the civilian sector as well and are discussed in the paper. Other applications of superconducting magnets, which will be indirectly enhanced by the overall advancement in superconducting technology, include high-energy physics accelerators, magnetic resonance imaging, materials purifying, water purifying, superconducting generators, electric power transmission, magnetically levitated trains, magnetic-fusion power plants, and superconducting computers

  8. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  15. Performance-Based Acquisition: A tool to reduce costs and improve performance at US Army environmental remediation sites

    International Nuclear Information System (INIS)

    Kosko, Nancy; Gilman, Janet; White, Debbie

    2007-01-01

    The US Army, like most US federal and state environmental organizations, is faced with limited resources to conduct environmental work, an increasing workload, and challenges in achieving closeout of its environmental cleanup programs. In 2001, in an effort to incorporate proven private sector tools into federal cleanup programs, the Department of Defense (DoD) Business Initiative Council (BIC), initiated the use of Performance-Based Acquisition (PBA) for environmental cleanup. Since fiscal year 2000, the US Army Environmental Command (USAEC) has successfully awarded more than 55 performance-based contracts for environmental remediation. These contracts range in size from $500,000 to $52.4 million, and include closing properties (Base Realignment and Closure (BRAC)) and some of the US Army's most complex active installations. The contracts address a range of activities including investigation through monitoring and site completion, as well as various technical challenges including dense non-aqueous phase liquids (DNAPL) in ground water, karst systems, munitions and explosives of concern, and biological agents. The contracts are most often firm-fixed price, and 50 percent of the contracts required contractors to purchase environmental insurance in the form of remediation stop loss insurance (also known as cleanup cost cap insurance). The USAEC has conducted continuous process improvement since inception of the initiative. This paper presents results of two studies that were conducted in 2005-2006 to determine what lessons learned can be applied to future activities and to measure performance of contractors currently executing work under the performance based contracts. (authors)

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  18. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  19. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  20. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  1. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  2. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  3. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier.

    Directory of Open Access Journals (Sweden)

    Yuki Ishikawa

    Full Text Available In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA and tyramine (TA, as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG and the OA level in brain were increased in soldiers than in pseudergates (worker caste. Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes.

  4. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  5. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    Science.gov (United States)

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  6. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control

    Directory of Open Access Journals (Sweden)

    Michel Nicolas

    2017-12-01

    Full Text Available The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six (N = 296 athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  7. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  8. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  9. Impact of transporting defense high-level waste to a geologic repository

    International Nuclear Information System (INIS)

    Joy, D.S.; Shappert, L.B.; Boyle, J.W.

    1984-12-01

    The Nuclear Waste Policy Act of 1982 (Public Law 97-425) provides for the development of repositories for the disposal of high-level radioactive waste and spent nuclear fuel and requires the Secretary of Energy to evaluate five potential repository sites. One factor that is to be examined is transportation of radioactive materials to such a repository and whether transportation might be affected by shipments to a defense-only repository, or to one that accepts both defense and commercial waste. In response to this requirement, The Department of Energy has undertaken an evaluation of the cost and risk associated with the potential shipments. Two waste-flow scenarios are considered which are related to the total quantity of defense high-level waste which will be placed in a repository. The low-flow case is based on a total of 6700 canisters being transported from one site, while the high-flow case assumes that a total of 20,000 canisters will be transported from three sites. For the scenarios considered, the estimated shipping costs range from $105 million to $257 million depending upon the mode of transport and the repository location. The total risks associated with shipping defense high-level waste to a repository are estimated to be significantly smaller than predicted for other transportation activities. In addition, the cost of shipping defense high-level waste to a repository does not depend on whether the site is a defense-only or a commercial repository. Therefore, the transportation considerations are not a basis for the selection of one of the two disposal options

  10. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  11. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  12. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  13. Allowable residual contamination levels: transuranic advanced disposal systems for defense waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Napier, B.A.

    1982-01-01

    An evaluation of advanced disposal systems for defense transuranic (TRU) wastes is being conducted using the Allowable Residual Contamination Level (ARCL) method. The ARCL method is based on compliance with a radiation dose rate limit through a site-specific analysis of the potential for radiation exposure to individuals. For defense TRU wastes at the Hanford Site near Richland, Washington, various advanced disposal techniques are being studied to determine their potential for application. This paper presents a discussion of the results of the first stage of the TRU advanced disposal systems project

  14. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  15. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  16. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  17. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  18. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  19. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  20. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  1. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  2. Defense, basic, and industrial research at the Los Alamos Neutron Science Center: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Longshore, A.; Salgado, K. [comps.

    1995-10-01

    The Workshop on Defense, Basic, and Industrial Research at the Los Alamos Neutron Science Center gathered scientists from Department of Energy national laboratories, other federal institutions, universities, and industry to discuss the use of neutrons in science-based stockpile stewardship, The workshop began with presentations by government officials, senior representatives from the three weapons laboratories, and scientific opinion leaders. Workshop participants then met in breakout sessions on the following topics: materials science and engineering; polymers, complex fluids, and biomaterials; fundamental neutron physics; applied nuclear physics; condensed matter physics and chemistry; and nuclear weapons research. They concluded that neutrons can play an essential role in science-based stockpile stewardship and that there is overlap and synergy between defense and other uses of neutrons in basic, applied, and industrial research from which defense and civilian research can benefit. This proceedings is a collection of talks and papers from the plenary, technical, and breakout session presentations. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  3. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    International Nuclear Information System (INIS)

    Durling, Jr. R.L.; Price, D.E.

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  4. U.S. Department of Defense Multiple-Parameter Biodosimetry Network

    International Nuclear Information System (INIS)

    Blakely, William F.; Hoefer, Matthew H.; Huff, L. Andrew; Romanyukha, Alexander; Hayes, Selena M.; Williams, Anthony; Sharp, Thad; Reyes, Ricardo A.; Stewart, H. Michael Jr

    2016-01-01

    The U.S. Department of Defense (US-DOD) service members are at risk of exposure to ionizing radiation due to radiation accidents, terrorist attacks and national defense activities. The use of biodosimetry is a standard of care for the triage and treatment of radiation injuries. Resources and procedures need to be established to implement a multiple-parameter biodosimetry system coupled with expert medial guidance to provide an integrated radiation diagnostic system to meet US-DOD requirements. Current US-DOD biodosimetry capabilities were identified and recommendations to fill the identified gaps are provided. A US-DOD Multi-parametric Biodosimetry Network, based on the expertise that resides at the Armed Forces Radiobiology Research Institute and the Naval Dosimetry Center, was designed. This network based on the use of multiple biodosimetry modalities would provide diagnostic and triage capabilities needed to meet US-DOD requirements. These are not available with sufficient capacity elsewhere but could be needed urgently after a major radiological/nuclear event. (authors)

  5. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  6. Principles of Defense-in-depth philosophy applied in NPP engineering management

    International Nuclear Information System (INIS)

    Wu Guangwei

    2011-01-01

    Based on the Defense-in-depth Concept in nuclear and radiation safety, Defense-in-depth Concept for design management of Nuclear Power Plant (NPP) is developed in this paper to analyze the feasibility and importance of the application of the basic principle: Defense-in-depth concept in NPP systems performed during the design control of NPP. This paper focuses on the NPP engineering management process, and according to the analysis of such process, 5 principles of Defense-in-depth Concept applied in NPP design management are raised: (1) preventing the non-conformities of design via effective design quality management system; (2) discovering and correcting non-conformities of design quality in time via design checkup and design review meeting; (3) carrying out timely analysis and treatment against design non-conformities which have been transferred to construction phase; (4) Assessing and judging the severe non-conformities in construction phase, putting forward treatment opinions and remedies accordingly so as to avoid the existence of such non-conformities in physical construction of NPP; (5) Paying 'return-visit' and performing 'post-assessment' for NPP design to assess the designed functions and safety of NPP comprehensively. (author)

  7. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    Science.gov (United States)

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  8. Changes in the glucosinolate-myrosinase defense system in Brassica juncea cotyledons during seedling development.

    Science.gov (United States)

    Wallace, S K; Eigenbrode, Sanford D

    2002-02-01

    Optimal defense theory (ODT) predicts that plant defenses will be allocated to plant organs and tissues in proportion to their relative fitness values and susceptibilities to attack. This study was designed to test ODT predictions on the myrosinase-glucosinolate defense system in Brassica juncea by examining the relationships between the fitness value of B. juncea cotyledons and the levels and effectiveness of cotyledon defenses. Specifically, we estimated fitness value of cotyledons during plant development by measuring plant growth and seed production after cotyledon damage or removal at successive seedling ages. Cotyledon removal within five days of emergence had a significant impact on growth and seed production, but cotyledon removal at later stages did not. Consistent with ODT, glucosinolate and myrosinase levels in cotyledons also declined with seedling age, as did relative defenses against a generalist herbivore, Spodoptera eridania, as estimated by bioassay. Declines in glucosinolates were as predicted by a passive, allometric dilution model based on cotyledon expansion. Declines in myrosinase activity were significantly more gradual than predicted by allometric dilution, suggesting active retention of myrosinase activity as young cotyledons expand.

  9. The Comparison of Defense Mechanism Styles and Personality Characteristics in Addicts and Healthy Individuals

    Directory of Open Access Journals (Sweden)

    Mohsen Ahmadi

    2012-11-01

    Full Text Available Aim: The purpose of this study was to comprise of psychological defense mechanism styles and personality characteristics in addicts and healthy individuals. Method: In this causal-comparative study, 70 addicts person (with an average age of 37.29±9.81and the age range 23 to 58 years were selected via accessible sampling method of clinics and Hamadan’s addicted self-representing center during the Autumn of 2011, The number of 70 relatives of these people that demographic variables were matched as possible with the comparison group were selected. Both groups were asked to respond to the defense mechanism style and Eysenk personality Questionnaires. Results: The result of this study showed that the scores mean of addicts were higher than healthy people on immature defense mechanism style, neourotism, and neurotic and extraversion personality characteristics and lower than in mature defense style variables. Conclusion: Based on the result of this study there was a significant difference between addict individuals and healthy people in defense mechanism and personality characteristics.

  10. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  11. 77 FR 51970 - Renewal of Missile Defense Advisory Committee

    Science.gov (United States)

    2012-08-28

    ... limitation also applies to any DoD authorized subcommittees. The Secretary of Defense, based upon the... required to be in attendance at all Committee and subcommittee meetings for the entire duration of each and... Designated Federal Officer shall attend the entire duration of the Committee or subcommittee meeting. The...

  12. Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

    Directory of Open Access Journals (Sweden)

    Dileep Basam

    2016-01-01

    Full Text Available Moving Target IPv6 Defense (MT6D imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.

  13. Strategy for the Long Haul: The U.S. Defense Industrial Base, Past, Present and Future

    National Research Council Canada - National Science Library

    Watts, Barry D

    2008-01-01

    .... The other was North Korea's invasion of South Korea in June 1950, which precipitated the large increases in defense spending called for in Paul Nitze's formulation of containment in April 1950...

  14. Egg Production Constrains Chemical Defenses in a Neotropical Arachnid.

    Directory of Open Access Journals (Sweden)

    Taís M Nazareth

    Full Text Available Female investment in large eggs increases the demand for fatty acids, which are allocated for yolk production. Since the biosynthetic pathway leading to fatty acids uses the same precursors used in the formation of polyketides, allocation trade-offs are expected to emerge. Therefore, egg production should constrain the investment in chemical defenses based on polyketides, such as benzoquinones. We tested this hypothesis using the harvestman Acutiosoma longipes, which produces large eggs and releases benzoquinones as chemical defense. We predicted that the amount of secretion released by ovigerous females (OFs would be smaller than that of non-ovigerous females (NOF. We also conducted a series of bioassays in the field and in the laboratory to test whether egg production renders OFs more vulnerable to predation. OFs produce less secretion than NOFs, which is congruent with the hypothesis that egg production constrains the investment in chemical defenses. Results of the bioassays show that the secretion released by OFs is less effective in deterring potential predators (ants and spiders than the secretion released by NOFs. In conclusion, females allocate resources to chemical defenses in a way that preserves a primary biological function related to reproduction. However, the trade-off between egg and secretion production makes OFs vulnerable to predators. We suggest that egg production is a critical moment in the life of harvestman females, representing perhaps the highest cost of reproduction in the group.

  15. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  16. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  17. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  18. Development of Adaptive Coping From Mid to Late Life: A 70-Year Longitudinal Study of Defense Maturity and Its Psychosocial Correlates.

    Science.gov (United States)

    Martin-Joy, John S; Malone, Johanna C; Cui, Xing-Jia; Johansen, Pål-Ørjan; Hill, Kevin P; Rahman, M Omar; Waldinger, Robert J; Vaillant, George E

    2017-09-01

    The present study examines changes in defense maturity from mid to late life using data from an over 70-year longitudinal study. A sample of 72 men was followed beginning in late adolescence. Participants' childhoods were coded for emotional warmth. Defense mechanisms were coded by independent raters using the Q-Sort of Defenses (, Ego mechanisms of defense: A guide for clinicians and researchers 217-233) based on interview data gathered at approximately ages 52 and 75. We examined psychosocial correlates of defenses at midlife, late life, and changes in defense from mid to late life. Overall, defenses grew more adaptive from midlife to late life. However, results differed on the basis of the emotional warmth experienced in the participants' childhoods. In midlife, men who experienced warm childhoods used more adaptive (mature) defenses; yet by late life, this difference in defensive maturity had disappeared. Men who experienced less childhood warmth were more likely to show an increase in adaptive defenses during the period from mid to late life.

  19. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  20. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  1. OverWatch: A Cross-Plane DDoS Attack Defense Framework with Collaborative Intelligence in SDN

    Directory of Open Access Journals (Sweden)

    Biao Han

    2018-01-01

    Full Text Available Distributed Denial of Service (DDoS attacks are one of the biggest concerns for security professionals. Traditional middle-box based DDoS attack defense is lack of network-wide monitoring flexibility. With the development of software-defined networking (SDN, it becomes prevalent to exploit centralized controllers to defend against DDoS attacks. However, current solutions suffer with serious southbound communication overhead and detection delay. In this paper, we propose a cross-plane DDoS attack defense framework in SDN, called OverWatch, which exploits collaborative intelligence between data plane and control plane with high defense efficiency. Attack detection and reaction are two key procedures of the proposed framework. We develop a collaborative DDoS attack detection mechanism, which consists of a coarse-grained flow monitoring algorithm on the data plane and a fine-grained machine learning based attack classification algorithm on the control plane. We propose a novel defense strategy offloading mechanism to dynamically deploy defense applications across the controller and switches, by which rapid attack reaction and accurate botnet location can be achieved. We conduct extensive experiments on a real-world SDN network. Experimental results validate the efficiency of our proposed OverWatch framework with high detection accuracy and real-time DDoS attack reaction, as well as reduced communication overhead on SDN southbound interface.

  2. BombCAD - A new tool for bomb defense in nuclear facilities

    International Nuclear Information System (INIS)

    Massa, D.J.; Howard, J.W.; Sturm, S.R.

    1988-01-01

    This paper describes a new tool for analysis of the specific vulnerability of diverse facilites to bomb attack and for computer-aided-design (CAD) of siting, screening and hardening/softening aspects of comprehensive bomb defense programs. BombCAD combines the extensive architectural and engineering data base and graphics capabilities of modern architectural CAD systems with the bomb effects computational capability of the ''SECUREPLAN'' BOMB UTILITY. BombCAD permits architects/engineers, security professionals and facility managers to analytically estimate and graphically display facility vulnerability and changes (reductions) in vulnerability which result from the adoption of various bomb defense measures

  3. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  4. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  5. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  6. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  7. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  8. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  9. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  10. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  11. Artificial Intelligence: The Bumpy Path Through Defense Acquisition

    Science.gov (United States)

    2017-12-01

    we must prepare for. 2. AI Industry Leaders Throughout history many technological breakthroughs have occurred due to the guidance and curation of... technology demonstrations, and exercises that aim to capture technology -based lessons learned. Failure to address AI essentials causes problems in...defense acquisition: system requirements are impossible to define; transition of AI technology fails; testing cannot be evaluated with confidence; and

  12. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  13. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  14. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  15. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  16. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program.

    Science.gov (United States)

    Pusateri, Anthony E; Dubick, Michael A

    2015-08-01

    Data from recent conflicts demonstrate the continuing need for research and development focusing on hemorrhage control, fluid resuscitation, blood products, transfusion, and pathophysiologic responses to traumatic hemorrhage. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program brings together US Department of Defense efforts and is coordinated with efforts of our other federal government, industry, international, and university-based partners. Military medical research has led to advances in both military and civilian trauma care. A sustained effort will be required to continue to advance the care of severely injured trauma patients.

  17. A characteristic study of CCF modeling techniques and optimization of CCF defense strategies

    International Nuclear Information System (INIS)

    Kim, Min Chull

    2000-02-01

    Common Cause Failures (CCFs ) are among the major contributors to risk and core damage frequency (CDF ) from operating nuclear power plants (NPPs ). Our study on CCF focused on the following aspects : 1) a characteristic study on the CCF modeling techniques and 2) development of the optimal CCF defense strategy. Firstly, the characteristics of CCF modeling techniques were studied through sensitivity study of CCF occurrence probability upon system redundancy. The modeling techniques considered in this study include those most widely used worldwide, i.e., beta factor, MGL, alpha factor, and binomial failure rate models. We found that MGL and alpha factor models are essentially identical in terms of the CCF probability. Secondly, in the study for CCF defense, the various methods identified in the previous studies for defending against CCF were classified into five different categories. Based on these categories, we developed a generic method by which the optimal CCF defense strategy can be selected. The method is not only qualitative but also quantitative in nature: the selection of the optimal strategy among candidates is based on the use of analytic hierarchical process (AHP). We applied this method to two motor-driven valves for containment sump isolation in Ulchin 3 and 4 nuclear power plants. The result indicates that the method for developing an optimal CCF defense strategy is effective

  18. Preserving the ABM treaty: a critique of the Reagan Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Drell, S.D.; Farley, P.J.; Holloway, D.

    1984-01-01

    President Reagan's Strategic Defense Initiative (SDI) proposal for long-term research and development on a leak-proof defense capability conflicts with the past 15 years of Soviet-American strategic relations and arms control negotiations. It represents a unilateral change, and will elicit a Soviet response based on how the Soviets think their own security may be affected. Whether the SDI transcends or enhances defense, it raises basic issues involving the US-Soviet strategic relationship. Emphasizing the central bearing of the Anti-Ballistic Missile (ABM) Treaty of 1972 the author reviews these issues and questions about the technical and strategic grounds of the proposal. Three recommendations are to limit the SDI program to a search for scientific possibilities, to consult with the Soviets on the ABM Treaty, and to recognize that the ABM Treaty will enhance security more than the SDI. 58 references

  19. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    International Nuclear Information System (INIS)

    Seidel, F.

    1998-01-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper's intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  20. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Federal Office for Radiation Protection, Salzgitter (Germany)

    1998-10-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper`s intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  1. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  2. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  3. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  4. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  5. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  6. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  7. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  8. Evolutionary potential of root chemical defense: genetic correlations with shoot chemistry and plant growth.

    Science.gov (United States)

    Parker, J D; Salminen, J-P; Agrawal, Anurag A

    2012-08-01

    Root herbivores can affect plant fitness, and roots often contain the same secondary metabolites that act as defenses in shoots, but the ecology and evolution of root chemical defense have been little investigated. Here, we investigated genetic variance, heritability, and correlations among defensive phenolic compounds in shoot vs. root tissues of common evening primrose, Oenothera biennis. Across 20 genotypes, there were roughly similar concentrations of total phenolics in shoots vs. roots, but the allocation of particular phenolics to shoots vs. roots varied along a continuum of genotype growth rate. Slow-growing genotypes allocated 2-fold more of the potential pro-oxidant oenothein B to shoots than roots, whereas fast-growing genotypes had roughly equivalent above and belowground concentrations. Phenolic concentrations in both roots and shoots were strongly heritable, with mostly positive patterns of genetic covariation. Nonetheless, there was genotype-specific variation in the presence/absence of two major ellagitannins (oenothein A and its precursor oenothein B), indicating two different chemotypes based on alterations in this chemical pathway. Overall, the presence of strong genetic variation in root defenses suggests ample scope for the evolution of these compounds as defenses against root herbivores.

  9. Role of Soluble Innate Effector Molecules in Pulmonary Defense against Fungal Pathogens

    Directory of Open Access Journals (Sweden)

    Soledad R. Ordonez

    2017-10-01

    Full Text Available Fungal infections of the lung are life-threatening but rarely occur in healthy, immunocompetent individuals, indicating efficient clearance by pulmonary defense mechanisms. Upon inhalation, fungi will first encounter the airway surface liquid which contains several soluble effector molecules that form the first barrier of defense against fungal infections. These include host defense peptides, like LL-37 and defensins that can neutralize fungi by direct killing of the pathogen, and collectins, such as surfactant protein A and D, that can aggregate fungi and stimulate phagocytosis. In addition, these molecules have immunomodulatory activities which can aid in fungal clearance from the lung. However, existing observations are based on in vitro studies which do not reflect the complexity of the lung and its airway surface liquid. Ionic strength, pH, and the presence of mucus can have strong detrimental effects on antifungal activity, while the potential synergistic interplay between soluble effector molecules is largely unknown. In this review, we describe the current knowledge on soluble effector molecules that contribute to antifungal activity, the importance of environmental factors and discuss the future directions required to understand the innate antifungal defense in the lung.

  10. Role of Soluble Innate Effector Molecules in Pulmonary Defense against Fungal Pathogens

    Science.gov (United States)

    Ordonez, Soledad R.; Veldhuizen, Edwin J. A.; van Eijk, Martin; Haagsman, Henk P.

    2017-01-01

    Fungal infections of the lung are life-threatening but rarely occur in healthy, immunocompetent individuals, indicating efficient clearance by pulmonary defense mechanisms. Upon inhalation, fungi will first encounter the airway surface liquid which contains several soluble effector molecules that form the first barrier of defense against fungal infections. These include host defense peptides, like LL-37 and defensins that can neutralize fungi by direct killing of the pathogen, and collectins, such as surfactant protein A and D, that can aggregate fungi and stimulate phagocytosis. In addition, these molecules have immunomodulatory activities which can aid in fungal clearance from the lung. However, existing observations are based on in vitro studies which do not reflect the complexity of the lung and its airway surface liquid. Ionic strength, pH, and the presence of mucus can have strong detrimental effects on antifungal activity, while the potential synergistic interplay between soluble effector molecules is largely unknown. In this review, we describe the current knowledge on soluble effector molecules that contribute to antifungal activity, the importance of environmental factors and discuss the future directions required to understand the innate antifungal defense in the lung. PMID:29163395

  11. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  12. AMI Go Home - Assessing the Realignment of U.S. Army Forces in Europe

    Science.gov (United States)

    2005-03-18

    a major U.S. investment.37 According to Stuart Drury of the Joint Chiefs of Staff, deploying would be much more difficult from Eastern Europe...35 Ibid, xvi. 36 Ibid,12. 37 Ibid, 29. 38 Stuart P. Drury , “The Argument Against Relocating U.S. Forces in Europe,” National Defense University...Europe in the 21st Century,” Parameters (Autumn 2004): 61. 53 Colin Powell, “A Strategy of Partnership,” Foreign Affairs (Jan/Feb 2004): 22. 54 Michael

  13. Emergency treatment of male blunt urethral trauma in China: Outcome of different methods in comparison with other countries

    Directory of Open Access Journals (Sweden)

    Yumeng Zhang

    2018-04-01

    Full Text Available Treatment of male urethral trauma is always a challenging problem. In China, as the incidence of urethral trauma keeps rising, more and more studies relating to this are being published. To compare the outcome of different emergency treatments in China and other countries, we searched Chinese and English literature about this topic in the past 16 years. A total of 167 studies involving 5314 patients were included, with 144 in Chinese and 23 in English. All studies were retrospective in nature. Based on the analyses, surgical methods include open realignment, endoscopic realignment and primary repair, and we summarized and compared the success rate and complications (mainly erectile dysfunction and incontinence of each method. We found that realignment of posterior urethra has similar success rate in China and other countries, but the outcome of realignment of anterior urethra is variable. The reason remains unknown. While long abandoned in Western countries, primary repair of anterior urethra is still an option in China and has high success rate. Keywords: Urethral trauma, Urethrogram, Endoscopic realignment, Primary repair

  14. Task Group on a Strategic Relationship Model Between the Department of Defense and the Industrial Base

    National Research Council Canada - National Science Library

    2008-01-01

    ...) to evaluate and make recommendations to the Department of Defense (DoD) regarding actions that could improve the strategic relationship between the Department and its manufacturer and service suppliers...

  15. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  16. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  17. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  18. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  19. Confronting actual influence of radiation on human bodies and biological defense mechanism

    International Nuclear Information System (INIS)

    Matsubara, Junko

    2012-01-01

    After the accident at Fukushima Daiichi Nuclear Power Plant of Tokyo Electric Power Company, social, economical, psychological pressures on local residents and fears of radiation among the general public have not been resolved. Based on the assumption that the negligence of specialists to clearly explain the influence of radiation on human bodies to the general public is the factor for above mentioned pressures and fears, the influence of radiation from a realistic view was discussed. The topics covered are: (1) understanding the meaning of radiation regulation, (2) radiation and threshold values, (3) actual influence of low-dose radiation, (4) chemical and biological defense in defense mechanism against radiation, (5) problems raised by Fukushima Daiichi nuclear accident. Furthermore, the article explains the principles and the applications of biological defense function activation, and suggested that self-help efforts to fight against stress are from now on. (S.K.)

  20. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  1. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  2. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  3. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  4. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  5. Knowledge-based software design for Defense-in-Depth risk monitor system and application for AP1000

    International Nuclear Information System (INIS)

    Ma Zhanguo; Yoshikawa, Hidekazu; Yang Ming; Nakagawa, Takashi

    2017-01-01

    As part of the new risk monitor system, the software for the plant Defense-in-Depth (DiD) risk monitor system was designed based on the state-transition and finite-state machine, and then the knowledge-based software was developed by object-oriented method utilizing the Unified Modeling Language (UML). Currently, there are mainly two functions in the developed plant DiD risk monitor software that are knowledge-base editor which is used to model the system in a hierarchical manner and the interaction simulator that simulates the interactions between the different actors in the model. In this paper, a model for playing its behavior is called an Actor which is modeled at the top level. The passive safety AP1000 power plant was studied and the small-break loss-of-coolant accident (SBLOCA) design basis accident transient is modeled using the plant DiD risk monitor software. Furthermore, the simulation result is shown for the interactions between the actors which are defined in the plant DiD risk monitor system as PLANT actor, OPERATOR actor, and SUPERVISOR actor. This paper shows that it is feasible to model the nuclear power plant knowledge base using the software modeling technique. The software can make the large knowledge base for the nuclear power plant with small effort. (author)

  6. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  7. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  8. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  9. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  10. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  11. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  12. A line of defense approach to fissile material control

    International Nuclear Information System (INIS)

    Holloway, S.P.; Holloway, N.J.

    1995-01-01

    A crucial element of the safety policy of the UK Atomic Weapons Establishment (AWE) is that concerned with the safe control of fissile material in order to minimize the potential for unplanned criticality. The principles by which AWE controls fissile material advocate a simple Line of Defense (LOD) approach to assessing criticality-safety related aspects of fissile operations. An LOD assessment provides a measure of the depth of defense available to prevent general types of criticality accident and can be used to demonstrate compliance with the risk-based Basic Safety Limits (BSLs) and Objectives (BSOs) used by the UK Nuclear Installations Inspectorate (NII) to judge the safety of operations in accordance with its Safety Assessment Principles (SAPs) for Nuclear Plants. This paper discusses the LOD concept, the basis of LOD assessment and describes LODs specific to criticality control

  13. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  14. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  15. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  16. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  17. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  18. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  19. MOQPSO-D/S for Air and Missile Defense WTA Problem under Uncertainty

    Directory of Open Access Journals (Sweden)

    Hao Xu

    2017-01-01

    Full Text Available Aiming at the shortcomings of single objective optimization for solving weapon target assignment (WTA and the existing multiobjective optimization based WTA method having problems being applied in air and missile defense combat under uncertainty, a fuzzy multiobjective programming based WTA method was proposed to enhance the adaptability of WTA decision to the changes of battlefield situation. Firstly, a multiobjective quantum-behaved particle swarm optimization with double/single-well (MOQPSO-D/S algorithm was proposed by adopting the double/single-well based position update method, the hybrid random mutation method, and the two-stage based guider particles selection method. Secondly, a fuzzy multiobjective programming WTA model was constructed with consideration of air and missile defense combat’s characteristics. And, the uncertain WTA model was equivalently clarified based on the necessity degree principle of uncertainty theory. Thirdly, with particles encoding and illegal particles adjusting, the MOQPSO-D/S algorithm was adopted to solve the fuzzy multiobjective programming based WTA model. Finally, example simulation was conducted, and the result shows that the WTA model constructed is rational and MOQPSO-D/S algorithm is efficient.

  20. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  1. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  2. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  3. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  4. Sequestered Alkaloid Defenses in the Dendrobatid Poison Frog Oophaga pumilio Provide Variable Protection from Microbial Pathogens.

    Science.gov (United States)

    Hovey, Kyle J; Seiter, Emily M; Johnson, Erin E; Saporito, Ralph A

    2018-03-01

    Most amphibians produce their own defensive chemicals; however, poison frogs sequester their alkaloid-based defenses from dietary arthropods. Alkaloids function as a defense against predators, and certain types appear to inhibit microbial growth. Alkaloid defenses vary considerably among populations of poison frogs, reflecting geographic differences in availability of dietary arthropods. Consequently, environmentally driven differences in frog defenses may have significant implications regarding their protection against pathogens. While natural alkaloid mixtures in dendrobatid poison frogs have recently been shown to inhibit growth of non-pathogenic microbes, no studies have examined the effectiveness of alkaloids against microbes that infect these frogs. Herein, we examined how alkaloid defenses in the dendrobatid poison frog, Oophaga pumilio, affect growth of the known anuran pathogens Aeromonas hydrophila and Klebsiella pneumoniae. Frogs were collected from five locations throughout Costa Rica that are known to vary in their alkaloid profiles. Alkaloids were isolated from individual skins, and extracts were assayed against both pathogens. Microbe subcultures were inoculated with extracted alkaloids to create dose-response curves. Subsequent spectrophotometry and cell counting assays were used to assess growth inhibition. GC-MS was used to characterize and quantify alkaloids in frog extracts, and our results suggest that variation in alkaloid defenses lead to differences in inhibition of these pathogens. The present study provides the first evidence that alkaloid variation in a dendrobatid poison frog is associated with differences in inhibition of anuran pathogens, and offers further support that alkaloid defenses in poison frogs confer protection against both pathogens and predators.

  5. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  6. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  7. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  8. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  9. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  10. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  11. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  12. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  13. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  14. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  15. Toxin-mediated effects on the innate mucosal defenses: implications for enteric vaccines

    DEFF Research Database (Denmark)

    Glenn, Gregory M; Francis, David H; Danielsen, E Michael

    2009-01-01

    mucosal barrier as a key step in enteric pathogen survival. We review key observations relevant to the roles of LT and cholera toxin in protective immunity and the effects of these toxins on innate mucosal defenses. We suggest either that toxin-mediated fluid secretion mechanically disrupts the mucus...... layer or that toxins interfere with innate mucosal defenses by other means. Such a breach gives pathogens access to the enterocyte, leading to binding and pathogenicity by enterotoxigenic E. coli (ETEC) and other organisms. Given the common exposure to LT(+) ETEC by humans visiting or residing...... unexpectedly broad protective effects against LT(+) ETEC and mixed infections when using a toxin-based enteric vaccine. If toxins truly exert barrier-disruptive effects as a key step in pathogenesis, then a return to classic toxin-based vaccine strategies for enteric disease is warranted and can be expected...

  16. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  17. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  18. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  19. Symposium by NATO Defense Research Group Panel VIII on Computer-Based Instruction in Military Environments

    CERN Document Server

    Weddle, Peter

    1987-01-01

    This collection of papers is the result of a symposium sponsored by NATO's Defense Research Group Panel VIII in the Spring of 1985. The symposium came into being when it became obvious to the NATO countries that research, development and utilization of advanced technologies for training was the best means of increasing both training effectiveness and efficiency. This symposium was the second in a series of three devoted to training. The series was structured to cover all aspects of training. The first series addressed the value of training, the second one dealt with the application of training technologies and the third and last of the series focused on academic issues concerned with the effect of prior learning on subsequent learning. The fact that a major American publisher has determined that computer based instruction is the technology of greatest interest to the NATO community is not surprising. Advances in microprocessor technology have revolutionized both how and where we train. During this symposium t...

  20. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  1. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  2. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  3. Autonomic characteristics of defensive hostility: reactivity and recovery to active and passive stressors.

    Science.gov (United States)

    Vella, Elizabeth J; Friedman, Bruce H

    2007-11-01

    The autonomic characteristics of hostility and defensiveness were assessed in 55 male undergraduates based on composite Cook Medley Hostility (Chost) and Marlowe Crowne Social Desirability (MC) scores to create 4 groups: Defensive Hostile (DH; high MC, high Chost), High Hostile (HH; low MC, high Chost), Defensive (Def; high MC, low Chost) and Low Hostile (LH; low MC, low Chost). All subjects engaged in a video game (VG) and hand cold pressor (CP) task. Cardiovascular responses in DH subjects were predicted to show enhanced sympathetic alpha and beta-adrenergic activity and the least vagal control compared to others across tasks. DH and LH men showed significant heart rate reactivity to the CP task compared to HH men. LH men showed significant reductions in high frequency power (vagal assessment) to the tasks compared to HH men. Future studies may employ harassment techniques and include the factors of gender and ethnicity in their assessments.

  4. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  5. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  6. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  7. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  9. Peripheral and central mediators of lipopolysaccharide induced suppression of defensive rage behavior in the cat.

    Science.gov (United States)

    Bhatt, S; Bhatt, R S; Zalcman, S S; Siegel, A

    2009-11-10

    Based upon recent findings in our laboratory that cytokines microinjected into the medial hypothalamus or periaqueductal gray (PAG) powerfully modulate defensive rage behavior in cat, the present study determined the effects of peripherally released cytokines following lipopolysaccharide (LPS) challenge upon defensive rage. The study involved initial identification of the effects of peripheral administration of LPS upon defensive rage by electrical stimulation from PAG and subsequent determination of the peripheral and central mechanisms governing this process. The results revealed significant elevation in response latencies for defensive rage from 60 to 300 min, post LPS injection, with no detectable signs of sickness behavior present at 60 min. In contrast, head turning behavior elicited by stimulation of adjoining midbrain sites was not affected by LPS administration, suggesting a specificity of the effects of LPS upon defensive rage. Direct administration of LPS into the medial hypothalamus had no effect on defensive rage, suggesting that the effects of LPS were mediated by peripheral cytokines rather than by any direct actions upon hypothalamic neurons. Complete blockade of the suppressive effects of LPS by peripheral pretreatment with an Anti-tumor necrosis factor-alpha (TNFalpha) antibody but not with an anti- interleukin-1 (IL-1) antibody demonstrated that the effects of LPS were mediated through TNF-alpha rather than through an IL-1 mechanism. A determination of the central mechanisms governing LPS suppression revealed that pretreatment of the medial hypothalamus with PGE(2) or 5-HT(1A) receptor antagonists each completely blocked the suppressive effects of LPS, while microinjections of a TNF-alpha antibody into the medial hypothalamus were ineffective. Microinjections of -Iodo-N-[2-[4-(methoxyphenyl)-1-piperazinyl]ethyl]-N-(2-pyridinyl) benzamide monohydrochloride (p-MPPI) into lateral hypothalamus (to test for anatomical specificity) had no effect upon

  10. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  11. Empirically based Suggested Insights into the Concept of False-Self Defense: Contributions From a Study on Normalization of Children With Disabilities.

    Science.gov (United States)

    Eichengreen, Adva; Hoofien, Dan; Bachar, Eytan

    2016-02-01

    The concept of the false self has been used widely in psychoanalytic theory and practice but seldom in empirical research. In this empirically based study, elevated features of false-self defense were hypothetically associated with risk factors attendant on processes of rehabilitation and integration of children with disabilities, processes that encourage adaptation of the child to the able-bodied environment. Self-report questionnaires and in-depth interviews were conducted with 88 deaf and hard-of-hearing students and a comparison group of 88 hearing counterparts. Results demonstrate that despite the important contribution of rehabilitation and integration to the well-being of these children, these efforts may put the child at risk of increased use of the false-self defense. The empirical findings suggest two general theoretical conclusions: (1) The Winnicottian concept of the environment, usually confined to the parent-child relationship, can be understood more broadly as including cultural, social, and rehabilitational variables that both influence the parent-child relationship and operate independently of it. (2) The monolithic conceptualization of the false self may be more accurately unpacked to reveal two distinct subtypes: the compliant and the split false self. © 2016 by the American Psychoanalytic Association.

  12. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  13. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  14. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  15. The Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Defensive Functioning Scale: a validity study.

    Science.gov (United States)

    Porcerelli, John H; Cogan, Rosemary; Markova, Tsveti; Miller, Kristen; Mickens, Lavonda

    2011-01-01

    We assess the convergent and predictive validity of the Defensive Functioning Scale (DFS) with measures of life events, including childhood abuse and adult partner victimization; dimensions of psychopathology, including axis I (depressive) and axis II (borderline personality disorder) symptoms; and quality of object relations. One hundred and ten women from a university-based urban primary care clinic completed a research interview from which defense mechanisms were assessed. The quality of object relations was also assessed from interview data. The women completed self-report measures assessing depression, borderline personality disorder symptoms, childhood physical and sexual abuse, and adult partner physical and sexual victimization. Inter-rater reliability of the scoring of the DFS levels was good. High adaptive defenses were positively correlated with the quality of object relations and pathological defenses were positively correlated with childhood and adult victimization and symptom measures. Although major image distorting defenses were infrequently used, they were robustly correlated with all study variables. In a stepwise multiple regression analysis, major image distorting defenses, depressive symptoms, and minor image distorting defenses significantly predict childhood victimization, accounting for 37% of the variance. In a second stepwise multiple regression analysis, borderline personality disorder symptoms and disavowal defenses combined to significantly predict adult victimization, accounting for 16% of the variance. The DFS demonstrates good convergent validity with axis I and axis II symptoms, as well as with measures of childhood and adult victimization and object relations. The DFS levels add nonredundant information to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition beyond axis I and axis II. Copyright © 2011 Elsevier Inc. All rights reserved.

  16. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  17. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  18. Plant neighbor identity influences plant biochemistry and physiology related to defense.

    Science.gov (United States)

    Broz, Amanda K; Broeckling, Corey D; De-la-Peña, Clelia; Lewis, Matthew R; Greene, Erick; Callaway, Ragan M; Sumner, Lloyd W; Vivanco, Jorge M

    2010-06-17

    Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa) or heterospecific (Festuca idahoensis) plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  19. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  20. Mapping allied health evidence-based practice: providing a basis for organisational realignment.

    Science.gov (United States)

    Ziviani, Jenny; Wilkinson, Shelley A; Hinchliffe, Fiona; Feeney, Rachel

    2015-06-01

    Ahead of the convergence of two major paediatric services, we examined evidence-based practice (EBP) self-efficacy, outcome expectance, knowledge and use among allied health (AH) staff in two major Queensland (Qld) paediatric services. This was to determine whether any differences existed based on organisational affiliation, profession and any previous training to inform a strategy to enhance AH EBP within the new organisational setting. All AH staff from the two Brisbane (Qld) tertiary paedritic hospitals were invited to participate in the survey. Using a cross-sectional design EBP self-efficacy, outcome expectancy, knowledge and use, as well as previous EBP training, were assessed with an online survey. Background demographic information obtained included professional discipline and hospital. One hundreD and thirty-eight health practitioners completed the survey (37% respone rate). Most practioners had accessed EBP training. Mean scores for EBP attitudes (self-efficacy and outcome expectancy) and knowledge were higher than for EBP use scores. Greater variation was observed across professional disciplines than organisations. Training impacted positively on EBP measures but explained a small proportion of total variance in regression models. The results underscore the need to provide organisational supports to AH staff ro EBP implementation. Strategies other than training are requred to maximally enhance EBP attitudes. The new organisational structure provides an oppotunity for this cultural shift to occur.

  1. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  2. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  3. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  4. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  5. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  6. Fingerprint re-alignment: a solution based on the true fingerprint center point

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-02-01

    Full Text Available Solution Based on the True Fingerprint Center Point Ishmael S. Msiza, Brain Leke-Betechuoh, and Tendani Malumedzha Biometrics Research Group ? Information Security CSIR, Modelling & Digital Science Unit Pretoria, Republic of South Africa e... with a pattern that belongs to the Tented Arch (TA) fingerprint class. Fingerprints that belong to the TA class have a single core and a single delta, with the core located almost directly above the delta, as depicted in figure 3 (b). Many singular...

  7. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  8. Consequences of variation in plant defense for biodiversity at higher trophic levels

    NARCIS (Netherlands)

    Poelman, E.H.; Loon, van J.J.A.; Dicke, M.

    2008-01-01

    Antagonistic interactions between insect herbivores and plants impose selection on plants to defend themselves against these attackers. Although selection on plant defense traits has typically been studied for pairwise plant¿attacker interactions, other community members of plant-based food webs are

  9. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors endash the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. The report is necessarily based on a limited review of the defense production reactors. It does not address whether any of the reactors are ''safe,'' because such an analysis would involve a determination of acceptable risk endash a matter of obvious importance, but one that was beyond the purview of the committee. It also does not address whether the safety of the production reactors is comparable to that of commercial nuclear power stations, because even this narrower question extended beyond the charge to the committee and would have involved detailed analyses that the committee could not undertake

  10. Which is more effective for suppressing an infectious disease: imperfect vaccination or defense against contagion?

    Science.gov (United States)

    Kuga, Kazuki; Tanimoto, Jun

    2018-02-01

    We consider two imperfect ways to protect against an infectious disease such as influenza, namely vaccination giving only partial immunity and a defense against contagion such as wearing a mask. We build up a new analytic framework considering those two cases instead of perfect vaccination, conventionally assumed as a premise, with the assumption of an infinite and well-mixed population. Our framework also considers three different strategy-updating rules based on evolutionary game theory: conventional pairwise comparison with one randomly selected agent, another concept of pairwise comparison referring to a social average, and direct alternative selection not depending on the usual copying concept. We successfully obtain a phase diagram in which vaccination coverage at equilibrium can be compared when assuming the model of either imperfect vaccination or a defense against contagion. The obtained phase diagram reveals that a defense against contagion is marginally inferior to an imperfect vaccination as long as the same coefficient value is used. Highlights - We build a new analytical framework for a vaccination game combined with the susceptible-infected-recovered (SIR) model. - Our model can evaluate imperfect provisions such as vaccination giving only partial immunity and a defense against contagion. - We obtain a phase diagram with which to compare the quantitative effects of partial vaccination and a defense against contagion.

  11. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  12. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  13. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  14. Cluster as a Tool to Increase the Competitiveness and Innovative Activity of Enterprises of the Defense Industry Complex

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2017-01-01

    Full Text Available Purpose: the main goal of the publication is to make a comprehensive study of the possible application of the cluster approach to improve the competitiveness and innovation activity of enterprises of the defense industry complex.Methods: the methodology of the research is based on the collection and analysis of initial data and information, the article uses a systematic approach to the study of socio-economic processes and phenomena. The research is based on modern theory of competition, innovation, as well as the modern paradigm of cluster development of the economy. In preparing the study, practical materials from Corporation “Rostec”.Results: the article gives the notion of cluster, the prospects for the use of the cluster approach to enhance competitiveness and innovation enterprises of the military-industrial complex. It is noted that the activation of interaction with the “civil sector” is particularly relevant in the context of the reduction of the state defense order, and the theory and practice of cluster management offers a number of forms of cluster interaction between the enterprises of the defense industry and the civil sector. It is emphasized that the development of cluster mechanisms can solve a number of problems related to the insufficient financial stability of defense industry enterprises in the context of a reduction in the state defense order, low innovation activity and the lack of developed models of interaction with small innovative enterprises. Ultimately, the use of cluster mechanisms in the development of defense enterprises is intended to enhance the competitiveness of the complex, both nationally and globally. It is stated that the existing clusters are not able to fully solve a number of specific tasks related to the diversification of integrated defense industry structures. Attention is drawn to the fact that existing clusters are not able to fully solve a number of specific tasks related to the

  15. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  16. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  17. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  18. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  19. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  20. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  1. Department of defense environmental cleanup cost allowability policy. Master`s thesis

    Energy Technology Data Exchange (ETDEWEB)

    Murdock, J.M.

    1994-12-01

    The purpose of this thesis was to investigate the factors affecting the allowability determination of defense contractor environmental remediation costs. The primary objective of this thesis was to determine what policies and contracting cost principles the Department of Defense (DOD) should develop to address environmental costs in a consistent manner, providing a `single face` to industry. A secondary objective was to develop an audit framework and questions to allow for consistent policy analysis and application to a contractor`s proposed environmental remediation costs based upon the materiality of the situation. Background material was presented to show the amount and complexity of environmental regulations, the effects of current judicial decisions and DOD`s efforts to develop a consistent policy. Research material was provided from Congress, the General Accounting Office, DOD, defense contractors, California, Washington, industry associations and environmental protection coalitions. The researcher`s analysis of the material produced an environmental cost principle. This cost principle was applied to a current environmental claim, producing an audit framework and tailored list of cost and/or pricing data analysis, questions. Both the cost principle and audit framework are recommended for incorporation into DOD`s final environmental cost allowability decision.

  2. Different rates of defense evolution and niche preferences in clonal and nonclonal milkweeds (Asclepias spp.).

    Science.gov (United States)

    Pellissier, Loïc; Litsios, Glenn; Fishbein, Mark; Salamin, Nicolas; Agrawal, Anurag A; Rasmann, Sergio

    2016-02-01

    Given the dual role of many plant traits to tolerate both herbivore attack and abiotic stress, the climatic niche of a species should be integrated into the study of plant defense strategies. Here we investigate the impact of plant reproductive strategy and components of species' climatic niche on the rate of chemical defense evolution in the milkweeds using a common garden experiment of 49 species. We found that across Asclepias species, clonal reproduction repeatedly evolved in lower temperature conditions, in species generally producing low concentrations of a toxic defense (cardenolides). Additionally, we found that rates of cardenolide evolution were lower for clonal than for nonclonal species. We thus conclude that because the clonal strategy is based on survival, long generation times, and is associated with tolerance of herbivory, it may be an alternative to toxicity in colder ecosystems. Taken together, these results indicate that the rate of chemical defense evolution is influenced by the intersection of life-history strategy and climatic niches into which plants radiate. © 2015 The Authors. New Phytologist © 2015 New Phytologist Trust.

  3. Instrumentation requirements for radiological defense of the U.S. population in community shelters. Final report

    International Nuclear Information System (INIS)

    Haaland, C.M.; Gant, K.S.

    1978-08-01

    Estimates are made of requirements for instruments for radiological defense of the U.S. population in the event of a nuclear attack. A detailed Community Shelter Plan posture is developed for each of 42,000 Standard Location Areas. Travel distance from residence to shelter in urban areas is limited to approximately 1 mile. Sixty percent of the U.S. population is sheltered in home basements, thirty-one percent in National Shelter Survey shelters, and nine percent is in neither. Three minimum allocations of instruments are developed. Allocation A, one radiological defense set per shelter, is essentially the same as the current civil defense allocations but is found to be inadequate for about 100,000 shelters having more than 100 occupants. Allocation B requires 3.4 million new dosimeters based on estimated shelter occupancy and provides a minimum instrumentation for radiological defense but not enough instruments to maintain individual dose records. Allocation C would require 18.1 million new dosimeters and would provide adequate instrumentation to maintain dose records for all shelter occupants

  4. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  5. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  6. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  7. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  8. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  9. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  10. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  11. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  12. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  13. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  14. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  15. A predictive factor for acquiring an ideal lower limb realignment after opening-wedge high tibial osteotomy.

    Science.gov (United States)

    Bito, Haruhiko; Takeuchi, Ryohei; Kumagai, Ken; Aratake, Masato; Saito, Izumi; Hayashi, Riku; Sasaki, Yohei; Aota, Yoichi; Saito, Tomoyuki

    2009-04-01

    Obtaining a correct postoperative limb alignment is an important factor in achieving a successful clinical outcome after an opening-wedge high tibial osteotomy (OWHTO). To better predict some of the aspects that impact upon the clinical outcomes following this procedure, including postoperative correction loss and over correction, we examined the changes in the frontal plane of the lower limb in a cohort of patients who had undergone OWHTO using radiography. Forty-two knees from 33 patients (23 cases of osteoarthritis and 10 of osteonecrosis) underwent a valgus realignment OWHTO procedure and were radiographically assessed for changes that occurred pre- and post-surgery. The mean femorotibial angle (FTA) was found to be 182.1 +/- 2.0 degrees (12 +/- 2.0 anatomical varus angulation) preoperatively and 169.6 +/- 2.4 degrees (10.4 +/- 2.4 anatomical valgus angulation) postoperatively. These measurements thus revealed significant changes in the weight bearing line ratio (WBL), femoral axis angle (FA), tibial axis angle (TA), tibia plateau angle (TP), tibia vara angle (TV) and talar tilt angle (TT) following OWHTO. In contrast, no significant change was found in the weight bearing line angle (WBLA) after these treatments. To assess the relationship between the correction angle and these indexes, 42 knees were divided into the following three groups according to the postoperative FTA; a normal correction group (168 degrees FTA FTA FTA > 172 degrees ). There were significant differences in the delta angle [DA; calculated as (pre FTA - post FTA) - (pre TV - post TV)] among each group of patients. Our results thus indicate a negative correlation between the DA and preoperative TA (R(2) = 0.148, p < 0.05). Hence, given that the correction errors in our patients appear to negatively correlate with the preoperative TA, postoperative malalignments are likely to be predictable prior to surgery.

  16. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  17. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  18. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  19. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  20. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.