WorldWideScience

Sample records for defense descriptive note

  1. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  2. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  3. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    2000-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials

  4. Notes on Neotropical Eumeninae, with the description of a new species of Pachodynerus de Saussure (Hymenoptera, Vespidae

    Directory of Open Access Journals (Sweden)

    Marcel Gustavo Hermes

    2013-06-01

    Full Text Available Notes on Neotropical Eumeninae, with the description of a new species of Pachodynerus de Saussure (Hymenoptera, Vespidae. Taxonomic information on Neotropical Eumeninae is provided. A new species, Pachodynerus fessatus sp. nov. is described from southeastern São Paulo, Brazil. Additional material of Pachodynerus sericeus (Fox was examined, representing the first further specimens after the original description and including the previously unknown male. The examination of new material of the genus Stenonartonia adds some new distribution records and shows some previously unrecorded individual variation for some species. The males of Stenonartonia guaraya Garcete-Barrett and Stenonartonia rejectoides Garcete-Barrett are described for the first time.

  5. Description and biological notes of the first species of Xenos (Strepsiptera:Stylopidae) parasitic in Polistes carnifex F. (Hymenoptera:Vespidae) in Mexico

    DEFF Research Database (Denmark)

    Kathirithamby, J.; Hughes, David P.

    2006-01-01

    A description and biological notes on the first species of Xenos (X. hamiltoni) (Strepsiptera: Stylopidae) parasitic in Polistes carnifex F. from Mexico is given. A list of Strepsiptera and their hosts from Mexico is provided....

  6. Quality Assurance Program description, Defense Waste Processing Facility (DWPF)

    International Nuclear Information System (INIS)

    Maslar, S.R.

    1992-01-01

    This document describes the Westinghouse Savannah River Company's (WSRC) Quality Assurance Program for Defense Waste Processing at the Savannah River Site (SRS). WSRC is the operating contractor for the US Department of Energy (DOE) at the SRS. The following objectives are achieved through developing and implementing the Quality Assurance Program: (1) Ensure that the attainment of quality (in accomplishing defense high-level waste processing objectives at the SRS) is at a level commensurate with the government's responsibility for protecting public health and safety, the environment, the public investment, and for efficiently and effectively using national resources. (2) Ensure that high-level waste from qualification and production activities conform to requirements defined by OCRWM. These activities include production processes, equipment, and services; and products that are planned, designed, procured, fabricated, installed, tested, operated, maintained, modified, or produced

  7. Notes on Piezoelectricity

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Antonio [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-02-03

    These notes provide a pedagogical discussion of the physics of piezoelectricity. The exposition starts with a brief analysis of the classical (continuum) theory of piezoelectric phenomena in solids. The main subject of the notes is, however, a quantum mechanical analysis. We first derive the Frohlich Hamiltonian as part of the description of the electron-phonon interaction. The results of this analysis are then employed to derive the equations of piezoelectricity. A couple of examples with the zinc blende and and wurtzite structures are presented at the end

  8. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  9. Lecture Notes and Exercises for Course 21240 (Basic Analytical Chemistry)

    DEFF Research Database (Denmark)

    1999-01-01

    The publication contains notes dealing with difficult topics in analytical chemistry (cfr. Course Descriptions, DTU), relevant exercises as well as final examination problems from the last years.......The publication contains notes dealing with difficult topics in analytical chemistry (cfr. Course Descriptions, DTU), relevant exercises as well as final examination problems from the last years....

  10. Lecture Notes and Exercises for Course 21240 (Basic Analytical Chemistry)

    DEFF Research Database (Denmark)

    1998-01-01

    The publication contains notes dealing with difficult topics in analytical chemistry (cfr. Course Descriptions, DTU), relevant exercises as well as final examination problems from the last years.......The publication contains notes dealing with difficult topics in analytical chemistry (cfr. Course Descriptions, DTU), relevant exercises as well as final examination problems from the last years....

  11. 48 CFR 214.202-5 - Descriptive literature.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Descriptive literature. 214.202-5 Section 214.202-5 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... 214.202-5 Descriptive literature. (c) Requirements of invitation for bids. When brand name or equal...

  12. 48 CFR 232.102 - Description of contract financing methods.

    Science.gov (United States)

    2010-10-01

    ... financing methods. 232.102 Section 232.102 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE GENERAL CONTRACTING REQUIREMENTS CONTRACT FINANCING Non-Commercial Item Purchase Financing 232.102 Description of contract financing methods. (e)(2) Progress payments...

  13. A Note on the Field-Theoretical Description of Superfluids

    CERN Document Server

    Andrianopoli, L; Grassi, P A; Trigiante, M

    2014-01-01

    Recently, a Lagrangian description of superfluids attracted some interest from the fluid/gravity-correspondence viewpoint. In this respect, the work of Dubovksy et al. has proposed a new field theoretical description of fluids, which has several interesting aspects. On another side, we have provided in arXiv:1304.2206 a supersymmetric extension of the original works. In the analysis of the Lagrangian structures a new invariant appeared which, although related to known invariants, provides, in our opinion, a better parametrisation of the fluid dynamics in order to describe the fluid/superfluid phases.

  14. Laparotomy operative note template constructed through a modified Delphi method.

    Science.gov (United States)

    Moore, Lolonya; Churley-Strom, Ruth; Singal, Bonita; O'Leary, Sharon

    2009-05-01

    An operative note is indispensable to physician documentation and decision-making; however, there are no accepted standards for operative note content. Our aim was to use a modified Delphi consensus-building method to construct a uniform operative note template for laparotomy. Using Joint Commission on Accreditation of Healthcare Organizations requirements, literature review, and feedback from 15 medical malpractice defense attorneys, we compiled a draft operative note template of 31 elements. We surveyed 37 Association of Professor of Gynecology and Obstetrics/Solvay scholars asking for their input on inclusion of each item as essential content of the operative note. Two iterations of the survey were required to reach a predetermined 75% level of consensus. Nine elements were eliminated from the template: 6 original and 3 expert-suggested elements. We provide an operative note template that was compiled through a Delphi process.

  15. Writing a technical note.

    Science.gov (United States)

    Ng, K H; Peh, W C G

    2010-02-01

    A technical note is a short article giving a brief description of a specific development, technique or procedure, or it may describe a modification of an existing technique, procedure or device applicable to medicine. The technique, procedure or device described should have practical value and should contribute to clinical diagnosis or management. It could also present a software tool, or an experimental or computational method. Technical notes are variously referred to as technical innovations or technical developments. The main criteria for publication will be the novelty of concepts involved, the validity of the technique and its potential for clinical applications.

  16. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  17. Improving operation notes to meet British Orthopaedic Association guidelines.

    Science.gov (United States)

    Morgan, David; Fisher, Noel; Ahmad, Aman; Alam, Fazle

    2009-04-01

    Operation notes are an important part of medical records for clinical, academic and medicolegal reasons. This study audited the quality of operative note keeping for total knee replacements against the standards set by the British Orthopaedic Association (BOA). A prospective review of all patients undergoing total knee replacement at a district general hospital over 8 months. Data recorded were compared with those required by the BOA good-practice guidelines. Change in practice was implemented and the audit cycle completed. Data were statistically analysed. A total of 129 operation notes were reviewed. There was a significant improvement in the mean number of data points recorded from 9.6 to 13.1. The least well recorded data were diagnosis, description of findings, alignment and postoperative flexion range. All had a significant improvement except description of findings. The operating surgeon writing the note improved from 56% to 67%. Detailed postoperative instructions also improved in quality. Surgeon education and the use of a checklist produce better quality total knee replacement operation notes in line with BOA guidelines. Further improvements may be made by making the data points part of the operation note itself.

  18. Taxonomic notes on some Polyglyptini: descriptions of new genus and new species (Homoptera, Membracidae, Smiliinae

    Directory of Open Access Journals (Sweden)

    Albino M. Sakakibara

    1996-01-01

    Full Text Available Taxonomic notes on some Polyglyptini; descriptions of new genus and new species (Homoptera, Membracidae, Smiliinae. The genera Hemiptycha Germar, Metheisa Fowler, Maturnaria Metcalf, Aphetea Fowler, Dioclophara Kirkaldy, and Phormophora Stål, are redescribed; Creonus, gen.n. (type species: Maturna lloydi Funkhouser, 1914, and Aphetea robustula, sp.n. (from Bolivia, are described. Some nomenclatural changes are introduced, as follow: - Hemiptycha Germar, 1833 = Polyrhyssa Stål, 1869, syn.n.: - Hemiptycha cultrata (Coquebert, 1801, comb.n., = Polyglyptodes flavocostatus Haviland, 1925, syn.n., = Polyrhyssa cultrata maculata Fonseca, 1942, syn.n. - Hemiptycha obtecta (Fabricius, 1803 = Hille herbicola Haviland, 1925, syn.n. - Maturnaria ephippigera (Fairmaire, 1846 = Publilia tumulata Buckton, 1903, syn.n., = Metheisa fowleri Funkhouser, 1927, syn.n. - Creonus lloydi (Funkhouser, 1914, comb.n. - Aphetea parvula (Fabricius, 1803, comb.n., = Aphetea affinis Haviland, 1925, syn.n. - Dioclophara Kirkaldy, 1904 = lncolea Goding, 1926, syn.n. - Dioclophara viridula (Fairmaire, 1846 = Maturna multilineata Fonseca, 1942, syn.n. - Dioclophara variegata (Goding, 1926, comb.n. = lncolea viridis Goding, 1926, syn.n. - Phormophora maura (Fabricius, 1803 = Darnis dorsata Fabricius, 1803, syn.n.

  19. Notes on Japanese Rhizocephala, with description of two new species

    NARCIS (Netherlands)

    Boschma, H.

    1935-01-01

    The following notes are based upon material of parasites on two Crustaceans from Japan, viz., Pachygrapsus crassipes Randall and Petrolisthes japonicus de Haan 1). Each of these two species may be infested by two different species of Rhizocephala: on Pachygrapsus crassipes occur the parasites

  20. A study of actions in operative notes.

    Science.gov (United States)

    Wang, Yan; Pakhomov, Serguei; Burkart, Nora E; Ryan, James O; Melton, Genevieve B

    2012-01-01

    Operative notes contain rich information about techniques, instruments, and materials used in procedures. To assist development of effective information extraction (IE) techniques for operative notes, we investigated the sublanguage used to describe actions within the operative report 'procedure description' section. Deep parsing results of 362,310 operative notes with an expanded Stanford parser using the SPECIALIST Lexicon resulted in 200 verbs (92% coverage) including 147 action verbs. Nominal action predicates for each action verb were gathered from WordNet, SPECIALIST Lexicon, New Oxford American Dictionary and Stedman's Medical Dictionary. Coverage gaps were seen in existing lexical, domain, and semantic resources (Unified Medical Language System (UMLS) Metathesaurus, SPECIALIST Lexicon, WordNet and FrameNet). Our findings demonstrate the need to construct surgical domain-specific semantic resources for IE from operative notes.

  1. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  2. 2012 Workplace and Gender Relations Survey of Active Duty Members (Survey Note No. 2013-002)

    Science.gov (United States)

    2013-01-18

    Attention – four items regarding unwanted attempts to establish a sexual relationship – Sexual Coercion – four items regarding classic quid pro quo ...of Defense (DoD) continues to emphasize sexual assault and sexual harassment response and prevention in the military. This survey note discusses...assault and sexual harassment in the active duty force. This survey note and accompanying briefing (Appendix) provide information on the prevalence

  3. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 4. Warning, Emergency Operations, and Support Programs.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    The need for, and a description of, emergency functions required to save lives and protect property in nuclear or natural disasters are presented. Topics discussed include: (1) The Civil Defense Warning System, (2) Introduction to the Emergency Operations Program, (3) Five subprograms of the Emergency Operations Program, (4) Emergency Operations…

  4. 75 FR 71647 - Defense Federal Acquisition Regulation Supplement; Discussions Prior to Contract Award (DFARS...

    Science.gov (United States)

    2010-11-24

    ... Deputy Under Secretary of Defense (Acquisition, Technology, and Logistics) to revise the DoD source... misunderstood requirements. DoD notes the potential disadvantages of this proposed change in increased time to...

  5. Notes on black holes and three dimensional gravity

    International Nuclear Information System (INIS)

    Banados, Maximo

    1999-01-01

    In these notes we review some relevant results on 2+1 quantum gravity. These include the Chern-Simons formulation and its affine Kac-Moody symmetry, the asymptotic algebra of Brown and Henneaux, and the statistical mechanics description of 2+1 black holes. A brief introduction to the classical and semiclassical aspects of black holes is also included. The level of the notes is basic assuming only some knowledge on Statistical Mechanics, General Relativity and Yang-Mills theory

  6. Defense Logistics Army Should Assess Cost and Benefits of the Workload Performance System Expansion

    National Research Council Canada - National Science Library

    1999-01-01

    .... In the Department of Defense's (DOD) fiscal years 1997 and 1998 Annual Statements of Assurance, DOD noted difficulties in relating personnel requirements to workload and budget as a material weakness in the Army's manpower requirements...

  7. Some notes about the nuclear data libraries

    International Nuclear Information System (INIS)

    Panini, G.C.

    1984-01-01

    The paper gives a short description of the main nuclear data collections. The features which are particular of each source are enhanced and compared. Notes about the Nuclear Data Processing are also outlined. The paper is intended as a preliminary approach for people interested in the Nuclear Data management

  8. Mysore study: A study of suicide notes.

    Science.gov (United States)

    Namratha, P; Kishor, M; Sathyanarayana Rao, T S; Raman, Rajesh

    2015-01-01

    Suicide is one of the leading causes of preventable deaths. Recent data suggest South India as one of the regions with highest suicide rates in the world. In 2013, 134,799 people committed suicide in India according to the statistics released by the National Crime Records Bureau. Suicide note is one of the most important sources to understand suicide, which may be beneficial in suicide prevention. Studies on suicidal notes from this part of the world are sparse. The aim was to study the themes in suicide notes that might be useful in prevention strategies. A descriptive study of all suicide notes of those individuals who committed suicide between 2010 and 2013 available with Police Department, Mysore district was obtained and analyzed. A total of 22 suicide note were available. A majority of suicide note was in age group of 16-40 years (86%) and most were men (59%). All suicide notes were handwritten, the majority (70%) in regional language Kannada. Length of notes varied from just few words to few pages. Contents of suicide notes included apology/shame/guilt (80%), love for those left behind (55%) and instruction regarding practical affairs (23%). Most have blamed none for the act (50%). 23% mentioned that they are committing suicide to prove their innocence. 32% mentioned a last wish. The majority of suicidal note contained "guilt" which is a strong indicator of possible depression in deceased. Creating awareness about suicide among public and ensuring access to professionals trained in suicide prevention is need of the hour in this part of the world.

  9. Analysis of medication adherence-related notes from a service-oriented community pharmacy.

    Science.gov (United States)

    Witry, Matthew; Parry, Rachel; McDonough, Randal; Deninger, Michael

    2017-07-15

    Medication nonadherence is a significant public health problem. Community pharmacists are positioned to intervene, however, the process is not well understood. To classify and quantify the reasons for nonadherence documented by community pharmacists. A retrospective content analysis of pharmacist notes related to nonadherence at a service oriented community pharmacy in the Midwest United States. Notes from the site's dispensing custom documentation software were obtained from September 1, 2014 through February 28, 2015 that were labeled "compliance", either prompted by proportion of days covered calculations or entered as a drug therapy problem. A code list was iterated for the notes based on the literature and by reading the notes and generating descriptive codes. A reliability analysis was calculated for two coders. Notes were coded, check-coded, and discrepancies were resolved using a consensus process. Frequencies were calculated for each code and representative text was selected. Pharmacists documented 3491 notes as part of their continuous medication monitoring process. Nineteen codes were developed. The reliability for the coders had a Cohen's Kappa of 0.749. The majority of notes (61.4%) documented the pharmacist evaluated the refill and had no concerns or would continue to follow. Also documented were specific reasons for out of range PDCs not indicative of a nonadherence problem. Only 2.2% of notes specifically documented a nonadherence problem, such as forgetfulness or cost. While pharmacists encountered many false positive nonadherence alerts, following up with patients led to hundreds of discussions and clarifications about how patients use their medications at home. These results suggest a small minority of late refills are judged by pharmacists as indicative of an adherence problem, contrary to the prevailing literature. Pharmacists may benefit from modifying their approach to nonadherence interviewing and documentation as they seek to address

  10. Notes on Three Newly Naturalized Plants in Taiwan

    Directory of Open Access Journals (Sweden)

    Shih-Huei Chen

    2005-03-01

    Full Text Available Chloris divaricata R. Br. var. cynodontoides (Bal. Lazarides, Boerhavia coccinea Mill., and Hyptis pectinata (L. Poit. are recently found naturalized in Taiwan. The present study gives the taxonomic description and line drawings of the three species. In addition, their distribution and notes on ecology and taxonomy are provided.

  11. Description of the male of Eburella pinima Martins and notes on the geographical distribution of Eburodacrys aenigma Galileo & Martins and Eburodacrys lanei Zajciw (Coleoptera, Cerambycidae

    Directory of Open Access Journals (Sweden)

    Juan Pablo Botero

    2013-12-01

    Full Text Available Description of the male of Eburella pinima Martins and notes on the geographical distribution of Eburodacrys aenigma Galileo & Martins and Eburodacrys lanei Zajciw (Coleoptera, Cerambycidae. The male of Eburella pinima Martins, 1997 is described and illustrated for the first time. Information on Eburodacrys aenigma Galileo & Martins, 2006, previously known only from the female holotype, which lacked locality label, is herein complemented. This species is recorded from Brazil and the male is depicted for the first time. The geographical distribution of Eburodacrys lanei Zajciw, 1958 is further restricted here as some previous records are confirmed to result from misidentifications of E. aenigma.

  12. T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)

    Science.gov (United States)

    2013-10-01

    pineapple 8 reduces device heterogeneity, and thus, makes malware epidemics possible. Given these considerations, Wi-Fi-co-location-based smartphone...Conference Paper 3. DATES COVERED (From - To) APR 2011 – JUN 2013 4. TITLE AND SUBTITLE T-dominance: Prioritized Defense Deployment for BYOD...For Public Release; Distribution Unlimited. PA Case number: 88ABW-2012-4117, dated 25-Jul 2012 13. SUPPLEMENTARY NOTES © IEEE 2013. This paper was

  13. Procuring Contracting Officers’ Perceptions of the Contributions Made to Defense Cost Accounting Practices by CAS 401-416.

    Science.gov (United States)

    1981-09-01

    8217 PERCEPTIONS OF THE CONTRIBUTIONS MADE TO DEFENSE COST ACCOUNTING PRACTICES BY CAS 401-416 Captain Bruce E. Simpson, USA LSSR 70-81 The contents of...CONTRIBUTIONS MADE TO DEFENSE MastersThesis COST ACCOUNTING PRACTICES BY CAS 401-416 6. PEROR ING OG. REPORT NUMBER 7. AUTHOR(e) S. CONTRACT OR GRANT...SUPPLEMENTARY NOTES 19. KEY WORDS (Con~tiue, on revere side it naoeaaeuy and Identify by block nuffler) Accounting Cost Accounting Cost Accounting Standards

  14. A Guide to Field Notes for Qualitative Research: Context and Conversation.

    Science.gov (United States)

    Phillippi, Julia; Lauderdale, Jana

    2018-02-01

    Field notes are widely recommended in qualitative research as a means of documenting needed contextual information. With growing use of data sharing, secondary analysis, and metasynthesis, field notes ensure rich context persists beyond the original research team. However, while widely regarded as essential, there is not a guide to field note collection within the literature to guide researchers. Using the qualitative literature and previous research experience, we provide a concise guide to collection, incorporation, and dissemination of field notes. We provide a description of field note content for contextualization of an entire study as well as individual interviews and focus groups. In addition, we provide two "sketch note" guides, one for study context and one for individual interviews or focus groups for use in the field. Our guides are congruent with many qualitative and mixed methodologies and ensure contextual information is collected, stored, and disseminated as an essential component of ethical, rigorous qualitative research.

  15. Vaginal orgasm is associated with less use of immature psychological defense mechanisms.

    Science.gov (United States)

    Brody, Stuart; Costa, Rui Miguel

    2008-05-01

    psychological defense mechanisms are consistent with both early psychoanalytic personality theory and recent advances in sexual physiology. Implications for diagnosis and sex therapy are noted.

  16. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  17. Quality of outpatient clinical notes: a stakeholder definition derived through qualitative research

    Directory of Open Access Journals (Sweden)

    Hanson Janice L

    2012-11-01

    content. Conclusions Perspectives of these four stakeholder groups provide a comprehensive description of quality in outpatient clinical documentation. The resulting description of characteristics and content necessary for quality notes provides a research-based foundation for assessing the quality of clinical documentation in outpatient health care settings.

  18. Quality of outpatient clinical notes: a stakeholder definition derived through qualitative research.

    Science.gov (United States)

    Hanson, Janice L; Stephens, Mark B; Pangaro, Louis N; Gimbel, Ronald W

    2012-11-19

    groups provide a comprehensive description of quality in outpatient clinical documentation. The resulting description of characteristics and content necessary for quality notes provides a research-based foundation for assessing the quality of clinical documentation in outpatient health care settings.

  19. 77 FR 4632 - Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical...

    Science.gov (United States)

    2012-01-30

    ... Federal Acquisition Regulation Supplement; Independent Research and Development Technical Descriptions... Regulation Supplement (DFARS) to require major contractors to report independent research and development (IR... 11414 on March 2, 2011, to revise requirements for reporting IR&D projects to the Defense Technical...

  20. Materials evaluation programs at the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Gee, J.T.; Iverson, D.C.; Bickford, D.F.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided

  1. 76 FR 11414 - Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical...

    Science.gov (United States)

    2011-03-02

    ... Acquisition Regulation Supplement; Independent Research and Development Technical Descriptions (DFARS Case... (DFARS) to require contractors to report independent research and development (IR&D) projects generating... to the Defense Technical Information Center (DTIC). Beginning in the 1990s, DoD reduced its technical...

  2. DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management

    Science.gov (United States)

    2017-06-01

    Defense Technology Development: Technology Transition Programs Support Military Users, but Opportunities Exist to Improve Measurement of Outcomes, GAO-13... LTE ), for cellular wireless communication applications. They also develop and commercialize numerous technologies used in handsets and tablets. They...17-499 Note: Technology Readiness Levels (TRL) are a tool that DOD, among others, uses to assess technology maturity. TRLs are measured on a scale

  3. Relativistic description of atomic nuclei

    International Nuclear Information System (INIS)

    Krutov, V.A.

    1985-01-01

    Papers on the relativistic description of nuclei are reviewed. The Brown and Rho ''small'' bag'' model is accepted for hardrons. Meson exchange potentials of the nucleon-nucleon interaction have been considered. Then the transition from a system of two interacting nucleons has been performed to the relativistic nucleus description as a multinucleon system on the basis of OBEP (one-boson exchange potential). The proboem of OPEP (one-pion-exchange potential) inclusion to a relativistic scheme is discussed. Simplicity of calculations and attractiveness of the Walecka model for specific computations and calculations was noted. The relativistic model of nucleons interacting through ''effective'' scalar and vector boson fields was used in the Walacka model for describing neutronaand nuclear mater matters

  4. Operational radioactive defense waste management plan for the Nevada Test Site

    International Nuclear Information System (INIS)

    1981-07-01

    The Operational Radioactive Defense Waste Management Plan for the Nevada Test Site establishes procedures and methods for the safe shipping, receiving, processing, disposal, and storage of radioactive waste. Included are NTS radioactive waste disposition program guidelines, procedures for radioactive waste management, a description of storage and disposal areas and facilities, and a glossary of specifications and requirements

  5. Dynamics of a stabilized motor defense conditioned reflex at different levels of motivation in irradiated rats

    Energy Technology Data Exchange (ETDEWEB)

    Shtemberg, A S

    1982-05-01

    Postradiation dynamics of strengthened motor-defense conditioned reflex in rats-males irradiated with the doses of 94.111 and 137 Gy was studied. Phase disturbances of conditioned-reflex activity increased with enhancing irradiation dose have been revealed. Rapid recovery of conditioned reflex after short primary aggravation was a characteristic peculiarity. At that, the dynamics of relation of main nervous processes in cortex was noted for significant instability increasing with radiation syndrome development. Enhancement of force of electro-defense support promoted more effective strengthening of temporary connections and conditioned high stability of trained-reflex reactions during serious functional disturbances resulted from sublethal dose irradiation.

  6. Examining the Relationship between Communication Patterns of Source Family and Self-Consciousness with Defensive Styles of Discordant Couples

    OpenAIRE

    Ma’asoomeh Kheirkhah; Ebrahim Namani

    2016-01-01

    Research has shown the relationship between communication patterns of source family with defensive styles of discordant couples. For this reason, the present research has examined the relationship between communication patterns of source family and self-consciousness with defensive styles of discordant couples. This study is a descriptive-correlation type. Its population consisted of all discordant couples referred to counseling centers of Mashhad in 2015. Among the referred 140 disc...

  7. Predicting law enforcement officer job performance with the Personality Assessment Inventory.

    Science.gov (United States)

    Lowmaster, Sara E; Morey, Leslie C

    2012-01-01

    This study examined the descriptive and predictive characteristics of the Personality Assessment Inventory (PAI; Morey, 1991) in a sample of 85 law enforcement officer candidates. Descriptive results indicate that mean PAI full-scale and subscale scores are consistently lower than normative community sample scores, with some exceptions noted typically associated with defensive responding. Predictive validity was examined by relating PAI full-scale and subscale scores to supervisor ratings in the areas of job performance, integrity problems, and abuse of disability status. Modest correlations were observed for all domains; however, predictive validity was moderated by defensive response style, with greater predictive validity observed among less defensive responders. These results suggest that the PAI's full scales and subscales are able to predict law enforcement officers' performance, but their utility is appreciably improved when taken in the context of indicators of defensive responding.

  8. Hanford Waste Vitrification Plant: Preliminary description of waste form and canister

    International Nuclear Information System (INIS)

    Mitchell, D.E.

    1986-01-01

    In July 1985, the US Department of Energy's Office of Civilian Radioactive Waste Management established the Waste Acceptance Process as the means by which defense high-level waste producers, such as the Hanford Waste Vitrification Plant, will develop waste acceptance requirements with the candidate geologic repositories. A complete description of the Waste Acceptance Process is contained in the Preliminary Hanford Waste Vitrification Plant Waste Form Qualification Plan. The Waste Acceptance Process defines three documents that high-level waste producers must prepare as a part of the process of assuming that a high-level waste product will be acceptable for disposal in a geologic repository. These documents are the Description of Waste Form and Canister, Waste Compliance Plan, and Waste Qualification Report. This document is the Hanford Waste Vitrification Plant Preliminary Description of Waste Form and Canister for disposal of Neutralized Current Acid Waste. The Waste Acceptance Specifications for the Hanford Waste Vitrification Plant have not yet been developed, therefore, this document has been structured to corresponds to the Waste Acceptance Preliminary Specifications for the Defense Waste Processing Facility High-Level Waste Form. Not all of the information required by these specifications is appropriate for inclusion in this Preliminary Description of Waste Form and Canister. Rather, this description is limited to information that describes the physical and chemical characteristics of the expected high-level waste form. The content of the document covers three major areas: waste form characteristics, canister characteristics, and canistered waste form characteristics. This information will be used by the candidate geologic repository projects as the basis for preliminary repository design activities and waste form testing. Periodic revisions are expected as the Waste Acceptance Process progresses

  9. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Robertson, Scott P.; Vatrapu, Ravi; Abraham, George

    2009-01-01

    Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes, and Shared Notes. Note taking significantly influenced the manner in which participants browsed for information...

  11. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  12. Note by Note: a New Revolution in Cooking

    OpenAIRE

    Burke, Roisin; Danaher, Pauline

    2016-01-01

    Note by note cooking is an application of Molecular Gastronomy. It was first proposed by French Physical Chemist and Molecular Gastronomy Co-founder, Hervé This. Note by Note dishes are being created as part of Ph.D. research in the Dublin Institute of Technology, Cathal Brugha Street.

  13. Using voice to create hospital progress notes: Description of a mobile application and supporting system integrated with a commercial electronic health record.

    Science.gov (United States)

    Payne, Thomas H; Alonso, W David; Markiel, J Andrew; Lybarger, Kevin; White, Andrew A

    2018-01-01

    We describe the development and design of a smartphone app-based system to create inpatient progress notes using voice, commercial automatic speech recognition software, with text processing to recognize spoken voice commands and format the note, and integration with a commercial EHR. This new system fits hospital rounding workflow and was used to support a randomized clinical trial testing whether use of voice to create notes improves timeliness of note availability, note quality, and physician satisfaction with the note creation process. The system was used to create 709 notes which were placed in the corresponding patient's EHR record. The median time from pressing the Send button to appearance of the formatted note in the Inbox was 8.8 min. It was generally very reliable, accepted by physician users, and secure. This approach provides an alternative to use of keyboard and templates to create progress notes and may appeal to physicians who prefer voice to typing. Copyright © 2017 Elsevier Inc. All rights reserved.

  14. Evolution Of The Operational Energy Strategy And Its Consideration In The Defense Acquisition Process

    Science.gov (United States)

    2016-09-01

    Figure 12. PPBE Process Flowchart . Source: AcqNotes (2016). We comment above that once a program manager has completed his major Defense...acquisition system: 1) acquisition, 2) requirements and 3) planning, programming , budgeting, and execution (PPBE). We looked at the evolution of...to gain traction or improve promulgation of key guidance and documentation for new-starts and/or upgrades to weapon system acquisition programs

  15. Calculation notes that support accident scenario and consequence determination of a waste tank criticality

    International Nuclear Information System (INIS)

    Marusich, R.M. Westinghouse Hanford

    1996-01-01

    The purpose of this calculation note is to provide the basis for criticality consequences for the Tank Farm Safety Analysis Report (FSAR). Criticality scenario is developed and details and description of the analysis methods are provided

  16. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  17. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  18. Identify the Role of Rural Women in Agriculture with Emphasis on Passive Defense Environment of Bavi Township

    Directory of Open Access Journals (Sweden)

    Zeynab Mohmedi Karbalaii

    2016-05-01

    Full Text Available Improving agriculture, the environment and other sectors in need of passive defense that can effectively help to complete the chain of defense is in the improvement of the agricultural sector. This study is applied for the purpose of gathering data descriptive population study of rural women in two villages in the central city of Bavi Khuzestan Tlbovmeh Salieh and the sample size of 736 persons was estimated by using Morgan 250. The data in this study was obtained using a questionnaire designed for the faculty members of the University of Agriculture and Natural Resources of Ramin Khuzestan and the quotas were distributed randomly. Data were analyzed using the software described. Descriptive statistics and coefficient of variation in the average rate in the inferential statistical correlation test, Kruskal-Wallis test was used to compare the average F. The results of descriptive statistics showed that more rural women with primary education and familiar with the environment are very young and have a lot of faith, but their participation in solving environmental problems is very low. Based on the results of the correlation, age and education level of rural women in their understanding of the importance of agricultural activities passive defense is effective. The results of the test showed that in the comparison between age and level of education, rural women who are young and highly educated with a broad vision have a variety of agricultural activities in the context of agriculture that are passive

  19. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  20. When doctors share visit notes with patients: a study of patient and doctor perceptions of documentation errors, safety opportunities and the patient-doctor relationship.

    Science.gov (United States)

    Bell, Sigall K; Mejilla, Roanne; Anselmo, Melissa; Darer, Jonathan D; Elmore, Joann G; Leveille, Suzanne; Ngo, Long; Ralston, James D; Delbanco, Tom; Walker, Jan

    2017-04-01

    Patient advocates and safety experts encourage adoption of transparent health records, but sceptics worry that shared notes may offend patients, erode trust or promote defensive medicine. As electronic health records disseminate, such disparate views fuel policy debates about risks and benefits of sharing visit notes with patients through portals. Presurveys and postsurveys from 99 volunteer doctors at three US sites who participated in OpenNotes and postsurveys from 4592 patients who read at least one note and submitted a survey. Patients read notes to be better informed and because they were curious; about a third read them to check accuracy. In total, 7% (331) of patients reported contacting their doctor's office about their note. Of these, 29% perceived an error, and 85% were satisfied with its resolution. Nearly all patients reported feeling better (37%) or the same (62%) about their doctor. Patients who were older (>63), male, non-white, had fair/poor self-reported health or had less formal education were more likely to report feeling better about their doctor. Among doctors, 26% anticipated documentation errors, and 44% thought patients would disagree with notes. After a year, 53% believed patient satisfaction increased, and 51% thought patients trusted them more. None reported ordering more tests or referrals. Despite concerns about errors, offending language or defensive practice, transparent notes overall did not harm the patient-doctor relationship. Rather, doctors and patients perceived relational benefits. Traditionally more vulnerable populations-non-white, those with poorer self-reported health and those with fewer years of formal education-may be particularly likely to feel better about their doctor after reading their notes. Further informing debate about OpenNotes, the findings suggest transparent records may improve patient satisfaction, trust and safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already

  1. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  2. Profiling Chilean Suicide Note-Writers through Content Analysis

    Directory of Open Access Journals (Sweden)

    Francisco Ceballos-Espinoza

    2016-09-01

    Full Text Available Suicides account for 2000 deaths in Chile each year. With a suicide rate of 11.3, it is classified as a country with high suicide risk. Aims: to identify personality and cognitive characteristics of the group of Chilean suicides that left suicide notes, through a content analysis. Methods: descriptive field study with an ex post facto design. All suicides registered between 2010 and 2012 by the Investigations Police of Chile were analyzed, obtaining 203 suicide notes from 96 cases. The Darbonne categories for content analysis were used with the inter-judge method. Results: The mean age of the suicides was 44.2 (SD = 18.53. Most of the notes were addressed to family members (51.7%. The most expressed reasons were marital- or interpersonal-related (24.6%; another 23.6% expressed a lack of purpose or hopelessness (including depression, wish to die, low self-esteem. The most frequent content expressed were instructions (about money, children, and funeral. All of the notes showed logical thinking and were written with coherence and clarity. Notably 42% of the notes were marked by affections of fondness, love or dependence of others. Regarding attitudes, the most common were of escape or farewell (42.4%, followed by fatalism, hopelessness, frustration or tiredness (40%. 24 statistically significant differences were found throughout the categories of analysis, according to cohorts of age, marital status and sex. Conclusions: the findings contribute to the profiling of Chilean suicides and to the implementation of suicide prevention programs

  3. GeneNotes – A novel information management software for biologists

    Directory of Open Access Journals (Sweden)

    Wong Wing H

    2005-02-01

    Full Text Available Abstract Background Collecting and managing information is a challenging task in a genome-wide profiling research project. Most databases and online computational tools require a direct human involvement. Information and computational results are presented in various multimedia formats (e.g., text, image, PDF, word files, etc., many of which cannot be automatically processed by computers in biologically meaningful ways. In addition, the quality of computational results is far from perfect and requires nontrivial manual examination. The timely selection, integration and interpretation of heterogeneous biological information still heavily rely on the sensibility of biologists. Biologists often feel overwhelmed by the huge amount of and the great diversity of distributed heterogeneous biological information. Description We developed an information management application called GeneNotes. GeneNotes is the first application that allows users to collect and manage multimedia biological information about genes/ESTs. GeneNotes provides an integrated environment for users to surf the Internet, collect notes for genes/ESTs, and retrieve notes. GeneNotes is supported by a server that integrates gene annotations from many major databases (e.g., HGNC, MGI, etc.. GeneNotes uses the integrated gene annotations to (a identify genes given various types of gene IDs (e.g., RefSeq ID, GenBank ID, etc., and (b provide quick views of genes. GeneNotes is free for academic usage. The program and the tutorials are available at: http://bayes.fas.harvard.edu/genenotes/. Conclusions GeneNotes provides a novel human-computer interface to assist researchers to collect and manage biological information. It also provides a platform for studying how users behave when they manipulate biological information. The results of such study can lead to innovation of more intelligent human-computer interfaces that greatly shorten the cycle of biology research.

  4. Involvement of the US Department of Defense in Civilian Assistance, Part I: a quantitative description of the projects funded by the Overseas Humanitarian, Disaster, and Civic Aid Program.

    Science.gov (United States)

    Bourdeaux, Margaret Ellis; Lawry, Lynn; Bonventre, Eugene V; Burkle, Frederick M

    2010-03-01

    To review the history and goals of the US Department of Defense's largest civilian assistance program, the Overseas Humanitarian, Disaster and Civic Aid Program and to describe the number, geographic regions, years, key words, countries, and types of projects carried out under this program since 2001. Using the program's central database, we reviewed all approved projects since 2001 and tabulated them by year, combatant command, country, and key word. We also reviewed the project descriptions of projects funded between January 1, 2006, and February 9, 2008, and examined how their activities varied by combatant command and year. Of the 5395 projects in the database, 2097 were funded. Projects took place in more than 90 countries, with Southern, Pacific, and Africa Command hosting the greatest number. The most common types of projects were school, health, disaster response, and water infrastructure construction, and disaster-response training. The "global war on terror" was the key word most frequently tagged to project descriptions. Project descriptions lacked stated goals as well as implementation and coordination strategies with potential partners, and did not report outcome or impact indicators. The geographic reach of the program is vast and projects take place in a wide variety of public sectors. Yet their security and civilian assistance value remains unclear given the lack of stated project goals, implementation strategies, or measures of effectiveness. To facilitate transparency and policy discussion, we recommend project proposals include hypotheses as to how they will enhance US security, their relevance to the public sector they address, and outcome and impact indicators that can assess their value and effectiveness.

  5. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  6. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  7. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  8. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  9. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  10. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  11. Notes on two species of Processa (Decapoda: Processidae from the Mexican Pacific

    Directory of Open Access Journals (Sweden)

    Manuel Ayón-Parente

    Full Text Available Material belonging to the genus Processa, held in the Regional Marine Invertebrates Collection in Mazatlán, Mexico, is revised including specimens of the widely distributed P. peruviana, and the scarcely collected P. hawaiensis. For comparative purposes with the specimens from Hawaii and other localities, a detailed description of a male of P. hawaiensis collected in continental Mexico is provided, including illustrations of all appendages. Small differences are noted with previous description and partial redescriptions of this species, including proportion between propodus and dactylus of the fourth pereopod, and between merus and carpus of the right cheliped. In addition, the shape and setation of the first pair of pleopods in the Mexican material differs from the description of P. hawaiensis based on African material.

  12. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  13. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  14. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  15. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  16. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  17. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  18. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  19. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  20. Deliberating A Contract Type Based Risk Mitigation Strategy For South African Defense Acquisitions

    Science.gov (United States)

    2016-06-01

    cash flow may lead to cost overruns and schedule slippage. Table 1 shows the description, schedule and cost performance status for two SA DOD...possibility of applying a contract-type based strategy to manage acquisition program costs and schedule risks for the South African (SA) Department of...deviations between technical, cost and schedule performance. 14. SUBJECT TERMS acquisition process, defense acquisition, contract-type, risk

  1. A PROMISING MECHANISM FOR FINANCING THE NATIONAL ECONOMY, SECURITY AND DEFENSE OF UKRAINE

    OpenAIRE

    Dmitry Klinovoi, Peter Rogov

    2017-01-01

    The principles of the permanent financing of necessities of state development, national safety and defensive due to forming of legal institute of civil property on natural resources and mechanisms of the sovereign financing by receivabless from natural rent are grounded here. The description of sovereign fund and fund of civil dividends as institutes of accumulation of state facilities and management of assets is given here.

  2. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  3. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  4. CLASSIFICATION OF THE MGR DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER SYSTEM

    International Nuclear Information System (INIS)

    J.A. Ziegler

    1999-01-01

    The purpose of this analysis is to document the Quality Assurance (QA) classification of the Monitored Geologic Repository (MGR) defense high-level waste disposal container system structures, systems and components (SSCs) performed by the MGR Safety Assurance Department. This analysis also provides the basis for revision of YMP/90-55Q, Q-List (YMP 1998). The Q-List identifies those MGR SSCs subject to the requirements of DOE/RW-0333PY ''Quality Assurance Requirements and Description'' (QARD) (DOE 1998)

  5. Immigrant fertility in Sweden, 2000-2011: A descriptive note

    Directory of Open Access Journals (Sweden)

    Lotta Persson

    2014-03-01

    Full Text Available Background: Modern Scandinavian population registers provide excellent data sources that allow a user to quickly gain an impression of the level of fertility and its structure across subpopulations. This may also allow the analyst to check a feature of the much-cited disruption hypothesis, at least in part. Objective: The purpose of this note is to exploit this potential to give an overview of the structure of recent total fertility after immigration to Sweden from various groups of sending countries, separately for males and females. In the process we demonstrate to what extent the post-migration fertility compensation which is part of the fertility disruption hypothesis is fulfilled in our study population. Due to the nature of our data we have refrained from studying fertility before migration. Methods: Based on data from a combination of two Swedish administrative registers (the Historic Population Register and the Multi-Generation Register that cover both men and women in the entire population for the years 2000-2011, we compute and plot TFR-like age-cumulated fertility levels, specific for years since immigration, for six groups of sending countries, separately for men and women. Results: We find that the post-migration fertility compensation specified as part of the fertility disruption hypothesis is visibly confirmed in our Swedish study population for female European immigrants from non-EU countries and for female immigrants from non-European countries with a low or medium UN Human Development Index, but not so for other female immigrants, i.e. not for those who come from a Nordic country or from a non-Nordic EU country, and not for female immigrants from a non-European country with a high Human Development Index, including the United States. We find mild but less conclusive evidence for the same feature for males. Conclusions: This shows that at least as far as post-migration fertility compensation is concerned, the disruption

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  7. Calculation notes that support accident scenario and consequence of the in-tank fuel fire/deflageration

    International Nuclear Information System (INIS)

    Crowe, R.D. Westinghouse Hanford

    1996-01-01

    The purpose of this calculation note is to provide the basis for In-Tank Fuel fire/Deflageration consequence for the Tank Farm Safety Analysis Report (FSAR). Tank Fuel Fire/Deflageration scenario is developed and details and description of the analysis methods are provided

  8. Calculation notes that support accident scenario and consequence of the in-tank fuel fire/deflagration

    Energy Technology Data Exchange (ETDEWEB)

    Crowe, R.D.

    1996-09-27

    The purpose of this calculation note is to provide the basis for In-Tank Fuel Fire/Deflageration consequence for the Tank Farm Safety Analysis Report (FSAR). Tank Fuel Fire/Deflageration scenario is developed and details and description of the analysis methods are provided.

  9. Plant Defense Inhibitors Affect the Structures of Midgut Cells in and

    Directory of Open Access Journals (Sweden)

    Hongmei Li-Byarlay

    2016-01-01

    Full Text Available Plants produce proteins such as protease inhibitors and lectins as defenses against herbivorous insects and pathogens. However, no systematic studies have explored the structural responses in the midguts of insects when challenged with plant defensive proteins and lectins across different species. In this study, we fed two kinds of protease inhibitors and lectins to the fruit fly Drosophila melanogaster and alpha-amylase inhibitors and lectins to the cowpea bruchid Callosobruchus maculatus . We assessed the changes in midgut cell structures by comparing them with such structures in insects receiving normal diets or subjected to food deprivation. Using light and transmission electron microscopy in both species, we observed structural changes in the midgut peritrophic matrix as well as shortened microvilli on the surfaces of midgut epithelial cells in D. melanogaster . Dietary inhibitors and lectins caused similar lesions in the epithelial cells but not much change in the peritrophic matrix in both species. We also noted structural damages in the Drosophila midgut after six hours of starvation and changes were still present after 12 hours. Our study provided the first evidence of key structural changes of midguts using a comparative approach between a dipteran and a coleopteran. Our particular observation and discussion on plant–insect interaction and dietary stress are relevant for future mode of action studies of plant defensive protein in insect physiology.

  10. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  11. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  12. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  13. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  14. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  15. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  16. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  17. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  18. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  19. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  20. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  1. The Relative Importance of Market Power and Efficiency to Profitability in the Defense Sector: A Firm Based Analysis.

    Science.gov (United States)

    1983-12-01

    production contract that follows. Development contracts almost always contain some kind of cost- reimbursement provision (more on contract types later...two major contract types is the cost reimbursement contract. Cost contracts allow the firm to recover all allowable and reasonable costs from __ the...government. As noted earlier, defense firms are . motivated to raise costs when cost reimbur ement contract are used because profits aro usually

  2. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  3. Ophthalmology patients' interest in online access to clinic notes at three US clinics.

    Science.gov (United States)

    Lee, Bryan S; Oster, Natalia V; Chen, Galen Y; Ding, Leona L; Walker, Janice D; Elmore, Joann G

    2017-07-01

    This study aimed to understand patients' perceptions about potential benefits and harms of accessing their own ophthalmology clinic notes via an electronic patient portal as part of the OpenNotes initiative. The authors conducted a cross-sectional, in-person survey of ophthalmology patients at three US eye clinics. The paper survey was self-administered or administered with assistance from study staff before or after patients' clinical visits. The authors used descriptive statistics to summarise patient characteristics and patient attitudes about accessing their ophthalmology notes online. Chi-square and t-tests were performed to assess differences in patient responses between clinic locations. Four hundred and fifty-one patients responded (response rate 65%). Most patients thought that accessing doctors' notes online was a good idea (95%), wanted to view their clinic notes online (94%), and agreed online access would increase their understanding of their eye problems (95%) and help them better remember their care plan (94%); 14% said online access would increase their worry; 43% had privacy concerns; and 96% indicated they would show or discuss their notes with at least one other person. Non-white patients were more likely than white patients to perceive online clinic notes as a useful tool, but they were also more likely to worry and to express greater privacy concerns. Patients at three US eye clinics were strongly in favour of online access to ophthalmology notes and were optimistic this access would improve their understanding and self-care. Ophthalmologists should consider offering online access to their notes to enhance doctor-patient communication and improve clinical outcomes. © 2017 The Authors Ophthalmic & Physiological Optics © 2017 The College of Optometrists.

  4. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  5. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  6. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  7. Note Taking on Trial: A Legal Application of Note-Taking Research

    Science.gov (United States)

    Kiewra, Kenneth A.

    2016-01-01

    This article is about note taking, but it is not an exhaustive review of note-taking literature. Instead, it portrays the application of note-taking research to an unusual and important area of practice--the law. I was hired to serve as an expert witness on note taking in a legal case that hinged, in part, on the completeness and accuracy of…

  8. Lecture background notes on transient sodium boiling and voiding in fast reactors

    International Nuclear Information System (INIS)

    Okrent, D.; Fauske, H.K.

    1972-01-01

    This set of lecture background notes includes the following: (1) Introductory remarks on fast reactor safety, which are intended to provide some perspective on the role played by sodium boiling. (2) A discussion of superheat which reviews the experimental data and nucleation models with emphasis on the pressure-temperature history effect on radius of active cavity sites, including the role played by inert gas. (3) A discussion of the growth and collapse of spherical bubbles. (4) A historical description of the development of computer codes to describe voiding and a detailed description of the analytical formulation of typical models for calculating voiding due to boiling, fission gas release, and molten fuel-coolant interaction. (U.S.)

  9. Joint-Service Integration: An Organizational Culture Study of the United States Department of Defense Voluntary Education System

    Science.gov (United States)

    Benson, Martin K.

    2010-01-01

    The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…

  10. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  11. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  12. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  13. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  14. MixedNotes

    DEFF Research Database (Denmark)

    Jokela, Tero; Lucero, Andrés

    2014-01-01

    Affinity Diagramming is a technique to organize and make sense of qualitative data. It is commonly used in Contextual Design and HCI research. However, preparing notes for and building an Affinity Diagram remains a laborious process, with a wide variety of different approaches and practices....... In this paper, we present MixedNotes, a novel technique to prepare physical paper notes for Affinity Diagramming, and a software tool to support this technique. The technique has been tested with large real-life Affinity Diagrams with overall positive results....

  15. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  16. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  17. The Effectiveness of Note-Taking on Reading Comprehension of Iranian EFL Learners

    Directory of Open Access Journals (Sweden)

    Farnoush Bahrami

    2017-10-01

    Full Text Available By taking notes students could save time for reading all textbooks for their exams or for their representations. Taking notes increases attention of students to read or heard materials, and this increases their comprehension. Thus, the present study is important because note-taking could help them to remember what they learnt, absolutely important information. The method used in this research was survey. The 40 Persian EFL learners were selected from a language institute in Karaj to participate in the present study. These learners were divided into two groups; one of them is experimental group (N=20 and the other one is control group (N=20. Pretest and post test were two instruments that were used to carry out this study, a pretest about skill of note-taking of passages of the lessons was used for both experimental and control group. This test consisted of 4 passages. The same test was administrated again as the post test for both groups by the end of the course to see the different conclusion between taking note of experimental group and control group. Reliability between 4 texts is in oscillation from 0.6 to 0.81 (from 0.6 upwards. Therefore this reliability was an acceptable one. To analyze data descriptive statistics (that was contained percentage, frequency and mean score and also inferential statistics (that was contained ANOVA, Pearson correlation, independent sample t-test, multivariate’s test, regression were carried out by using SPSS16 soft ware. The findings confirmed that note taking is effective in reading comprehension.

  18. Revising Lecture Notes: How Revision, Pauses, and Partners Affect Note Taking and Achievement

    Science.gov (United States)

    Luo, Linlin; Kiewra, Kenneth A.; Samuelson, Lydia

    2016-01-01

    Note taking has been categorized as a two-stage process: the recording of notes and the review of notes. We contend that note taking might best involve a three-stage process where the missing stage is revision. This study investigated the benefits of revising lecture notes and addressed two questions: First, is revision more effective than…

  19. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  20. Resource description and access 2013 revision

    CERN Document Server

    2013-01-01

    This e-book contains the 2013 Revision of RDA: Resource Description and Access, and includes the July 2013 Update. This e-book offers links within the RDA text and the capability of running rudimentary searches of RDA, but please note that this e-book does not have the full range of content or functionality provided by the subscription product RDA Toolkit. Included: A full accumulation of RDA- the revision contains a full set of all current RDA instructions. It replaces the previous version of RDA Print as opposed to being an update packet to that version. RDA has gone through many changes sin

  1. EPICS release 3.11.6 specific documentation -- Release notes for EPICS 3.11.6

    International Nuclear Information System (INIS)

    1994-01-01

    These notes cover the following: (1) directions for switching to production APS release R3.11.6; (2) unbundling of channel access clients; (3) access security; (4) channel access additions; synchronous time support; and (5) description of major differences between R3.11.3 and R3.11.6 Also included is a list of new and/or updated documentation for the program

  2. Research Note:

    DEFF Research Database (Denmark)

    Behuria, Pritish; Buur, Lars; Gray, Hazel

    2017-01-01

    its core conceptual and methodological features. This Research Note starts by setting out our understanding of political settlements and provides an overview of existing political settlements literature on African countries. The note then explores how the key concept of ‘holding power’ has been...

  3. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  4. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  5. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  6. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  7. A note on notes: note taking and containment.

    Science.gov (United States)

    Levine, Howard B

    2007-07-01

    In extreme situations of massive projective identification, both the analyst and the patient may come to share a fantasy or belief that his or her own psychic reality will be annihilated if the psychic reality of the other is accepted or adopted (Britton 1998). In the example of' Dr. M and his patient, the paradoxical dilemma around note taking had highly specific transference meanings; it was not simply an instance of the generalized human response of distracted attention that Freud (1912) had spoken of, nor was it the destabilization of analytic functioning that I tried to describe in my work with Mr. L. Whether such meanings will always exist in these situations remains a matter to be determined by further clinical experience. In reopening a dialogue about note taking during sessions, I have attempted to move the discussion away from categorical injunctions about what analysis should or should not do, and instead to foster a more nuanced, dynamic, and pair-specific consideration of the analyst's functioning in the immediate context of the analytic relationship. There is, of course, a wide variety of listening styles among analysts, and each analyst's mental functioning may be affected differently by each patient whom the analyst sees. I have raised many questions in the hopes of stimulating an expanded discussion that will allow us to share our experiences and perhaps reach additional conclusions. Further consideration may lead us to decide whether note taking may have very different meanings for other analysts and analyst-patient pairs, and whether it may serve useful functions in addition to the one that I have described.

  8. Implications of observing and writing field notes through different lenses

    Directory of Open Access Journals (Sweden)

    Hellesø R

    2015-04-01

    Full Text Available Ragnhild Hellesø,1 Line Melby,1 Solveig Hauge21Department of Nursing Science, Institute of Health and Society, Faculty of Medicine, University of Oslo, Oslo, Norway; 2Faculty of Health and Social Studies, Telemark University College, Porsgrunn, NorwayBackground: From a philosophy of science perspective, the literature has posited that different research approaches influence field studies. Studies addressing interdisciplinary research have focused on the challenges of organizing and running interdisciplinary teams, cultural differences between and within disciplines, and constraints in conducting interdisciplinary research. Studies exploring and discussing the process and outcome of transferring observations to notes from an interdisciplinary point of view are not identified. The aim of this paper is to explore the characteristics of field notes created by researchers representing different disciplines and experiences.Methods: A case study using a modified dynamic observation method was employed. The analyses were initiated by a researcher who had not been involved in the data collection. The field notes were analyzed using three main steps.Results: The structures of both researchers' field notes were characterized by similarities in their descriptions, but the notes' foci and analytical levels differed.Conclusion: The findings contribute new insights concerning the execution of interdisciplinary observational studies. Our findings demonstrate that entering the field with different lenses produced richer and more varied data, providing a broader platform from which to discuss and interpret a study's findings. From a theoretical point of view, the findings enable a more nuanced discussion and a conceptual elaboration regarding how observational approaches should be pursued in future studies. On a practical level, the findings show that even if the researchers agree on what the overall focus in the observations should be, differences can occur in

  9. A note on the translation of conceptual data models into description logics: disjointness and covering assumptions

    CSIR Research Space (South Africa)

    Casini, G

    2012-10-01

    Full Text Available possibilities for conceptual data modeling. It also raises the question of how existing conceptual models using ER, UML or ORM could be translated into Description Logics (DLs), a family of logics that have proved to be particularly appropriate for formalizing...

  10. DOE Defense Program (DP) safety programs. Final report, Task 003

    International Nuclear Information System (INIS)

    1998-01-01

    The overall objective of the work on Task 003 of Subcontract 9-X52-W7423-1 was to provide LANL with support to the DOE Defense Program (DP) Safety Programs. The effort included the identification of appropriate safety requirements, the refinement of a DP-specific Safety Analysis Report (SAR) Format and Content Guide (FCG) and Comprehensive Review Plan (CRP), incorporation of graded approach instructions into the guidance, and the development of a safety analysis methodologies document. All tasks which were assigned under this Task Order were completed. Descriptions of the objectives of each task and effort performed to complete each objective is provided here

  11. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  12. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  13. Towards a worldsheet description of N=8 supergravity

    International Nuclear Information System (INIS)

    Lipstein, Arthur; Schomerus, Volker

    2015-10-01

    In this note we address the worldsheet description of 4-dimensional N=8 supergravity using ambitwistors. After gauging an appropriate current algebra, we argue that the only physical vertex operators correspond to the N=8 supermultiplet. It has previously been shown that worldsheet correlators give rise to supergravity tree level scattering amplitudes. We extend this work by proposing a definition for genus-one amplitudes that passes several consistency checks such as exhibiting modular invariance and reproducing the expected infrared behavior of 1-loop supergravity amplitudes.

  14. Open Oncology Notes: A Qualitative Study of Oncology Patients' Experiences Reading Their Cancer Care Notes.

    Science.gov (United States)

    Kayastha, Neha; Pollak, Kathryn I; LeBlanc, Thomas W

    2018-04-01

    Electronic medical records increasingly allow patients access to clinician notes. Although most believe that open notes benefits patients, some suggest negative consequences. Little is known about the experiences of patients with cancer reading their medical notes; thus we aimed to describe this qualitatively. We interviewed 20 adults with metastatic or incurable cancer receiving cancer treatment. The semistructured qualitative interviews included four segments: assessing their overall experience reading notes, discussing how notes affected their cancer care experiences, reading a real note with the interviewer, and making suggestions for improvement. We used a constant comparison approach to analyze these qualitative data. We found four themes. Patients reported that notes resulted in the following: (1) increased comprehension; (2) ameliorated uncertainty, relieved anxiety, and facilitated control; (3) increased trust; and (4) for a subset of patients, increased anxiety. Patients described increased comprehension because notes refreshed their memory and clarified their understanding of visits. This helped mitigate the unfamiliarity of cancer, addressing uncertainty and relieving anxiety. Notes facilitated control, empowering patients to ask clinicians more questions. The transparency of notes also increased trust in clinicians. For a subset of patients, however, notes were emotionally difficult to read and raised concerns. Patients identified medical jargon and repetition in notes as areas for improvement. Most patients thought that reading notes improved their care experiences. A small subset of patients experienced increased distress. As reading notes becomes a routine part of the patient experience, physicians might want to elicit and address concerns that arise from notes, thereby further engaging patients in their care.

  15. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  16. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  17. Notes on Two Newly Naturalized Plants in Taiwan: Evolvulus nummularius (L. L. (Convolvulaceae and Acalypha aristata Kunth (Euphorbiaceae

    Directory of Open Access Journals (Sweden)

    Shih-Huei Chen

    2009-09-01

    Full Text Available Evolvulus nummularius (L. L. and Acalypha aristata Kunth, originally native to tropical America, were recently found naturalized in disturbed sites of Taiwan. The present study gives the taxonomic description and line drawings of the two species. In addition, their distributions and notes on ecology are provided.

  18. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  19. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  20. Department of Defense, Atlas/Data Abstract for the United States and Selected Areas, Fiscal Year 1997

    Science.gov (United States)

    1997-01-01

    Defense Reform Initiative to move to paper-free business operations, future editions of this publication will only be available through the Internet . All...applicable maps when all of their facilities are returned to the host nation. INTERNET AVAILABILITY Information presented in the Atlas is available through...Description Amount 1. IDEMITSU KOSAN CO. LTD. $78,597 Fuel Oils $70,854 2. KIT PAR COMERCIO DE PARAFUSOS 77,080 Electric Services 77,080 3. TOKYO

  1. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  2. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  3. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  4. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  5. 1. On note taking.

    Science.gov (United States)

    Plaut, Alfred B J

    2005-02-01

    In this paper the author explores the theoretical and technical issues relating to taking notes of analytic sessions, using an introspective approach. The paper discusses the lack of a consistent approach to note taking amongst analysts and sets out to demonstrate that systematic note taking can be helpful to the analyst. The author describes his discovery that an initial phase where as much data was recorded as possible did not prove to be reliably helpful in clinical work and initially actively interfered with recall in subsequent sessions. The impact of the nature of the analytic session itself and the focus of the analyst's interest on recall is discussed. The author then describes how he modified his note taking technique to classify information from sessions into four categories which enabled the analyst to select which information to record in notes. The characteristics of memory and its constructive nature are discussed in relation to the problems that arise in making accurate notes of analytic sessions.

  6. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  7. What happens when patients can see their doctors' note? - the Open Notes movement

    OpenAIRE

    Mende, Susan

    2017-01-01

    Introduction:  The Open Notes movement represents a culture change, enabling patients’ access to their providers’ notes, thereby increasing transparency and patient engagement.Policy context, objective and highlights:  OpenNotes involves allowing patients on-line or hard copy access to their providers’ notes. The one-year initial pilot began in 2010 with twenty thousand patients and one hundred primary care physicians at three medical centers in the United States.  The pilot’s evaluation foun...

  8. Preliminary assessment of the aquatic impacts of a proposed defense waste processing facility at the Savannah River Plant

    International Nuclear Information System (INIS)

    Mackey, H.E. Jr.

    1979-01-01

    A review of the literature indicates that a significant body of descriptive information exists concerning the aquatic ecology of Upper Three Runs Creek and Four Mile Creek of the Savannah River Plant south of Aiken, South Carolina. This information is adequate for preparation of an environmental document evaluating these streams. These streams will be impacted by construction and operation of a proposed Defense Waste Processing Facility for solidification of high level defense waste. Potential impacts include (1) construction runoff, erosion, and siltation, (2) effluents from a chemical and industrial waste treatment facility, and (3) radionuclide releases. In order to better evaluate potential impacts, recommend mitigation methods, and comply with NEPA requirements, additional quantitative biological information should be obtained through implementation of an aquatic baseline program

  9. Preliminary assessment of the aquatic impacts of a proposed defense waste processing facility at the Savannah River Plant

    Energy Technology Data Exchange (ETDEWEB)

    Mackey, H.E. Jr.

    1979-01-01

    A review of the literature indicates that a significant body of descriptive information exists concerning the aquatic ecology of Upper Three Runs Creek and Four Mile Creek of the Savannah River Plant south of Aiken, South Carolina. This information is adequate for preparation of an environmental document evaluating these streams. These streams will be impacted by construction and operation of a proposed Defense Waste Processing Facility for solidification of high level defense waste. Potential impacts include (1) construction runoff, erosion, and siltation, (2) effluents from a chemical and industrial waste treatment facility, and (3) radionuclide releases. In order to better evaluate potential impacts, recommend mitigation methods, and comply with NEPA requirements, additional quantitative biological information should be obtained through implementation of an aquatic baseline program.

  10. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  11. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  12. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  13. Note Taking and Recall

    Science.gov (United States)

    Fisher, Judith L.; Harris, Mary B.

    1974-01-01

    To study the effect of note taking and opportunity for review on subsequent recall, 88 college students were randomly assigned to five treatment groups utilizing different note taking and review combinations. No treatment effects were found, although quality of notes was positively correlated with free recall an multiple-choice measures.…

  14. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  15. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  16. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  17. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  19. Notes in Colombian Herpetology, II Notes in Colombian Herpetology, II

    Directory of Open Access Journals (Sweden)

    Dunn Emmett Reid

    1944-03-01

    Full Text Available The Lizard Genus Echinosaura (Teiidae in Colombia / Notes on the habits of the Tadpole-Carrying Frog Hyloxalus granuliventris / A New Marsupian Frog (Gastrotheca from Colombia The Lizard Genus Echinosaura (Teiidae in Colombia / Notes on the habits of the Tadpole-Carrying Frog Hyloxalus granuliventris / A New Marsupian Frog (Gastrotheca from Colombia.

  20. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  1. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  2. Design of Training Systems, Phase II Report, Volume III; Model Program Descriptions and Operating Procedures. TAEG Report No. 12-2.

    Science.gov (United States)

    Naval Training Equipment Center, Orlando, FL. Training Analysis and Evaluation Group.

    The Design of Training Systems (DOTS) project was initiated by the Department of Defense (DOD) to develop tools for the effective management of military training organizations. Volume 3 contains the model and data base program descriptions and operating procedures designed for phase 2 of the project. Flow charts and program listings for the…

  3. Note Taking for Geography Students.

    Science.gov (United States)

    Kneale, Pauline E.

    1998-01-01

    Addresses geography students' questions about why, when, and how to take notes. Outlines a step-by-step process for taking notes from written sources and from class lectures. Discusses what types of notes are appropriate for various types of sources. Suggests some ideas for making notes useful for individual learning styles. (DSK)

  4. On that Note...

    Science.gov (United States)

    Stein, Harry

    1988-01-01

    Provides suggestions for note-taking from books, lectures, visual presentations, and laboratory experiments to enhance student knowledge, memory, and length of attention span during instruction. Describes topical and structural outlines, visual mapping, charting, three-column note-taking, and concept mapping. Benefits and application of…

  5. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  6. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  7. Some Notes and Critiques of Selected Lexicographic Texts in Bikol

    Directory of Open Access Journals (Sweden)

    Louward Allen Zubiri

    2014-12-01

    Full Text Available This study revolves around notes and critiques of Bikol lexicography. Based on a selection of six dictionaries, the structure and diachronic development of Bikol lexicography were analyzed. Half of the selected dictionaries were authored in full or part by Malcolm Mintz, a renowned Bikol expert. These enabled a linear analysis of changes in lexicography that have occurred within the span of four decades. The dictionaries studied include the earliest and most influential Bikol dictionary of Lisboa (1865. The study presents a preliminary description of lexicographic work done in Bikol and traces the shift in the paradigm of dictionary making from the Spanish era to the present.

  8. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  9. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  10. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  11. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  12. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  13. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  14. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  15. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  16. Possible classification of the methods of operational research applicable in the field of defense

    Directory of Open Access Journals (Sweden)

    Mučibabić Spasoje

    2006-01-01

    Full Text Available The overall dynamic development of operational research in various fields of human activities urges the need for a clearer and mathematically more explicit classification of its methods. This need is also very urgent in the field of defense, particularly because of the complications of modern conflicts, as well as of new security requirements. One of the possible classifications of methods based on the theory of games as a mathematical model for solving conflict situations is presented in this paper. The connections between methods and their mathematical description are underlined.

  17. Larvae and pupae of two North American darkling beetles (Coleoptera, Tenebrionidae, Stenochiinae, Glyptotus cribratus LeConte and Cibdelis blaschkei Mannerheim, with notes on ecological and behavioural similarities

    Directory of Open Access Journals (Sweden)

    Warren Steiner

    2014-06-01

    Full Text Available This study describes and illustrates the larvae and pupae of two North American darkling beetles (Coleoptera: Tenebrionidae in the subfamily Stenochiinae, Glyptotus cribratus LeConte from the southeastern United States, and Cibdelis blaschkei Mannerheim from California. Both species inhabit forested regions where adults and larvae occur in soft rotten dry wood of dead branches on living trees or in sections recently fallen from them. Species identity was confirmed by rearing of adults and pupae and the discovery of both in pupal cells with associated exuvia. Specimen label data and notes on habitats are provided. Antipredator defense structures and behaviour are noted for larvae and pupae of both species.

  18. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  19. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  20. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  1. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  2. VA OpenNotes: exploring the experiences of early patient adopters with access to clinical notes.

    Science.gov (United States)

    Nazi, Kim M; Turvey, Carolyn L; Klein, Dawn M; Hogan, Timothy P; Woods, Susan S

    2015-03-01

    To explore the experience of early patient adopters who accessed their clinical notes online using the Blue Button feature of the My HealtheVet portal. A web-based survey of VA patient portal users from June 22 to September 15, 2013. 33.5% of respondents knew that clinical notes could be viewed, and nearly one in four (23.5%) said that they had viewed their notes at least once. The majority of VA Notes users agreed that accessing their notes will help them to do a better job of taking medications as prescribed (80.1%) and be better prepared for clinic visits (88.6%). Nine out of 10 users agreed that use of visit notes will help them understand their conditions better (91.8%), and better remember the plan for their care (91.9%). In contrast, 87% disagreed that VA Notes will make them worry more, and 88.4% disagreed that access to VA Notes will be more confusing than helpful. Users who had either contacted their provider or healthcare team (11.9%) or planned to (13.5%) primarily wanted to learn more about a health issue, medication, or test results (53.7%). Initial assessment of the patient experience within the first 9 months of availability provides evidence that patients both value and benefit from online access to clinical notes. These findings are congruent with OpenNotes study findings on a broader scale. Additional outreach and education is needed to enhance patient awareness. Healthcare professionals should author notes keeping in mind the opportunity patient access presents for enhanced communication. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  4. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  5. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  6. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  7. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  8. Grouping Notes Through NodesThe Functions of Post-It™ Notes in Design Team Cognition

    DEFF Research Database (Denmark)

    Dove, Graham; Abildgaard, Sille Julie; Biskjaer, Michael Mose

    The Post-It™ note is a frequently used, and yet seldom studied, design material. We investigate the functions Post-It™ notes serve when providing cognitive support for creative design team practice. Our investigation considers the ways in which Post-It™ notes function as design externalisations......, both individually and when grouped, and their role in categorisation in semantic long-term memory. To do this, we adopt a multimodal analytical approach focusing on interaction between humans, and between humans and artefacts, alongside language. We discuss in detail examples of four different...... externalisation functions served by Post-It™ notes, and show how these functions are present in complex overlapping combinations rather than being discrete. We then show how the temporal development of Post-It™ note interactions supports categorisation qualities of semantic long-term memory....

  9. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  10. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  11. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  12. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  13. SAFETY NOTES

    CERN Document Server

    TIS Secretariat

    2001-01-01

    Please note that the revisions of safety notes no 3 (NS 3 Rev. 2) and no 24 (NS 24 REV.) entitled respectively 'FIRE PREVENTION FOR ENCLOSED SPACES IN LARGE HALLS' and 'REMOVING UNBURIED ELV AND LVA ELECTRIC CONDUITS' are available on the web at the following urls: http://edmsoraweb.cern.ch:8001/cedar/doc.download?document_id=322811&version=1&filename=version_francaise.pdf http://edmsoraweb.cern.ch:8001/cedar/doc.download?document_id=322861&version=2&filename=version_francaise.pdf Paper copies can also be obtained from the TIS Divisional Secretariat, email tis.secretariat@cern.ch

  14. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  15. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  16. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  17. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  18. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  19. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    International Nuclear Information System (INIS)

    Radulesscu, G.; Tang, J.S.

    2000-01-01

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M andO [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M andO 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M andQ 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M andO 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this

  20. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    Energy Technology Data Exchange (ETDEWEB)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable

  1. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  2. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  3. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  4. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  5. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  6. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Employers' views on the fit note.

    Science.gov (United States)

    Kotze, E

    2014-12-01

    The fit note replaced the sick note in 2010. The statement of fitness for work (fit note) is expected to benefit the British economy by helping more people stay in work and prevent long-term sickness absence. Understanding and responding to employers' views on the fit note is key, in order for this goal to be achieved. To explore employers' views on the fit note. A qualitative study was undertaken and face-to-face interviews were conducted with participants representing employers from a variety of industries. There were 21 participants who were mainly human resources officers and line managers. Employers welcomed the introduction of the fit note and felt that it was an improvement on the sick note. The majority of employers felt the fit note had the potential to promote an earlier return to work, if used properly. The main problems reported were the completion of the fit notes and quality of advice received from general practitioners. Employers felt that the most helpful advice came from fit notes with information on the functional effects of the medical condition. Some employers found return to work decisions problematic. The fit note has the potential to promote an earlier return to work. In order for the fit note to achieve its aim, further understanding of the difficulties employers are having when making return to work decisions is important, in order to develop guidance to enable them to provide the practical support employees need to return to work sooner. © The Author 2014. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  9. EndNote 7.0

    Directory of Open Access Journals (Sweden)

    Eapen Bell

    2006-01-01

    Full Text Available EndNote is a useful software for online literature search and efficient bibliography management. It helps to format the bibliography according to the citation style of each journal. EndNote stores references in a library file, which can be shared with others. It can connect to online resources like PubMed and retrieve search results as per the search criteria. It can also effortlessly integrate with popular word processors like MS Word. The Indian Journal of Dermatology, Venereology and Leprology website has a provision to import references to EndNote.

  10. The impact of note taking style and note availability at retrieval on mock jurors' recall and recognition of trial information.

    Science.gov (United States)

    Thorley, Craig; Baxter, Rebecca E; Lorek, Joanna

    2016-01-01

    Jurors forget critical trial information and what they do recall can be inaccurate. Jurors' recall of trial information can be enhanced by permitting them to take notes during a trial onto blank sheets of paper (henceforth called freestyle note taking). A recent innovation is the trial-ordered-notebook (TON) for jurors, which is a notebook containing headings outlining the trial proceedings and which has space beneath each heading for notes. In a direct comparison, TON note takers recalled more trial information than freestyle note takers. This study investigated whether or not note taking improves recall as a result of enhanced encoding or as a result of note access at retrieval. To assess this, mock jurors watched and freely recalled a trial video with one-fifth taking no notes, two-fifths taking freestyle notes and two-fifths using TONs. During retrieval, half of the freestyle and TON note takers could access their notes. Note taking enhanced recall, with the freestyle note takers and TON note takers without note access performing equally as well. Note taking therefore enhances encoding. Recall was greatest for the TON note takers with note access, suggesting a retrieval enhancement unique to this condition. The theoretical and applied implications of these findings are discussed.

  11. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  12. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  13. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  14. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  15. An Information Foraging Analysis of Note Taking and Note Sharing While Browsing Campaign Information

    DEFF Research Database (Denmark)

    Vatrapu, Ravi; Robertson, Scott

    2010-01-01

    In this paper, we present an experimental study of political information foraging in the context of e-voting. Participants were observed while searching and browsing the internet for campaign information in a mock-voting situation in three online note-taking conditions: No Notes, Private Notes...... with lack of scent, low value perception, and value depletion of information. Implications for the voter centered design of e-voting portals are discussed....

  16. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  17. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  18. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  19. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  20. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  1. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  2. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  3. Effects of Note-Taking Instruction and Note-Taking Languages on College EFL Students' Listening Comprehension

    Science.gov (United States)

    Tsai-Fu, Tsai; Wu, Yongan

    2010-01-01

    Background: The effect of note-taking has been well-recognized by EFL educators. However, little empirical research has been done to investigate combined effects of note-taking instruction and note-taking language (whether in L1 or L2) in an acquisition-poor environment, where English is used as an instructional language yet the audience is…

  4. NOTES: issues and technical details with introduction of NOTES into a small general surgery residency program.

    Science.gov (United States)

    Kavic, Michael S; Mirza, Brian; Horne, Walter; Moskowitz, Jesse B

    2008-01-01

    Natural orifice translumenal endoscopic surgery (NOTES) is a development of recent origin. In 2004, Kalloo et al first described NOTES investigation in an animal model. Since then, several investigators have pursued NOTES study in animal survival and nonsurvival models. Our objectives for this project included studying NOTES intervention in a laboratory environment using large animal (swine) models and learning to do so in a safe, controlled manner. Ultimately, we intend to introduce NOTES methodology into our surgical residency training program. The expertise of an experienced laparoscopic surgeon, fellowship-trained laparoendoscopic surgeon, and veterinarian along with a senior surgical resident was utilized to bring the input of several disciplines to this study. The Institutional Animal Care and Use Committee (IACUC) of Northeastern Ohio Universities College of Medicine and Pharmacy (NEOUCOM/COP) approved this study. A series of 5 laboratory sessions using mixed breed farm swine varying in weight from 37 kg to 43.1 kg was planned for the initial phase of NOTES introduction into our residency program. Animals were not kept alive in this investigation. All animals were anesthetized using a standard swine protocol and euthanized following guidelines issued by the American Veterinary Medical Association Panel on Euthanasia. Equipment included a Fujinon EVE endoscope 0.8 cm in diameter with a suction/irrigation channel and one working channel. Initially, a US Endoscopy gastric overtube, 19.5 mm OD and 50 cm in length, was used to facilitate passage of the endoscope. However, this device was found to have insufficient length. Subsequently, commercially available 5/8" diameter clear plastic tubing, 70 cm to 80 cm in length, was adapted for use as an overtube. Standard endoscopic instruments included Boston Scientific biopsy forceps, needle-knife, papillotome, endoscopic clip applier, and Valley Lab electrosurgical unit. A Karl Storz laparoscope and tower were used for

  5. Cluster as a Tool to Increase the Competitiveness and Innovative Activity of Enterprises of the Defense Industry Complex

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2017-01-01

    Full Text Available Purpose: the main goal of the publication is to make a comprehensive study of the possible application of the cluster approach to improve the competitiveness and innovation activity of enterprises of the defense industry complex.Methods: the methodology of the research is based on the collection and analysis of initial data and information, the article uses a systematic approach to the study of socio-economic processes and phenomena. The research is based on modern theory of competition, innovation, as well as the modern paradigm of cluster development of the economy. In preparing the study, practical materials from Corporation “Rostec”.Results: the article gives the notion of cluster, the prospects for the use of the cluster approach to enhance competitiveness and innovation enterprises of the military-industrial complex. It is noted that the activation of interaction with the “civil sector” is particularly relevant in the context of the reduction of the state defense order, and the theory and practice of cluster management offers a number of forms of cluster interaction between the enterprises of the defense industry and the civil sector. It is emphasized that the development of cluster mechanisms can solve a number of problems related to the insufficient financial stability of defense industry enterprises in the context of a reduction in the state defense order, low innovation activity and the lack of developed models of interaction with small innovative enterprises. Ultimately, the use of cluster mechanisms in the development of defense enterprises is intended to enhance the competitiveness of the complex, both nationally and globally. It is stated that the existing clusters are not able to fully solve a number of specific tasks related to the diversification of integrated defense industry structures. Attention is drawn to the fact that existing clusters are not able to fully solve a number of specific tasks related to the

  6. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  7. Notes on Some Schizoid Mechanisms

    Science.gov (United States)

    KLEIN, MELANIE

    1996-01-01

    I propose to summarize some of the conclusions presented in this paper. One of my main points was the suggestion that in the first few months of life anxiety is predominantly experienced as fear of persecution and that this contributes to certain mechanisms and defenses which characterize the paranoid and schizoid positions. Outstanding among these defenses is the mechanism of splitting internal and external objects, emotions, and the ego. These mechanisms and defenses are part of normal development and at the same time form the basis for later schizophrenic illness. I described the processes underlying identification by projection as a combination of splitting off parts of the self and projecting them on to another person, and some of the effects this identification has on normal and schizoid object relations. The onset of the depressive position is the juncture at which by regression schizoid mechanisms may be reinforced. I also suggested a close connection between the manic-depressive and schizoid disorders, based on the interaction between the infantile schizoid and depressive positions. PMID:22700275

  8. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  9. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  10. Notes on the genus Conchapelopia Fittkau (Diptera: Chironomidae: Tanypodinae) from southern China, with description of a new species.

    Science.gov (United States)

    Niitsuma, Hiromi; Tang, Hongqu

    2017-02-22

    Two interesting species, Conchapelopia togamaculosa Sasa & Okazawa and a new species, Conchapelopia brachiata sp. n., were collected from southern China. The male, pupa and larva of the new species are described, and new distributions of the former species are noted. Although the male of the new species is very distinct from that of the former in the hypopygial median volsella, the pupa and larva stunningly resemble those of the former.

  11. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  12. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  13. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  14. Physicians’ Progress Notes

    DEFF Research Database (Denmark)

    Bansler, Jørgen; Havn, Erling C.; Mønsted, Troels

    2013-01-01

    in patient care, they have not dealt specifically with the role, structure, and content of the progress notes. As a consequence, CSCW research has not yet taken fully into account the fact that progress notes are coordinative artifacts of a rather special kind, an open-ended chain of prose texts, written...... sequentially by cooperating physicians for their own use as well as for that of their colleagues. We argue that progress notes are the core of the medical record, in that they marshal and summarize the overwhelming amount of data that is available in the modern hospital environment, and that their narrative...... format is uniquely adequate for the pivotal epistemic aspect of cooperative clinical work: the narrative format enables physicians to not only record ‘facts’ but also—by filtering, interpreting, organizing, and qualifying information—to make sense and act concertedly under conditions of uncertainty...

  15. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  16. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  17. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  18. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  19. Understanding Digital Note-Taking Practice for Visualization.

    Science.gov (United States)

    Willett, Wesley; Goffin, Pascal; Isenberg, Petra

    2015-05-13

    We present results and design implications from a study of digital note-taking practice to examine how visualization can support revisitation, reflection, and collaboration around notes. As digital notebooks become common forms of external memory, keeping track of volumes of content is increasingly difficult. Information visualization tools can help give note-takers an overview of their content and allow them to explore diverse sets of notes, find and organize related content, and compare their notes with their collaborators. To ground the design of such tools, we conducted a detailed mixed-methods study of digital note-taking practice. We identify a variety of different editing, organization, and sharing methods used by digital note-takers, many of which result in notes becoming "lost in the pile''. These findings form the basis for our design considerations that examine how visualization can support the revisitation, organization, and sharing of digital notes.

  20. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  1. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  2. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  3. Noted

    Science.gov (United States)

    Nunberg, Geoffrey

    2013-01-01

    Considering how much attention people lavish on the technologies of writing--scroll, codex, print, screen--it's striking how little they pay to the technologies for digesting and regurgitating it. One way or another, there's no sector of the modern world that is not saturated with note-taking--the bureaucracy, the liberal professions, the…

  4. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  5. Description of the female of Navicordulia aemulatrix Pinto & Lamas and additional notes on the male (Odonata: Corduliidae).

    Science.gov (United States)

    Pinto, A P; Lamas, C J E

    2011-01-01

    The female of Navicordulia aemulatrix Pinto & Lamas is described and illustrated for the first time based on a single specimen from the same locality of the type series (state of Santa Catarina, [municipality of São Bento do Sul, 26°14'58"S, 49°22'59"W, railroad station] Rio Vermelho, 29.I.1952, in MZSP). In addition, further morphological notes for the male are provided based on three specimens collected at the type locality and at a new locality in the state of Santa Catarina (Timbó municipality). The pronotal process present in N. aemulatrix is re-evaluated and considered non-homologous to that found in Neocordulia setifera (Hagen in Selys) as previously suggested.

  6. Making Notes, Making Meaning.

    Science.gov (United States)

    Burke, Jim

    2002-01-01

    Introduces notetaking tools used successfully with English-as-a-second-language students and low-achieving high school freshmen. Provides an overview of each tool and explains how students use them to take notes when reading textbooks and articles. Notes these tools and academic habits have helped students succeed in their mainstream academic…

  7. A note on Fukui’s note

    Directory of Open Access Journals (Sweden)

    Tsai Cheng-Yu Edwin

    2015-12-01

    Full Text Available This commentary relates Fukui’s (2015 note on weak vs. strong generation to two aspects of quantification in Chinese: quantifier scope and the syntactic licensing conditions of noninterrogative wh-expressions. It is shown that the phenomena under discussion echo Fukui’s (2015 view that only strong generation allows for a deeper understanding of natural language and that dependencies are to be distinguished structurally.

  8. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  9. The new bank note distribution system

    OpenAIRE

    Gerrit Bilkes

    1997-01-01

    In this article, the author outlines the recent changes made to the way Canada's bank notes are distributed. The new system allows financial institutions to exchange notes directly with one another at designated points across the country, rather than through Bank of Canada agencies, as was previously the case. The institutions communicate with the Bank of Canada through a computerized inventory-management system. Two Bank of Canada operations centres monitor note quality and supply new notes ...

  10. Suicide note themes and suicide prevention.

    Science.gov (United States)

    Foster, Tom

    2003-01-01

    The aim was to determine if suicide note themes might inform suicide prevention strategies. The themes of 42 suicide notes from the Northern Ireland Suicide Study (major psychological autopsy study) were examined. The commonest themes were "apology/shame" (74%), "love for those left behind" (60%), "life too much to bear" (48%), "instructions regarding practical affairs post-mortem" (36%), "hopelessness/nothing to live for" (21%) and "advice for those left behind" (21%). Notes of suicides with major unipolar depression were more likely than notes of suicides without major unipolar depression to contain the themes "instructions regarding practical affairs post-mortem" (67% versus 19%, p = 0.005) and "hopelessness/nothing to live for" (40% versus 11%, p = 0.049). Notes of suicides with a previous history of deliberate self-harm were less likely than notes of suicides without a history of deliberate self-harm to contain the theme "apology/shame" (58% versus 87%, p = 0.04). Notes of elderly suicides were more likely than non-elderly notes to contain the theme "burden to others" (40% versus 3%, p = 0.03). The fact that three quarters of suicide notes contained the theme "apology/shame" suggests that the deceased may have welcomed alternative solutions for their predicaments. Scrutiny of suicide note themes in the light of previous research findings suggests that cognitive therapy techniques, especially problem solving, may have an important role to play in suicide prevention and that potential major unipolar depressive (possibly less impulsive) suicides, in particular, may provide fertile ground for therapeutic intervention (physical and psychological). Ideally all primary care doctors and mental health professionals working with (potentially) suicidal people should be familiar with basic cognitive therapy techniques, especially problem solving skills training.

  11. A Dynamic Defense Modeling and Simulation Methodology using Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Kangsun Lee

    2010-04-01

    Full Text Available Defense Modeling and Simulations require interoperable and autonomous federates in order to fully simulate complex behavior of war-fighters and to dynamically adapt themselves to various war-game events, commands and controls. In this paper, we propose a semantic web service based methodology to develop war-game simulations. Our methodology encapsulates war-game logic into a set of web services with additional semantic information in WSDL (Web Service Description Language and OWL (Web Ontology Language. By utilizing dynamic discovery and binding power of semantic web services, we are able to dynamically reconfigure federates according to various simulation events. An ASuW (Anti-Surface Warfare simulator is constructed to demonstrate the methodology and successfully shows that the level of interoperability and autonomy can be greatly improved.

  12. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  13. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  14. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  15. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  16. Academic Training Lecture | Practical Statistics for LHC Physicists: Descriptive Statistics, Probability and Likelihood | 7-9 April

    CERN Multimedia

    2015-01-01

    Please note that our next series of Academic Training Lectures will take place on the 7, 8 and 9 April 2015   Practical Statistics for LHC Physicists: Descriptive Statistics, Probability and Likelihood, by Harrison Prosper, Floridia State University, USA. from 11.00 a.m. to 12.00 p.m. in the Council Chamber (503-1-001) https://indico.cern.ch/event/358542/

  17. Project Notes

    Science.gov (United States)

    School Science Review, 1978

    1978-01-01

    Presents sixteen project notes developed by pupils of Chipping Norton School and Bristol Grammar School, in the United Kingdom. These Projects include eight biology A-level projects and eight Chemistry A-level projects. (HM)

  18. Characteristics of suicide notes of children and young adolescents: an examination of the notes from suicide victims 15 years and younger.

    Science.gov (United States)

    Freuchen, Anne; Grøholt, Berit

    2015-04-01

    By analysing the suicide notes from suicide victims 15 years and younger, we attempt to gain insight into the process leading to youth suicide and explore the characteristics of the note writers. During a psychological autopsy on 42 youths, we were entrusted with 23 suicide notes in which we explored the themes and compared the note writers to the non-note writers. The key messages were as follows: explain the reason for suicide, declare love and give instructions. The note writers had showed suicidal behaviour more frequently than non-note writers. In the notes from youth suicide victims they present themselves as fully responsible and without confusion or overwhelming despair. The notes are likely equally informative as the notes of older victims. © The Author(s) 2013.

  19. Note-Making in Social Studies.

    Science.gov (United States)

    Fowler, Robert W.

    1985-01-01

    Note-making is one excellent method for helping students retain important points made by the teacher. Techniques that elementary and secondary social studies teacher can use to teach note-making skills are described. (RM)

  20. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  1. Innate Defense against Influenza A Virus: Activity of Human Neutrophil Defensins and Interactions of Defensins with Surfactant Protein D

    DEFF Research Database (Denmark)

    Hartshorn, Kevan L.; White, Mitchell R.; Tecle, Tesfaldet

    2006-01-01

    Surfactant protein D (SP-D) plays important roles in innate host defense against influenza A virus (IAV) infection, in part by modifying interactions with neutrophils. Human neutrophil defensins (HNPs) inhibit infectivity of enveloped viruses, including IAV. Our goal in this study was to characte......Surfactant protein D (SP-D) plays important roles in innate host defense against influenza A virus (IAV) infection, in part by modifying interactions with neutrophils. Human neutrophil defensins (HNPs) inhibit infectivity of enveloped viruses, including IAV. Our goal in this study...... was to characterize antiviral interactions between SP-D and HNPs. Recombinant and/or natural forms of SP-D and related collectins and HNPs were tested for antiviral activity against two different strains of IAV. HNPs 1 and 2 did not inhibit viral hemagglutination activity, but they interfered...... with the hemagglutination-inhibiting activity of SP-D. HNPs had significant viral neutralizing activity against divergent IAV strains. However, the HNPs generally had competitive effects when combined with SP-D in assays using an SP-D-sensitive IAV strain. In contrast, cooperative antiviral effects were noted in some...

  2. A note on consummation and termination.

    Science.gov (United States)

    Calef, V; Weinshel, E M

    1983-01-01

    The sensation sometimes expressed by analytic patients, most notably during termination of having left some "unfinished business" (to which they hope to return) is not necessarily simply a judgment about the analysis; frequently it is an affective component of the wish for consummation which has not been granted by the analysis. Simultaneously, it expresses the defense against that very consummation. The wish to give the analyst a gift is in some sense the direct opposite, or more correctly, expresses the defense more openly as a bribe and warning to the analyst that he should not expect or hope for consummation of the instinctual wishes which have been the center of analytic work; i.e., it is a defense against the fulfillment of those wishes almost as if the analyst, by attempting to analyze them, insists upon their enactment. Nevertheless, and despite the apparent contradiction, both affects, which serve similar functions, may appear simultaneously.

  3. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  4. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  5. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  6. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  7. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  8. DigiMemo: Facilitating the Note Taking Process

    Science.gov (United States)

    Kurt, Serhat

    2009-01-01

    Everyone takes notes daily for various reasons. Note taking is very popular in school settings and generally recognized as an effective learning strategy. Further, note taking is a complex process because it requires understanding, selection of information and writing. Some new technological tools may facilitate the note taking process. Among such…

  9. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  10. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  11. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  12. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  13. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  14. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  15. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  16. Description of a stable scheme for steady-state coupled Monte Carlo–thermal–hydraulic calculations

    International Nuclear Information System (INIS)

    Dufek, Jan; Eduard Hoogenboom, J.

    2014-01-01

    Highlights: • A stable coupling scheme for steady-state MC–TH calculations is described. • The coupling scheme is based on the stochastic approximation method. • The neutron flux (or power) distribution is relaxed using a variable step-size. - Abstract: We provide a detailed description of a numerically stable and efficient coupling scheme for steady-state Monte Carlo neutronic calculations with thermal–hydraulic feedback. While we have previously derived and published the stochastic approximation based method for coupling the Monte Carlo criticality and thermal–hydraulic calculations, its possible implementation has not been described in a step-by-step manner. As the simple description of the coupling scheme was repeatedly requested from us, we have decided to make it available via this note

  17. [The students' page. Notes about patient records and the production and reproduction of knowledge. Written and oral presentations].

    Science.gov (United States)

    de Almeida, L B; dos Santos, E S; Alves, D de B

    1995-01-01

    This paper relates a description about nursing notes in pactients promptuaries in relation to the distribution/reproduction/production process of knowledge in nursing. It was developed on an Intensive Care Unity from a Hospital in the teaching/assistance Sanitary District Barra/Rio Vermelho (Salvador-Bahia). The basic premise is that the nursing personal work superficial and sporadic notes just related to patients. Distribution/ reproduction/production process, that happen in the nursing work process isn't considered by it devaluation or just because, for nursing agents, only information about technical procedures related to patient care, expresses the nursing knowledge and so, must be registered. In order to reach the objective, 30% of the promptuaries of patients discharge from the ICU were studied and the nursing team was interviewed, during the months-november, december 1994. The analysis indicates that the way how the nursing notes are been made, results in hard communication among agents of health area and contributes to disqualify the nursing assistance that is given to patients, besides to limit the advance of the distribution/reproduction/production of knowledge in nursing.

  18. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  19. Escherichia coli K-12 pathogenicity in the pea aphid, Acyrthosiphon pisum, reveals reduced antibacterial defense in aphids.

    Science.gov (United States)

    Altincicek, Boran; Ter Braak, Bas; Laughton, Alice M; Udekwu, Klas I; Gerardo, Nicole M

    2011-10-01

    To better understand the molecular basis underlying aphid immune tolerance to beneficial bacteria and immune defense to pathogenic bacteria, we characterized how the pea aphid Acyrthosiphon pisum responds to Escherichia coli K-12 infections. E. coli bacteria, usually cleared in the hemolymph of other insect species, were capable of growing exponentially and killing aphids within a few days. Red fluorescence protein expressing E. coli K-12 laboratory strain multiplied in the aphid hemolymph as well as in the digestive tract, resulting in death of infected aphids. Selected gene deletion mutants of the E. coli K-12 predicted to have reduced virulence during systemic infections showed no difference in either replication or killing rate when compared to the wild type E. coli strain. Of note, however, the XL1-Blue E. coli K-12 strain exhibited a significant lag phase before multiplying and killing aphids. This bacterial strain has recently been shown to be more sensitive to oxidative stress than other E. coli K-12 strains, revealing a potential role for reactive oxygen species-mediated defenses in the otherwise reduced aphid immune system. Copyright © 2011 Elsevier Ltd. All rights reserved.

  20. RESEARCH NOTE

    Indian Academy of Sciences (India)

    Navya

    RESEARCH NOTE. CDKN2A and MC1R ... Department of Pharmacy and Department of Nursing, School of Health Sciences, Frederick. University, Nicosia ..... Appears with highest frequency in African, Asian-Indian, and Papua. New Guinean ...

  1. Editorial note

    Directory of Open Access Journals (Sweden)

    Tore Ahlbäck

    2009-01-01

    Full Text Available Editorial note of the Scripta Instituti Donneriani Aboensis, vol. 21, Postmodern Spirituality, based on papers read at the symposium on Postmodern Spirituality held at Åbo, Finland, on 11–13 June 2008.

  2. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  3. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  4. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  5. Note taking, review, memory, and comprehension.

    Science.gov (United States)

    Bohay, Mark; Blakely, Daniel P; Tamplin, Andrea K; Radvansky, Gabriel A

    2011-01-01

    In previous work assessing memory at various levels of representation, namely the surface form, textbase, and situation model levels, participants read texts but were otherwise not actively engaged with the texts. The current study tested the influence of active engagement with the material via note taking, along with the opportunity to review such notes, and the modality of presentation (text vs. spoken). The influence of these manipulations was assessed both immediately and 1 week later. In Experiment 1 participants read a text, whereas in Experiment 2 participants watched a video recording of the material being read as a lecture. For each experiment the opportunity to take notes was manipulated within participants, and the opportunity to review these notes before the test was manipulated between participants. Note taking improved performance at the situation model level in both experiments, although there was also some suggestion of benefit for the surface form. Thus, active engagement with material, such as note taking, appears to have the greatest benefit at the deeper levels of understanding.

  6. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  7. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  8. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  9. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  10. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  11. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  12. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  13. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  14. Children's note taking as a mnemonic tool.

    Science.gov (United States)

    Eskritt, Michelle; McLeod, Kellie

    2008-09-01

    When given the opportunity to take notes in memory tasks, children sometimes make notes that are not useful. The current study examined the role that task constraints might play in the production of nonmnemonic notes. In Experiment 1, children played one easy and one difficult memory game twice, once with the opportunity to make notes and once without that opportunity. More children produced functional notations for the easier task than for the more difficult task, and their notations were beneficial to memory performance. Experiment 2 found that the majority of children who at first made nonmnemonic notations were able to produce functional notations with minimal training, and there was no significant difference in notation quality or memory performance between spontaneous and trained note takers. Experiment 3 revealed that the majority of children could transfer their training to a novel task. The results suggest that children's production of nonmnemonic notes may be due in part to a lack of knowledge regarding what task information is important to represent or how to represent it in their notes rather than to an inability to make functional notes in general.

  15. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  16. Exercise in completing design information questionnaire for model research reactor: model description, notes, questionnaire

    International Nuclear Information System (INIS)

    Bellinger, J.; Ho, T.

    1989-01-01

    The document which defines the inspection measures which the IAEA can deploy at any given nuclear facility is known as the Facility Attachment. For the Agency to negotiate an effective Facility Attachment it must have available certain design information, including the facility's identity, capacity and location; the form, location and flow of nuclear material and the layout of important items of equipment; and a description of the features and procedures relating to nuclear material accountancy, containment and surveillance. In practice such information is solicited in a format, standardized for each facility type, known as the Design Information Questionnaire or the D.I.Q. The nuclear activities used as a model in this course are those of a fictitious country called Pacifica. These nuclear activities bear some resemblance to those at the Australian Atomic Energy Commission's Research Establishment at Lucas Heights. Specifically, Pacifica has a 10 MW heavy water cooled and moderated research reactor using enriched uranium fuel which is very similar to the HIFAR reactor. The reactor and the associated laboratories are described and the Design Information Questionnaire for them is completed. figs., tabs

  17. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. 2. ed.; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Derakshani, Nahid; Drobig, Matthias; Koenig, Mario; Mentfewitz, Joachim; Prast, Hartmut; Uelpenich, Gerhard; Vidmayer, Marc; Wilbert, Stefan; Wolf, Manfred

    2016-07-01

    The recommendations for sampling for prevention of hazards in civil defense (analytics of chemical, biological and radioactive contaminations) cover the following topics: Requirements for sampling, description of the materials (chemical, biological and radioactive contaminated materials), decontamination, sample transport and protocol documents.

  19. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  20. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  1. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  2. Tabular method of critical heat flux description in square packing rod bundles

    International Nuclear Information System (INIS)

    Bobkov, V.P.; Smogalev, I.P.

    2003-01-01

    Elaborations of harnessing tabular method for the description and calculation of critical heat fluxes in square packing rod bundles are presented. The tabular method for fuel rod triangular assemblies derived from using basic table for critical heat fluxes in triangular fuel assemblies demonstrates good results. For the harnessing tabular method in square packing rod bundles correction functions reflecting specific geometry were found. Comparative evaluations of calculated values for the critical heat fluxes with experimental ones are presented. Good agreement of calculations with experiments is noted in all range of parameters [ru

  3. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  4. Analytical dynamics course notes

    CERN Document Server

    Lindenbaum, Samuel D

    1994-01-01

    This book comprises a set of lecture notes on rational mechanics, for part of the graduate physics curriculum, delivered by the late Prof. Shirley L. Quimby during his tenure at Columbia University, New York. The notes contain proofs of basic theorems, derivations of formulae and amplification of observations, as well as the presentation and solution of illustrative problems. Collateral readings from more than 50 source references are indicated at appropriate places in the text.

  5. MITHRAS REDISCOVERED II. FURTHER NOTES ON CIMRM 1938 AND 1986

    Directory of Open Access Journals (Sweden)

    Szabo Csaba

    2015-06-01

    Full Text Available Recently, an important Mithraic relief was rediscovered and republished by the author of these lines in collaboration with George Bounegru and Victor Sava. The relief, known in the literature as CIMRM 1938 was for a long time considered a „disappeared” monument, the only laconic description being that of Marteen J. Vermaseren from his monumental corpus. Due to the recently rediscovered photographs of the relief and the detailed analysis of the correspondence between Béla Cserni and Franz Cumont, the CIMRM 1938 is now became available for further research. In this article, I will add some further historiographic and iconographic notes on one of the biggest Mithraic reliefs found in Dacia, solving also another mysterious piece in Vermaseren’s catalogue, the CIMRM 1986. The article is also the first publication of Béla Cserni’s photograph about the relief.

  6. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  7. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  8. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  9. Lab Note: Training the Cyber Defensive Line

    Science.gov (United States)

    2016-05-02

    available at http://www.nextgov.com/cybersecurity/2013/03/how-many-cyberattacks-hit-united-states-last- year/61775/. 2 “Verizon 2015 Data Breach Investigation...at http://www.prnewswire.com/news-releases/verizon-2015- data - breach -investigations-report-finds- cyberthreats-are-increasing-in-sophistication-yet...Verizon’s Data Breach Investigations Report (available on request from http://www.verizonenterprise.com/DBIR/). The blue team must ensure that their

  10. Quality assurance program description: Hanford Waste Vitrification Plant, Part 1

    International Nuclear Information System (INIS)

    1992-01-01

    This document describes the Department of Energy's Richland Field Office (DOE-RL) quality assurance (QA) program for the processing of high-level waste as well as the Vitrification Project Quality Assurance Program for the design and construction of the Hanford Waste Vitrification Plant (HWVP). It also identifies and describes the planned activities that constitute the required quality assurance program for the HWVP. This program applies to the broad scope of quality-affecting activities associated with the overall HWVP Facility. Quality-affecting activities include designing, purchasing, fabricating, handling, shipping, storing, cleaning, erecting, installing, inspecting, testing, maintaining, repairing, and modifying. Also included are the development, qualification, and production of waste forms which may be safely used to dispose of high-level radioactive waste resulting from national defense activities. The HWVP QA program is made up of many constituent programs that are being implemented by the participating organizations. This Quality Assurance program description is intended to outline and define the scope and application of the major programs that make up the HWVP QA program. It provides a means by which the overall program can be managed and directed to achieve its objectives. Subsequent parts of this description will identify the program's objectives, its scope, application, and structure

  11. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  12. Open notes: doctors and patients signing on.

    Science.gov (United States)

    Delbanco, Tom; Walker, Jan; Darer, Jonathan D; Elmore, Joann G; Feldman, Henry J; Leveille, Suzanne G; Ralston, James D; Ross, Stephen E; Vodicka, Elisabeth; Weber, Valerie D

    2010-07-20

    Few patients read their doctors' notes, despite having the legal right to do so. As information technology makes medical records more accessible and society calls for greater transparency, patients' interest in reading their doctors' notes may increase. Inviting patients to review these notes could improve understanding of their health, foster productive communication, stimulate shared decision making, and ultimately lead to better outcomes. Yet, easy access to doctors' notes could have negative consequences, such as confusing or worrying patients and complicating rather than improving patient-doctor communication. To gain evidence about the feasibility, benefits, and harms of providing patients ready access to electronic doctors' notes, a team of physicians and nurses have embarked on a demonstration and evaluation of a project called OpenNotes. The authors describe the intervention and share what they learned from conversations with doctors and patients during the planning stages. The team anticipates that "open notes" will spread and suggests that over time, if drafted collaboratively and signed by both doctors and patients, they might evolve to become contracts for care.

  13. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  14. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  15. The Anatomy of a Note.

    Science.gov (United States)

    Moore, Herb

    1986-01-01

    Suggests that students can learn the physics of a musical note by learning how to synthesize sounds on a computer. Discusses ADSR (attack, decay, sustain, and release of a note) and includes a program (with listing) which students can use to examine ADSR on a Commodore 64 microcomputer. (JN)

  16. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  17. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  18. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  19. IMPLEMENTING CONCEPT MAPPING TECHNIQUE TO IMPROVE STUDENTS’ DESCRIPTIVE WRITING ABILITY

    Directory of Open Access Journals (Sweden)

    Rubiyah Rubiyah Rubiyah

    2018-04-01

    Full Text Available This Classroom Action Research aimed at investigating the implementation of Concept Mapping Technique to improve students’ descriptive writing ability. The research was conducted in two cycles at SMP Negeri 21 Samarinda, with 37 seventh grade students participating. In this research, there was one teacher- researcher who implemented the technique and there were two collaborators who did the observation. The data were collected both quantitatively and qualitatively by using writing assessment, interview guide, observation sheets and field notes. The findings showed that: 1 there was an improvement in the students’ descriptive writing average scores at the end of the second research cycle; 2 the implementation of the concept mapping technique was done properly by the teacher- researcher; 3 the concept mapping technique delivered through collaborative working improved the participation of the students in the teaching and learning process. Since all the criteria of success in this research were fulfilled by the end of the second cycle, it could be concluded that this classroom action research was successfully implemented and the technique proposed could very well improve the skills being targeted.

  20. Phenomenological description reference concept (Spent Fuel - Copper - Iron - Bentonite - Granite)

    International Nuclear Information System (INIS)

    Lehikoinen, J.; Nordman, H.

    2008-12-01

    This report gives a broad overview of the salient processes and associated time frames and uncertainties pertaining to the long-term normal evolution of the near-field of a deep repository of the KBS-3V type. By normal evolution, reference is made to the description of the evolution of a disposal system subject to the assumption that all the spent fuel canisters remain intact following emplacement and repository closure for at least the design corrosion lifetime of the canister overpack in the expected repository conditions. In this connection, the effects of future glaciations, canister manufacturing defects and small-scale tectonic activity are briefly touched upon. The roles of the different repository near-field barriers in providing safety are briefly noted. The description of the normal evolution of a KBS-3V-type repository near-field conditions external to the unbreached spent fuel canister has been realized in terms of processes rather than timescales. Separate chapters have been devoted to the thermal, hydraulic, mechanical and chemical/biological evolution of the repository system, with due attention to some of the couplings between them. (orig.)

  1. Molecular gastronomy is a scientific discipline, and note by note cuisine is the next culinary trend

    Directory of Open Access Journals (Sweden)

    This Hervé

    2013-01-01

    Full Text Available Abstract For the past two decades, there has been much confusion about molecular gastronomy. This confusion has arisen because people ignore that the word gastronomy does not mean cuisine, it means knowledge about food. Similar to ‘molecular biology’, molecular gastronomy is a scientific discipline that looks for the mechanisms of phenomena occurring during dish preparation and consumption. As with any other scientific discipline, it can have many applications. One of the first was ‘molecular cuisine’ but since 1994, ‘note by note cuisine’ has also been promoted. The latter involves preparing dishes using pure compounds, or more practically mixture of compounds obtained by fractioning plant or animal tissues, instead of using these tissues themselves. Note by note cuisine raises issues in various fields: science, technology, nutrition, physiology, toxicology and politics.

  2. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  3. Gaz de France. Operation note; Gaz de France. Note d'operation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    This note was published for the public at the occasion of the admission to Euronext's Eurolist of the existing shares that make the capital of Gaz de France company, the French gas utility. The note gives some informations about Gaz de France activity, and about its strategy of development in the European gas market. Then it describes the offer relative to the opening of Gaz de France capital. Some selected financial data and some precision about the risk factors and the management of the company complete the document. (J.S.)

  4. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  5. Leading a Classroom Discussion: Definition, Supportive Evidence, and Measurement of the "ETS"® National Observational Teaching Examination (NOTE) Assessment Series. Research Memorandum No. RM-16-09

    Science.gov (United States)

    Witherspoon, Margaret; Sykes, Gary; Bell, Courtney

    2016-01-01

    This paper provides a description and rationale for a performance assessment of a teaching practice--leading a classroom discussion (LCD)--included in the ETS® National Observational Teaching Examination (NOTE) assessment series. In this assessment, candidates interact with a small class of virtual students represented by avatars in a…

  6. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  7. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  8. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  9. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  10. OpenLabNotes

    DEFF Research Database (Denmark)

    List, Markus; Franz, Michael; Tan, Qihua

    2015-01-01

    be advantageous if an ELN was Integrated with a laboratory information management system to allow for a comprehensive documentation of experimental work including the location of samples that were used in a particular experiment. Here, we present OpenLabNotes, which adds state-of-the-art ELN capabilities to Open......LabFramework, a powerful and flexible laboratory information management system. In contrast to comparable solutions, it allows to protect the intellectual property of its users by offering data protection with digital signatures. OpenLabNotes effectively Closes the gap between research documentation and sample management......, thus making Open-Lab Framework more attractive for laboratories that seek to increase productivity through electronic data management....

  11. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  12. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  13. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  14. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  15. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  16. How is adult patient adherence recorded in orthodontists’ clinical notes? A mixed-method case-note study

    Directory of Open Access Journals (Sweden)

    Al Shammary N

    2017-10-01

    Full Text Available Nawaf Al Shammary,1 Koula Asimakopoulou,1 Fraser McDonald,2 Jonathon T Newton,1 Sasha Scambler1 1Division of Population and Patient Health, 2Craniofacial Development and Stem Cell Biology Department, King’s College London Dental Institute, London, UKBackground: Patient adherence in orthodontic treatment is extremely important as it is linked with better treatment outcomes. Despite its importance, however, there is no shared definition of the concept. This makes the recording of adherence-related behaviors in patient notes difficult. The current study explored how, and to what extent adherence is recorded in adult patients’ medical records by orthodontists working in a large National Health Service (NHS London hospital.Materials and methods: A mixed-methods approach was used. A total of 17 clinicians with a mean age of 31 years (SD =4.87 provided N=20 case notes spanning N=324 appointments with patients they judged to be non-adherent. The notes were inspected for evidence of recording of patient adherence using adherence indicators identified in the literature.Results: The term “adherence” did not feature in any notes. The quantitative analysis showed that the three most frequent adherence-related behaviors recorded in notes were “oral hygiene,” “appointment attendance” and “breakages of appliances.” Qualitative analysis not only confirmed these factors but also showed that 1 the clinical aspects of treatment, 2 clinician–patient interaction factors and 3 patient attitudes also featured. This part of the analysis also highlighted inconsistencies across case notes in terms of the amount of information being recorded.Conclusion: Adherence as a term does not feature in the clinical case notes of clinician-identified non-adherent adult patients, while predictors of adherence are recorded with varying degrees of consistency. Keywords: adherence, adults, orthodontic treatment

  17. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  18. Bank note recognition for the vision impaired.

    Science.gov (United States)

    Hinwood, A; Preston, P; Suaning, G J; Lovell, N H

    2006-06-01

    Blind Australians find great difficulty in recognising bank notes. Each note has the same feel, with no Braille markings, irregular edges or other tangible features. In Australia, there is only one device available that can assist blind people recognise their notes. Internationally, there are devices available; however they are expensive, complex and have not been developed to cater for Australian currency. This paper discusses a new device, the MoneyTalker that takes advantage of the largely different colours and patterns on each Australian bank note and recognises the notes electronically, using the reflection and transmission properties of light. Different coloured lights are transmitted through the inserted note and the corresponding sensors detect distinct ranges of values depending on the colour of the note. Various classification algorithms were studied and the final algorithm was chosen based on accuracy and speed of recognition. The MoneyTalker has shown an accuracy of more than 99%. A blind subject has tested the device and believes that it is usable, compact and affordable. Based on the devices that are available currently in Australia, the MoneyTalker is an effective alternative in terms of accuracy and usability.

  19. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  20. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  1. Note from TS/FM Group

    CERN Document Server

    2007-01-01

    Renovation work at Restaurant no. 1 Please note that starting from 5 March and for one week, the men's toilets in Bldg. 500 (underground) will be closed because of the renovation work at Restaurant No. 1. The women's toilets in the same place will exceptionally be open to men and women during the same period. We apologize for the inconvenience and we are at your disposal for further information. Shuttle requests Please note that starting from 1 March 2007, shuttle requests: for official visits or bidders' conferences on the CERN site; to/from the airport or the centre of Geneva; for long distances, must be made via Fm.Support@cern.ch or by calling 77777. The radio taxi will still be reachable on 76969. Please note that starting from 1st of March, requests for the transport of PCs from your office to the PC store (Bldg. 513) and vice-versa, must be made the 'transport request' form on EDH under the field 'removals'). Mail distribution Please note that starting from 1 March 2007, mail distrib...

  2. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  3. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  4. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  5. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  6. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  7. Taxonomic notes on Neoperla (Plecoptera: Perlidae) from Sichuan Province of China with the description of two new species.

    Science.gov (United States)

    Li, Weihai; Wang, Ying; Wang, Rongfeng

    2017-01-17

    Species of the perlid genus Neoperla from Sichuan Province, China are reviewed. Two new species are described, Neoperla caii Li & Wang, sp. nov. and N. emeishana Li & Wang, sp. nov. The new species are compared with related congeners. Available types of several known Neoperla species from Sichuan Province were studied and complementary descriptions or brief taxonomic comments are presented for N. bilineata Wu & Claassen, N. chui Wu & Claassen, N. microtumida Wu & Claassen, N. quadrata Wu & Claassen and N. truncata Wu.

  8. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  9. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  10. Technical Note

    African Journals Online (AJOL)

    Administratör

    In this report on four patients, we did not use any of these techniques. The existence and the site of the fistulas was clearly demonstrated using basic but important preoperative detailed assessment and two intraoperative findings. The preoperative referral note that indicated the site of technical difficulty during the previous ...

  11. A note on axial symmetries

    International Nuclear Information System (INIS)

    Beetle, Christopher; Wilder, Shawn

    2015-01-01

    This note describes how to characterize and normalize an axial Killing field on a general Riemannian geometry or four-dimensional Lorentzian geometry. No global assumptions are necessary, such as that the orbits of the Killing field all have period 2π. Rather, any Killing field that vanishes at at least one point necessarily has the expected global properties. (note)

  12. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  13. Do Simulation-Based Skill Exercises and Post-Encounter Notes Add Additional Value to a Standardized Patient-Based Clinical Skills Examination?

    Directory of Open Access Journals (Sweden)

    Michael D. Prislin

    2011-01-01

    Full Text Available Background. Standardized patient (SP clinical assessments have limited utility in assessing higher-level clinical competencies. This study explores the value of including simulation exercises and postencounter notes in an SP clinical skills examination. Methods. Two exercises involving cardiac auscultation and ophthalmic funduscopy simulations along with written post encounter notes were added to an SP-based performance examination. Descriptive analyses of students' performance and correlations with SP-based performance measures were obtained. Results. Students' abilities to detect abnormalities on physical exam were highly variable. There were no correlations between SP-based and simulation-derived measures of physical examination competency. Limited correlations were found between students' abilities to perform and document physical examinations and their formulation of appropriate differential diagnoses. Conclusions. Clinical simulation exercises add depth to SP-based assessments of performance. Evaluating the content of post encounter notes offers some insight into students' integrative abilities, and this appears to be improved by the addition of simulation-based post encounter skill exercises. However, further refinement of this methodology is needed.

  14. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  15. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  16. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  17. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  18. What Predicts Skill in Lecture Note Taking?

    Science.gov (United States)

    Peverly, Stephen T.; Ramaswamy, Vivek; Brown, Cindy; Sumowski, James; Alidoost, Moona; Garner, Joanna

    2007-01-01

    Despite the importance of good lecture notes to test performance, very little is known about the cognitive processes that underlie effective lecture note taking. The primary purpose of the 2 studies reported (a pilot study and Study 1) was to investigate 3 processes hypothesized to be significantly related to quality of notes: transcription…

  19. Editor's Note

    African Journals Online (AJOL)

    On another note: the editor and the editorial team acknowledge the financial support of the Carnegie Corporation of New York through the University of Ghana Building A New Generation of Academics in Africa (BANGA-Africa) Project. We also use this platform to express our gratitude for the support of various stakeholders, ...

  20. Note-taking and Handouts in The Digital Age.

    Science.gov (United States)

    Stacy, Elizabeth Moore; Cain, Jeff

    2015-09-25

    Most educators consider note-taking a critical component of formal classroom learning. Advancements in technology such as tablet computers, mobile applications, and recorded lectures are altering classroom dynamics and affecting the way students compose and review class notes. These tools may improve a student's ability to take notes, but they also may hinder learning. In an era of dynamic technology developments, it is important for educators to routinely examine and evaluate influences on formal and informal learning environments. This paper discusses key background literature on student note-taking, identifies recent trends and potential implications of mobile technologies on classroom note-taking and student learning, and discusses future directions for note-taking in the context of digitally enabled lifelong learning.

  1. Descriptive Research

    DEFF Research Database (Denmark)

    Wigram, Anthony Lewis

    2003-01-01

    Descriptive research is described by Lathom-Radocy and Radocy (1995) to include Survey research, ex post facto research, case studies and developmental studies. Descriptive research also includes a review of the literature in order to provide both quantitative and qualitative evidence of the effect...... starts will allow effect size calculations to be made in order to evaluate effect over time. Given the difficulties in undertaking controlled experimental studies in the creative arts therapies, descriptive research methods offer a way of quantifying effect through descriptive statistical analysis...

  2. Taking notes as an interactive process

    OpenAIRE

    Hornig, Wolfgang

    1984-01-01

    Taking notes as an interactive process : how to improve students´ notes / Hornig W. ; Nowak, J. - In: Nowak, Johann: Textverstehen und Textrekonstruktion in Vorlesungen. - Augsburg : HDZ, 1984. - S. 227-253. - (Augsburger Studien zur Hochschuldidaktik ; 12)

  3. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  4. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  5. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  6. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  7. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  8. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  9. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  10. Grouping Notes Through Nodes

    DEFF Research Database (Denmark)

    Dove, Graham; Abildgaard, Sille Julie Jøhnk; Biskjær, Michael Mose

    , both individually and when grouped, and their role in categorisation in semantic long-term memory. To do this, we adopt a multimodal analytical approach focusing on interaction between humans, and between humans and artefacts, alongside language. We discuss in detail examples of four different...... externalisation functions served by Post-ItTM notes, and show how these functions are present in complex overlapping combinations rather than being discrete. We then show how the temporal development of Post-ItTM note interactions supports categorisation qualities of semantic long-term memory....

  11. Grouping Notes Through Nodes

    DEFF Research Database (Denmark)

    Dove, Graham; Abildgaard, Sille Julie; Biskjær, Michael Mose

    2017-01-01

    , both individually and when grouped, and their role in categorisation in semantic long-term memory. To do this, we adopt a multimodal analytical approach focusing on interaction between humans, and between humans and artefacts, alongside language. We discuss in detail examples of four different...... externalisation functions served by Post-ItTM notes, and show how these functions are present in complex overlapping combinations rather than being discrete. We then show how the temporal development of Post-ItTM note interactions supports categorisation qualities of semantic long-term memory....

  12. A Pedagogic Cycle for EFL Note-Taking

    Science.gov (United States)

    Siegel, Joseph

    2016-01-01

    More attention has been given to note-taking in EFL classrooms in recent years, probably due to growing numbers of EFL students who attend lectures given in English and the importance of note-taking during language proficiency tests. While textbooks and materials for note-taking practice are readily available, classroom techniques for teaching EFL…

  13. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  14. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  15. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  16. Debriefing Note Secondary Education Support Programme

    DEFF Research Database (Denmark)

    Webster, Neil; Vagnby, Bo Hellisen; Thomsen, Thomas J.

    Debriefing note regarding joint programming for the Secondary Education Support Programme (2003- 2007). The note specifies preparation of SIP Physical Guidelines; Training needs assessment for Physical School Status and Rapid Technical Assessments; SIP/DEP preparation; Selection criteria...

  17. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  18. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  19. Multi-capability color night vision HD camera for defense, surveillance, and security

    Science.gov (United States)

    Pang, Francis; Powell, Gareth; Fereyre, Pierre

    2015-05-01

    e2v has developed a family of high performance cameras based on our next generation CMOS imagers that provide multiple features and capabilities to meet the range of challenging imaging applications in defense, surveillance, and security markets. Two resolution sizes are available: 1920x1080 with 5.3 μm pixels, and an ultra-low light level version at 1280x1024 with 10μm pixels. Each type is available in either monochrome or e2v's unique bayer pattern color version. The camera is well suited to accommodate many of the high demands for defense, surveillance, and security applications: compact form factor (SWAP+C), color night vision performance (down to 10-2 lux), ruggedized housing, Global Shutter, low read noise (<6e- in Global shutter mode and <2.5e- in Rolling shutter mode), 60 Hz frame rate, high QE especially in the enhanced NIR range (up to 1100nm). Other capabilities include active illumination and range gating. This paper will describe all the features of the sensor and the camera. It will be followed with a presentation of the latest test data with the current developments. Then, it will conclude with a description of how these features can be easily configured to meet many different applications. With this development, we can tune rather than create a full customization, making it more beneficial for many of our customers and their custom applications.

  20. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  1. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    authors (either of their own or plenary papers from 15 countries were present at the Conference.It should be noted that at this conference, unlike the previous one also held in the VTI, Belgrade, in 2011, there was a significantly higher number of younger researchers. There was a general impression that many reseach results communicated at the Conference deserved to be published in reference journals on the SCR list.A number of papers from this Conference will be considered for publication in the Scientific Technical Review. It should be noted that the MO-VTI organizing committee largely contributed to the Conference to be evaluated as a well-organized event.From a total number of papers (145, there were 32 (or 22.06%  from abroad.  Once again, the Conference justified the purpose of this type of conferences. The other works of authors and co-authors were from the following institutions in Serbia:The Ministry of Education and Science and Technological Development,Military Technical Institute (VTI, Military Academy (MA, the Army of Serbia (SAF, the Ministry of Defence (MOD, Department of Defense Technology (MDT, University of Defence (UD Military Institution Dedinje, Military Archives, Technical Test Center (TTC, Technical Overhaul Institute Čačak (TRZ, the Central Logistics Base, Institute of Strategic Studies, Criminal Police College,GOŠA Institute, Institute of Engineering,Faculties of Mathematics, Mechanical Engineering, Electrical Engineering, Metropolitan University, Faculty of Technology and metallurgy, College of Project Management,UTVA Aircraft Industry Pančevo, Intel Communications, IHATEM, Vlata com, Iritel, Peripolis-Electronics, Computer Engineering, Thermo Electric, HK Krušik Valjevo.ConclusionThe Conference had a truly international character.As in previous years, the participation of the Army of Serbia in this important event is fully justified, and the goal is reached. In addition to the communication of the research results, there was a fruitful

  2. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  3. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  4. Current knowledge on bioacoustics of the subfamily Lophyohylinae (Hylidae, Anura and description of Ocellated treefrog Itapotihyla langsdorffii vocalizations

    Directory of Open Access Journals (Sweden)

    Lucas Rodriguez Forti

    2018-05-01

    Full Text Available Background Anuran vocalizations, such as advertisement and release calls, are informative for taxonomy because species recognition can be based on those signals. Thus, a proper acoustic description of the calls may support taxonomic decisions and may contribute to knowledge about amphibian phylogeny. Methods Here we present a perspective on advertisement call descriptions of the frog subfamily Lophyohylinae, through a literature review and a spatial analysis presenting bioacoustic coldspots (sites with high diversity of species lacking advertisement call descriptions for this taxonomic group. Additionally, we describe the advertisement and release calls of the still poorly known treefrog, Itapotihyla langsdorffii. We analyzed recordings of six males using the software Raven Pro 1.4 and calculated the coefficient of variation for classifying static and dynamic acoustic properties. Results and Discussion We found that more than half of the species within the subfamily do not have their vocalizations described yet. Most of these species are distributed in the western and northern Amazon, where recording sampling effort should be strengthened in order to fill these gaps. The advertisement call of I. langsdorffii is composed of 3–18 short unpulsed notes (mean of 13 ms long, presents harmonic structure, and has a peak dominant frequency of about 1.4 kHz. This call usually presents amplitude modulation, with decreasing intensity along the sequence of notes. The release call is a simple unpulsed note with an average duration of 9 ms, and peak dominant frequency around 1.8 kHz. Temporal properties presented higher variations than spectral properties at both intra- and inter-individual levels. However, only peak dominant frequency was static at intra-individual level. High variability in temporal properties and lower variations related to spectral ones is usual for anurans; The first set of variables is determined by social environment or temperature

  5. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  6. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  7. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  8. Technical specifications (replaces note T.62). Irradiation of graphite at ambient temperature, Note T. 76; Specification technique, (Annule et remplace la note T. 62), Irradiation de graphite a temperature ambiante, Note T. 76

    Energy Technology Data Exchange (ETDEWEB)

    Reseau, R A [Services des grandes piles experimentales, Section ' Physique et Experimentation, Saclay (France)

    1962-12-15

    The objective is to study the effects of fast neutron irradiation of different graphite samples. The irradiation conditions should be as follows: integral fast neutron flux should be higher than 10{sup 20} neutrons/cm{sup 2}, the reactor should operate at steady state for 15 days, the temperature od samples should not be higher than 100 deg C, preferably 80 deg C. Note T. 62 which is replaced by this Note is attached.

  9. Graphic Description: The Mystery of Ibn Khafaja\\'s Success in Description

    Directory of Open Access Journals (Sweden)

    جواد رنجبر

    2009-12-01

    Full Text Available Graphic Description:   The Mystery of Ibn Khafaja's Success in Description    Ali Bagher Taheriniya *  Javad Ranjbar **      Abstract Ibn Khafaja is one of the poets and men of letters in Spain. He is titled to Sanobari of Spain. He is one of the masters of description. Hence, the analysis of successful techniques he has used in the descriptive art could illuminate the way for others. Al-Taswir al-harfi (graphic description is a term which denotes the highest and most detailed poems. On this basis, the best descriptive poem is one which is closer to a painting. He has used some elements called conforming elements of description which contain: imagination, feeling, faculty, and dialogue as well as three other elements: to be inborn in description, enchanting nature and convenient life. This article is going to give an analysis of the reasons for Ibn Khafaja’s success in description and portrait making.   Key words: Ibn Khafaja, poetry, description, portrait   * Associate Professor, Bu Ali Sina University of Hamadan E-mail: bTaheriniya@yahoo.com  ** M.A. in Arabic Language and Literature

  10. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  11. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  12. Employing Picture Description to Assess the Students' Descriptive Paragraph Writing

    Directory of Open Access Journals (Sweden)

    Ida Ayu Mega Cahyani

    2018-03-01

    Full Text Available Writing is considered as an important skill in learning process which is needed to be mastered by the students. However, in teaching learning process at schools or universities, the assessment of writing skill is not becoming the focus of learning process and the assessment is administered inappropriately. In this present study, the researcher undertook the study which dealt with assessing descriptive paragraph writing ability of the students through picture description by employing an ex post facto as the research design. The present study was intended to answer the research problem dealing with the extent of the students’ achievement of descriptive paragraph writing ability which is assessed through picture description. The samples under the study were 40 students determined by means of random sampling technique with lottery system. The data were collected through administering picture description as the research instrument. The obtained data were analyzed by using norm-reference measure of five standard values. The results of the data analysis showed that there were 67.50% samples of the study were successful in writing descriptive paragraph, while there were 32.50% samples were unsuccessful in writing descriptive paragraph which was assessed by administering picture description test

  13. [Clinical characteristics among forensic inpatients: A special case, the establishment of social defense "Les Marronniers" in Tournai (Belgium)].

    Science.gov (United States)

    Oswald, P; Saloppé, X; Ducro, C; Macquet, D; Cornu, P-J; Pham, T; Delaunoit, B

    2017-05-01

    In Belgium, the law of "social defense" stipulates that an accused "which is either in a state of dementia or in a serious state of mental disturbance or mental deficiency, incapable of controlling his actions" can be interned. The establishment of social defense (ESD) in Tournai (Belgium) hosts 350 inmates. In collaboration with the Centre for research in social defense, we organized a systematic assessment of patients interned in ESD. This is the first study evaluating prospectively this population. Of the total, 229 patients signed informed consent. Different scales of assessment (MINI, WAIS-III, SCID II) were used. Descriptive analyzes were applied (SPSS version 12). We show that 48.8 % of our participants had committed a sexual offense (rape or attempted rape, indecent assault, public outrage or mixed). The average intelligence quotient is 71.4. According to the MINI, 33.2 % of participants showed no psychiatric disorder. Among psychiatric disorders, psychotic disorders are the most represented (37.4 %). According to the SCID, personality disorders were absent in 26.8 % of our participants. Most of the axis II disorders are represented personality disorders related to cluster B (57.3 %) mainly with antisocial personality disorder (37.9 %). These data demonstrate the significant heterogeneity of our sample and the need for the establishment of specific care routes to each subpopulation. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  14. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  15. Local differences in parasitism and competition shape defensive investment in a polymorphic eusocial bee.

    Science.gov (United States)

    Segers, Francisca H I D; von Zuben, Lucas; Grüter, Christoph

    2016-02-01

    Many colonial animals rely for their defense on a soldier caste. Adaptive colony demography theory predicts that colonies should flexibly adjust the investment in different worker castes depending on the colony needs. For example, colonies should invest more in defensive workers (e.g., soldiers) in dangerous environments. However, evidence for this prediction has been mixed. We combined descriptive and experimental approaches to examine whether defensive investment and worker size are adjusted to local ecology in the only known bee with polymorphic workers, Tetragonisca angustula. Colonies of this species are defended by a morphologically specialized soldier caste. Our study included three populations that differed in the density of food competition and the occurrence of a parasitic robber bee. We found that colonies coexisting with robber bees had on average 43% more soldiers defending the nest entrance, while colonies facing stronger foraging competition had soldiers that were -6-7% smaller. We then experimentally relocated colonies to areas with different levels of competition. When released from intense food competition, body sizes of guards and foragers increased. After introducing chemical robber bee cues at nest entrances, we found both a short-term and a long-term up-regulation of the number of soldiers defending the colony. Active soldier numbers remained high after the experiment for a duration equivalent to 2-3 worker life spans. How information about past parasite threat is stored in the colony is currently unknown. In summary, T. angustula adjusts both the number and the body size of active soldiers to local ecological conditions. Competitor density also affects forager (or minor) size, an important colony trait with potential community ecological consequences. Our study supports adaptive colony demography theory in a eusocial bee and highlights the importance of colony threats and competition as selective forces shaping colony phenotype.

  16. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  17. 15 CFR Notes Applicable to State... - Notes applicable to State of Understanding related to Medical Equipment:

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Notes applicable to State of Understanding related to Medical Equipment: applicable Notes applicable to State of Understanding related to Medical Equipment: Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY,...

  18. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  19. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  20. Notes on Loricata (Mollusca) 11-14

    NARCIS (Netherlands)

    Kaas, P.

    1985-01-01

    Four new species of chitons (Mollusca, Polyplacophora) are described, viz Leptochiton (L.) dispersus and L. (L.) permodestus from Transkei, L. (L.) meiringae from the eastern Cape Province, S Africa (note 11) and Ischnochiton (Stenosemus) vanbellei from the Mediterranean Sea (note 14). New records

  1. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  2. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  3. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  4. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  5. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  6. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  7. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  8. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  9. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  10. SAFETY INSTRUCTION AND SAFETY NOTE

    CERN Multimedia

    TIS Secretariat

    2002-01-01

    Please note that the SAFETY INSTRUCTION N0 49 (IS 49) and the SAFETY NOTE N0 28 (NS 28) entitled respectively 'AVOIDING CHEMICAL POLLUTION OF WATER' and 'CERN EXHIBITIONS - FIRE PRECAUTIONS' are available on the web at the following urls: http://edms.cern.ch/document/335814 and http://edms.cern.ch/document/335861 Paper copies can also be obtained from the TIS Divisional Secretariat, email: TIS.Secretariat@cern.ch

  11. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  12. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  13. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  14. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  15. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  16. Lactobacillus salivarius reverse diabetes-induced intestinal defense impairment in mice through non-defensin protein.

    Science.gov (United States)

    Chung, Pei-Hsuan; Wu, Ying-Ying; Chen, Pei-Hsuan; Fung, Chang-Phone; Hsu, Ching-Mei; Chen, Lee-Wei

    2016-09-01

    Altered intestinal microbiota and subsequent endotoxemia play pathogenic roles in diabetes. We aimed to study the mechanisms of intestinal defense impairment in type 1 diabetes and the effects of Lactobacillus salivarius as well as fructooligosaccharides (FOS) supplementation on diabetes-induced bacterial translocation. Alterations in the enteric microbiome, expression of mucosal antibacterial proteins and bacteria-killing activity of the intestinal mucosa in streptozotocin (STZ)-induced diabetic mice and Ins2(Akita) mice were investigated. The effects of dead L. salivarius (2×10(8)CFU/ml) and FOS (250 mg per day) supplementation for 1 week on endotoxin levels and Klebsiella pneumoniae translocation were also examined. Finally, germ-free mice were cohoused with wild-type or Ins2(Akita) mice for 2 weeks to examine the contribution of microbiota on the antibacterial protein expression. STZ-induced diabetic mice developed intestinal defense impairment as demonstrated by decreased mucosal bacteria-killing activity; reduction of non-defensin family proteins, such as Reg3β, Reg3γ, CRP-ductin and RELMβ, but not the defensin family proteins; and increased bacterial translocation. Intestinal bacteria overgrowth, enteric dysbiosis and increased intestinal bacterial translocation, particularly pathogenic K. pneumoniae in STZ-induced diabetic mice and Ins2(Akita) mice, were noted. Treating diabetic mice with dead L. salivarius or FOS reversed enteric dysbiosis, restored mucosal antibacterial protein and lessened endotoxin levels as well as K. pneumoniae translocation. Moreover, germ-free mice cohoused with wild-type mice demonstrated more intestinal Reg3β and RELMβ expression than those cohoused with Ins2(Akita) mice. These results indicate that hyperglycemia induces enteric dysbiosis, reduction of non-defensin proteins as well as bacteria-killing activity of the intestinal mucosa and intestinal defense impairment. Reversal of enteric dysbiosis with dead L. salivarius or

  17. Please note

    CERN Multimedia

    2006-01-01

    Members of the personnel are invited to take note that only parcels corresponding to official orders or contracts will be handled at CERN. Individuals are not authorised to have private merchandise delivered to them at CERN and private deliveries will not be accepted by the Goods Reception services. Thank you for your understanding. (Version française la semaine prochaine.)

  18. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  19. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  20. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  1. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  2. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  3. Electronic health records improve clinical note quality.

    Science.gov (United States)

    Burke, Harry B; Sessums, Laura L; Hoang, Albert; Becher, Dorothy A; Fontelo, Paul; Liu, Fang; Stephens, Mark; Pangaro, Louis N; O'Malley, Patrick G; Baxi, Nancy S; Bunt, Christopher W; Capaldi, Vincent F; Chen, Julie M; Cooper, Barbara A; Djuric, David A; Hodge, Joshua A; Kane, Shawn; Magee, Charles; Makary, Zizette R; Mallory, Renee M; Miller, Thomas; Saperstein, Adam; Servey, Jessica; Gimbel, Ronald W

    2015-01-01

    The clinical note documents the clinician's information collection, problem assessment, clinical management, and its used for administrative purposes. Electronic health records (EHRs) are being implemented in clinical practices throughout the USA yet it is not known whether they improve the quality of clinical notes. The goal in this study was to determine if EHRs improve the quality of outpatient clinical notes. A five and a half year longitudinal retrospective multicenter quantitative study comparing the quality of handwritten and electronic outpatient clinical visit notes for 100 patients with type 2 diabetes at three time points: 6 months prior to the introduction of the EHR (before-EHR), 6 months after the introduction of the EHR (after-EHR), and 5 years after the introduction of the EHR (5-year-EHR). QNOTE, a validated quantitative instrument, was used to assess the quality of outpatient clinical notes. Its scores can range from a low of 0 to a high of 100. Sixteen primary care physicians with active practices used QNOTE to determine the quality of the 300 patient notes. The before-EHR, after-EHR, and 5-year-EHR grand mean scores (SD) were 52.0 (18.4), 61.2 (16.3), and 80.4 (8.9), respectively, and the change in scores for before-EHR to after-EHR and before-EHR to 5-year-EHR were 18% (pquality scores significantly improved over the 5-year time interval. The EHR significantly improved the overall quality of the outpatient clinical note and the quality of all its elements, including the core and non-core elements. To our knowledge, this is the first study to demonstrate that the EHR significantly improves the quality of clinical notes. © The Author 2014. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  4. Cognition and Thinking on the Essence of Nutrient and Defense%对营卫实质的认识与思考

    Institute of Scientific and Technical Information of China (English)

    丁元庆

    2017-01-01

    Nutrient and defense can resist the pathogenic qi together ,which is related to the immunity. ⑦Nutrient and defense travel yang during the day and travel yin at night ,which is the basis for sleep. ⑧Descriptions about dysfunctions of nutrient and defense in Neijing are similar to the peripheral nerve disorders. "Unable to move" and "numbness" are the dysfunctions of movement and sensation respec-tively. The pathogeneses are the abnormality of nutrient and defense ,impairment of mental activity and ob-stacle of pathways. ⑨Nutrient and defense are the material basis for muscular development and movement.⑩Nutrient,defense and zangfu organs depend on each other. (11)Nutrient and defense are the basic material for mental activities. (12)Nutrient and defense have close relationship with daily activities and dysfunction of nutrient and defense is the basis for the onset of chronic diseases.

  5. Notes on Contributors

    African Journals Online (AJOL)

    NOTES ON CONTRIBUTORS. Samuel AMOAKO, Associate Researcher, South African Research Unit in Social Change. Contact Details: C/o Lucinda Bercony, Humanities Research Village (House No. 3). University of Johannesburg, P. O. Box 524. Bunting Road Campus, Auckland Park, 2006.

  6. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  7. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  8. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  9. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  10. Description os surface quadrupole oscillations of heateU spherical nuclei in the Brownian movement approximation

    International Nuclear Information System (INIS)

    Svin'in, I.R.

    1982-01-01

    Description of collective phenomena in heated nuclei within the framework of the Brownian approximation may be conditionally divided into two parts: 1) solution of the problem for some realization of a random force, 2) averaging in a set of all the possible realizations. Results of the present work are setted the first part of the problem in the case of surface quadrupole oscillations of spherical heated nuclei. Quadrupole surface oscillations of heated spherical nuclei are considered in the Brownian motion approximation. The integrals of motion are constructed taking into account the energy and angular momentum conservations for the nucleus in the process of relaxation of the collective excitations. Wave functions are obtained for states having definite values of the integrals of motion in the phonon representation. It is noted that the description scheme developed is easily used with respect to other multipolarity oscillations

  11. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  12. Distinguishing Features and Similarities Between Descriptive Phenomenological and Qualitative Description Research.

    Science.gov (United States)

    Willis, Danny G; Sullivan-Bolyai, Susan; Knafl, Kathleen; Cohen, Marlene Z

    2016-09-01

    Scholars who research phenomena of concern to the discipline of nursing are challenged with making wise choices about different qualitative research approaches. Ultimately, they want to choose an approach that is best suited to answer their research questions. Such choices are predicated on having made distinctions between qualitative methodology, methods, and analytic frames. In this article, we distinguish two qualitative research approaches widely used for descriptive studies: descriptive phenomenological and qualitative description. Providing a clear basis that highlights the distinguishing features and similarities between descriptive phenomenological and qualitative description research will help students and researchers make more informed choices in deciding upon the most appropriate methodology in qualitative research. We orient the reader to distinguishing features and similarities associated with each approach and the kinds of research questions descriptive phenomenological and qualitative description research address. © The Author(s) 2016.

  13. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  14. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  15. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  16. Clinical Note Creation, Binning, and Artificial Intelligence

    OpenAIRE

    Deliberato, Rodrigo Oct?vio; Celi, Leo Anthony; Stone, David J

    2017-01-01

    The creation of medical notes in software applications poses an intrinsic problem in workflow as the technology inherently intervenes in the processes of collecting and assembling information, as well as the production of a data-driven note that meets both individual and healthcare system requirements. In addition, the note writing applications in currently available electronic health records (EHRs) do not function to support decision making to any substantial degree. We suggest that artifici...

  17. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  18. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  19. Observing professionals taking notes on screen

    NARCIS (Netherlands)

    Melenhorst, M.S.

    2005-01-01

    In this study 38 participants wrote a piece of advice based on reading and annotating information from an extensive Web site. Half of the participants took notes in a separate window, the other half used an advanced annotation tool. In text annotations were far more used than separate notes. The

  20. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    Science.gov (United States)

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  1. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  2. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  3. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  4. Technical note on drainage systems

    DEFF Research Database (Denmark)

    Bentzen, Thomas Ruby

    This technical note will present simple but widely used methods for the design of drainage systems. The note will primarily deal with surface water (rainwater) which on a satisfactorily way should be transport into the drainage system. Traditional two types of sewer systems exist: A combined system......, where rainwater and sewage is transported in the same pipe, and a separate system where the two types of water are transported in individual pipe. This note will only focus on the separate rain/stormwater system, however, if domestic sewage should be included in the dimensioning procedure, it......’s not major different than described below - just remember to include this contribution for combined systems where the surface water (rain) and sewage are carried in the same pipes in the system and change some of the parameters for failure allowance (this will be elaborated further later on). The technical...

  5. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  6. Using Guided Notes to Enhance Instruction for All Students

    Science.gov (United States)

    Konrad, Moira; Joseph, Laurice M.; Itoi, Madoka

    2011-01-01

    Taking notes from lectures or reading material can be challenging, especially for those who have learning disabilities. An alternative to traditional note-taking is a method called "guided notes," which has been found to improve the accuracy of students' notes, increase the frequency of student responses, and improve students' quiz and test…

  7. Stalin and Marxism: a research note

    NARCIS (Netherlands)

    van Ree, E.

    1997-01-01

    This article concerns the research done by the author in Stalin‘s private library. The notes made in the works of Marx, Engels and Lenin suggest that until the end of his life Stalin felt himself in general agreement with these "classics." The choice of books and the notes support the thesis that,

  8. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  9. Is testing a more effective learning strategy than note-taking?

    Science.gov (United States)

    Rummer, Ralf; Schweppe, Judith; Gerst, Kathleen; Wagner, Simon

    2017-09-01

    The testing effect is both robust and generalizable. However, most of the underlying studies compare testing to a rather ineffective control condition: massed repeated reading. This article therefore compares testing with note-taking, which has been shown to be more effective than repeated reading. Experiment 1 is based on a 3 × 3 between-participants design with the factors learning condition (repeated reading vs. repeated testing vs. repeated note-taking) and final test delay (5 min vs. 1 week vs. 2 weeks). It shows that in the immediate condition, learning performance is best after note-taking. After 1 week, both the note-taking and the testing groups outperform the rereading group, and after 2 weeks, testing is superior to both note-taking and rereading. Since repeated notetaking may not be the most effective (and common) operationalization of note-taking, Experiment 2 contrasts repeated testing with 2 other note-taking conditions: note-taking plus note-reading and note-taking plus testing (with only a 2-week final test delay). Both conditions that include a testing phase result in better long-term learning than note-taking plus note-reading. In summary, our findings indicate that-in the long run-testing is a powerful learning tool both in isolation and in combination with note-taking. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  11. EVALUATION OF STUDENT'S NOTES IN A BLENDED LEARNING COURSE

    OpenAIRE

    Minoru Nakayama; Kouichi Mutsuura; Hiroh Yamamoto

    2011-01-01

    Student’s notes are evaluated to trace their learning process in a blended learning course, and the factors affecting the quality of these notes are discussed. As individual note-taking performance may be based on student’s characteristics, these contributions are also examined. Some factors about per-sonality and the learning experience are sig-nificant, and positively affect the grades given to notes. Lexical features of notes tak-en were extracted using a text analysis tech-nique, and ...

  12. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  13. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  14. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  15. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  16. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  17. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  18. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  19. [Natural Orifice Transluminal Endoscopic Surgery (NOTES)].

    Science.gov (United States)

    Kim, Yong Sik; Kim, Chul Young; Chun, Hoon Jai

    2008-03-01

    Recently, the field of gastrointestinal endoscopy is developing rapidly. Once limited to the gastroinstestinal lumen, the endoscopic technology is now breaking the barriers and extending its boundary to peritoneal and pleural space. In 2004, Dr. Kalloo, a gastroenterologist, observed intraperitoneal organs of a pig using a conventional endoscope through the stomach wall. Since then, new endoscopic technique of intraperitoneal intervention with transluminal approach named the Natural Orifice Transluminal Endoscopic Surgery or NOTES has been introduced. NOTES reaches the target organ by inserting the endoscope through a natural orifice (e.g. mouth, anus, vagina, urethra) and entering the peritoneal lumen by means of making an incision on the luminal wall. After a series of successful experiences in animal studies, NOTES are now being tried on human subjects. There are still many obstacles to overcome, but bright future for this new technology is expected because of its proposed advantages of less pain, lower complication rate, short recovery time, and scarless access. In this review, we plan to learn about NOTES.

  20. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  1. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  2. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  3. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  4. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  5. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  6. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  7. Evaluating the impact of patients' online access to doctors' visit notes: designing and executing the OpenNotes project

    Directory of Open Access Journals (Sweden)

    Leveille Suzanne G

    2012-04-01

    Full Text Available Abstract Background Providers and policymakers are pursuing strategies to increase patient engagement in health care. Increasingly, online sections of medical records are viewable by patients though seldom are clinicians' visit notes included. We designed a one-year multi-site trial of online patient accessible office visit notes, OpenNotes. We hypothesized that patients and primary care physicians (PCPs would want it to continue and that OpenNotes would not lead to significant disruptions to doctors' practices. Methods/Design Using a mixed methods approach, we designed a quasi-experimental study in 3 diverse healthcare systems in Boston, Pennsylvania, and Seattle. Two sites had existing patient internet portals; the third used an experimental portal. We targeted 3 key areas where we hypothesized the greatest impacts: beliefs and attitudes about OpenNotes, use of the patient internet portals, and patient-doctor communication. PCPs in the 3 sites were invited to participate in the intervention. Patients who were registered portal users of participating PCPs were given access to their PCPs' visit notes for one year. PCPs who declined participation in the intervention and their patients served as the comparison groups for the study. We applied the RE-AIM framework to our design in order to capture as comprehensive a picture as possible of the impact of OpenNotes. We developed pre- and post-intervention surveys for online administration addressing attitudes and experiences based on interviews and focus groups with patients and doctors. In addition, we tracked use of the internet portals before and during the intervention. Results PCP participation varied from 19% to 87% across the 3 sites; a total of 114 PCPs enrolled in the intervention with their 22,000 patients who were registered portal users. Approximately 40% of intervention and non-intervention patients at the 3 sites responded to the online survey, yielding a total of approximately 38

  8. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  9. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  10. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  11. Note-taking in the employment interview: effects on recall and judgments.

    Science.gov (United States)

    Middendorf, Catherine Houdek; Macan, Therese Hoff

    2002-04-01

    Although note-taking in the employment interview is highly recommended, little research has examined its effects. This study investigated the effects of note-taking styles, review of the notes, and content of the notes on participants' cued recall of information and decisions made from videotaped employment interviews. Note-taking increased recall accuracy but not judgment accuracy. Being able to review notes resulted in increased judgment accuracy for those taking conventional-style notes. The content of the notes also had important implications for conventional note-takers, suggesting some benefits of recording notes using the key-points style. The findings suggest that the act of note-taking may be more important for memory and legal reasons than for improving the decisions made by interviewers.

  12. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  13. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  14. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  15. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  16. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  17. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  18. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  19. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  20. The role of defensive ecological interactions in the evolution of conotoxins.

    Science.gov (United States)

    Prashanth, J R; Dutertre, S; Jin, A H; Lavergne, V; Hamilton, B; Cardoso, F C; Griffin, J; Venter, D J; Alewood, P F; Lewis, R J

    2016-01-01

    Venoms comprise of complex mixtures of peptides evolved for predation and defensive purposes. Remarkably, some carnivorous cone snails can inject two distinct venoms in response to predatory or defensive stimuli, providing a unique opportunity to study separately how different ecological pressures contribute to toxin diversification. Here, we report the extraordinary defensive strategy of the Rhizoconus subgenus of cone snails. The defensive venom from this worm-hunting subgenus is unusually simple, almost exclusively composed of αD-conotoxins instead of the ubiquitous αA-conotoxins found in the more complex defensive venom of mollusc- and fish-hunting cone snails. A similarly compartmentalized venom gland as those observed in the other dietary groups facilitates the deployment of this defensive venom. Transcriptomic analysis of a Conus vexillum venom gland revealed the αD-conotoxins as the major transcripts, with lower amounts of 15 known and four new conotoxin superfamilies also detected with likely roles in prey capture. Our phylogenetic and molecular evolution analysis of the αD-conotoxins from five subgenera of cone snails suggests they evolved episodically as part of a defensive strategy in the Rhizoconus subgenus. Thus, our results demonstrate an important role for defence in the evolution of conotoxins. © 2015 John Wiley & Sons Ltd.

  1. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  2. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  3. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  4. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  5. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  6. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  7. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  8. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  9. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  10. Digital Note-Taking: Discussion of Evidence and Best Practices.

    Science.gov (United States)

    Grahame, Jason A

    2016-03-01

    Balancing active course engagement and comprehension with producing quality lecture notes is challenging. Although evidence suggests that handwritten note-taking may improve comprehension and learning outcomes, many students still self-report a preference for digital note-taking and a belief that it is beneficial. Future research is warranted to determine the effects on performance of digitally writing notes. Independent of the methods or software chosen, best practices should be provided to students with information to help them consciously make an educated decision based on the evidence and their personal preference. Optimal note-taking requires self-discipline, focused attention, sufficient working memory, thoughtful rewording, and decreased distractions. Familiarity with the tools and mediums they choose will help students maximize working memory, produce better notes, and aid in their retention of material presented.

  11. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  12. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  13. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  14. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  15. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  16. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  17. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  18. Gaz de France. Operation note

    International Nuclear Information System (INIS)

    2003-01-01

    This note was published for the public at the occasion of the admission to Euronext's Eurolist of the existing shares that make the capital of Gaz de France company, the French gas utility. The note gives some informations about Gaz de France activity, and about its strategy of development in the European gas market. Then it describes the offer relative to the opening of Gaz de France capital. Some selected financial data and some precision about the risk factors and the management of the company complete the document. (J.S.)

  19. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  20. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News