WorldWideScience

Sample records for defense information analysis

  1. Analysis of consolidating defense acquisition information on the Internet.

    OpenAIRE

    Trulock, Troy E.

    1997-01-01

    Approved for public release; distribution is unlimited The Internet began over 30 years ago as a method of providing vital military communications following a nuclear attack. Today, due to the introduction of the World Wide Web and recent commercial interests, the Internet has grown into a multimedia source of information, and has become overloaded with information. Acquisition professionals in both the government and civilian defense acquisition sectors are attempting to use the Internet ...

  2. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    ... that may threaten the critical information pathways of the armed forces An analysis of the history of computer information warfare reveals that there was an embarrassing lack of readiness and defense...

  3. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  4. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  5. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    Science.gov (United States)

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  6. 78 FR 70025 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-11-22

    ... and Procedures AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION... proposed information collection; (c) ways to enhance the quality, utility, and clarity of the information..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review...

  7. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  8. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  9. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  10. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  11. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  12. Defensive reactions to health-promoting information: an overview and implications for future research

    NARCIS (Netherlands)

    Riet, van 't J.P.; Ruiter, R.A.C.

    2013-01-01

    It is a common finding that recipients of threatening health-promoting information are motivated to dismiss or disregard the information, thus reacting defensively'. This article gives an overview of the literature on defensive reactions to health-promoting information. A distinction is made

  13. 78 FR 63462 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-10-24

    ... Relating to Organizational Conflict of Interest-Major Defense Acquisition Program; OMB Control Number 0704...] Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Organizational Conflict... submit comments, identified by OMB Control Number 0704-0477, using any of the following methods: [cir...

  14. 75 FR 26739 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Part 244...

    Science.gov (United States)

    2010-05-12

    ... Control Number 0704-0253) AGENCY: Defense Acquisition Regulations System, Department of Defense. ACTION... proposed information collection; (c) ways to enhance the quality, utility, and clarity of the information..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review...

  15. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  16. A Strategic Analysis of Information Sharing Among Cyber Attackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2015-10-01

    Full Text Available We build a game theory model where the market design is such that one firm invests in security to defend against cyber attacks by two hackers. The firm has an asset, which is allocated between the three market participants dependent on their contest success. Each hacker chooses an optimal attack, and they share information with each other about the firm’s vulnerabilities. Each hacker prefers to receive information, but delivering information gives competitive advantage to the other hacker. We find that each hacker’s attack and information sharing are strategic complements while one hacker’s attack and the other hacker’s information sharing are strategic substitutes. As the firm’s unit defense cost increases, the attack is inverse U-shaped and reaches zero, while the firm’s defense and profit decrease, and the hackers’ information sharing and profit increase. The firm’s profit increases in the hackers’ unit cost of attack, while the hackers’ information sharing and profit decrease. Our analysis also reveals the interesting result that the cumulative attack level of the hackers is not affected by the effectiveness of information sharing between them and moreover, is also unaffected by the intensity of joint information sharing. We also find that as the effectiveness of information sharing between hackers increases relative to the investment in attack, the firm’s investment in cyber security defense and profit are constant, the hackers’ investments in attacks decrease, and information sharing levels and hacker profits increase. In contrast, as the intensity of joint information sharing increases, while the firm’s investment in cyber security defense and profit remain constant, the hackers’ investments in attacks increase, and the hackers’ information sharing levels and profits decrease. Increasing the firm’s asset causes all the variables to increase linearly, except information sharing which is constant. We extend

  17. 78 FR 20624 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-04-05

    ... Identification Advance Shipment Notices AGENCY: Defense Acquisition Regulations System, Department of Defense (Do...) Whether the proposed collection of information is necessary for the proper performance of the functions of... at 252.211; Radio Frequency Identification Advance Shipment Notices, OMB Control Number 0704-0434...

  18. Reentrant phase transitions and defensive alliances in social dilemmas with informed strategies

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž

    2015-05-01

    Knowing the strategy of an opponent in a competitive environment conveys obvious evolutionary advantages. But this information is costly, and the benefit of being informed may not necessarily offset the additional cost. Here we introduce social dilemmas with informed strategies, and we show that this gives rise to two cyclically dominant triplets that form defensive alliances. The stability of these two alliances is determined by the rotation velocity of the strategies within each triplet. A weaker strategy in a faster rotating triplet can thus overcome an individually stronger competitor. Fascinating spatial patterns favor the dominance of a single defensive alliance, but enable also the stable coexistence of both defensive alliances in very narrow regions of the parameter space. A continuous reentrant phase transition reveals before unseen complexity behind the stability of strategic alliances in evolutionary social dilemmas.

  19. Supporting the Information-Centric 2001 Quadrennial Defense Review: The Case for an Information Service

    National Research Council Canada - National Science Library

    Costa, Robert

    2002-01-01

    Information Superiority is an overarching and integrating construct in both Joint Vision 2020 and the 2001 Quadrennial Defense Review and is codified in both the 2000 National Security Strategy (NSS...

  20. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    Science.gov (United States)

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  1. Information Analysis Centers in the Department of Defense. Revision

    Science.gov (United States)

    1987-07-01

    Combat Data Information Center (CDIC) and the Aircraft Survivability Model Repository ( ASMR ) into the Survivability/Vulnerability Information Analysis...Information Center (CDIC) and the Aircraft Survivability Model Respository ( ASMR ). The CDIC was a central repository for combat and test data related to...and ASMR were operated under the technical monitorship of the Flight Dynamics Laboratory at Wright-Patterson AFB, Ohio and were located in Flight

  2. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  3. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  4. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  5. 76 FR 5236 - 60-Day Notice of Proposed Information Collection: Form DS-4071, Export Declaration of Defense...

    Science.gov (United States)

    2011-01-28

    ... Information Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405... of technology. Abstract of proposed collection: Actual export of defense technical data and defense... DS-4071, Export Declaration of Defense Technical Data or Services; OMB Control Number 1405-0157...

  6. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  7. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  8. Simulating cyber warfare and cyber defenses: information value considerations

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2011-06-01

    Simulating cyber warfare is critical to the preparation of decision-makers for the challenges posed by cyber attacks. Simulation is the only means we have to prepare decision-makers for the inevitable cyber attacks upon the information they will need for decision-making and to develop cyber warfare strategies and tactics. Currently, there is no theory regarding the strategies that should be used to achieve objectives in offensive or defensive cyber warfare, and cyber warfare occurs too rarely to use real-world experience to develop effective strategies. To simulate cyber warfare by affecting the information used for decision-making, we modify the information content of the rings that are compromised during in a decision-making context. The number of rings affected and value of the information that is altered (i.e., the closeness of the ring to the center) is determined by the expertise of the decision-maker and the learning outcome(s) for the simulation exercise. We determine which information rings are compromised using the probability that the simulated cyber defenses that protect each ring can be compromised. These probabilities are based upon prior cyber attack activity in the simulation exercise as well as similar real-world cyber attacks. To determine which information in a compromised "ring" to alter, the simulation environment maintains a record of the cyber attacks that have succeeded in the simulation environment as well as the decision-making context. These two pieces of information are used to compute an estimate of the likelihood that the cyber attack can alter, destroy, or falsify each piece of information in a compromised ring. The unpredictability of information alteration in our approach adds greater realism to the cyber event. This paper suggests a new technique that can be used for cyber warfare simulation, the ring approach for modeling context-dependent information value, and our means for considering information value when assigning cyber

  9. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  10. A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support

    Science.gov (United States)

    Bambacus, Myra; Yang, Chaowei Phil; Leung, Ronald Y.; Barbee, Brent; Nuth, Joseph A.; Seery, Bernard; Jiang, Yongyao; Qin, Han; Li, Yun; Yu, Manzhu; hide

    2017-01-01

    A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support presentation discussing background, framework architecture, current results, ongoing research, conclusions.

  11. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    National Research Council Canada - National Science Library

    Franklin, Derek

    2002-01-01

    The threat to the Defense Information Infrastructure is growing Hackers have advanced in sophistication and the potential exists for an alliance of independent hackers and terrorist/criminal groups...

  12. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  13. ADTool: Security Analysis with Attack-Defense Trees

    NARCIS (Netherlands)

    Kordy, Barbara; Kordy, P.T.; Mauw, Sjouke; Schweitzer, Patrick; Joshi, Kaustubh; Siegle, Markus; Stoelinga, Mariëlle Ida Antoinette; d' Argenio, P.R.

    ADTool is free, open source software assisting graphical modeling and quantitative analysis of security, using attack–defense trees. The main features of ADTool are easy creation, efficient editing, and automated bottom-up evaluation of security-relevant measures. The tool also supports the usage of

  14. 78 FR 15935 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-03-13

    ... automated collection techniques or other forms of information technology. The Office of Management and... construction contract in Spain has adequate insurance coverage. Affected Public: Businesses or other for profit... construction contract in Spain. Kortnee Stewart, Editor, Defense Acquisition Regulations System. [FR Doc. 2013...

  15. National cyber defense high performance computing and analysis : concepts, planning and roadmap.

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Jason R.; Keliiaa, Curtis M.

    2010-09-01

    There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

  16. External Quality Control Review of the Defense Information Systems Agency Audit Organization

    Science.gov (United States)

    2012-08-07

    We are providing this report for your information and use. We have reviewed the system of quality control for the audit organization of the Defense...audit organization encompasses the audit organization’s leadership, emphasis on performing high quality work, and policies and procedures established

  17. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  18. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  19. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    International Nuclear Information System (INIS)

    Radulesscu, G.; Tang, J.S.

    2000-01-01

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M andO [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M andO 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M andQ 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M andO 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this

  20. DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER

    Energy Technology Data Exchange (ETDEWEB)

    G. Radulesscu; J.S. Tang

    2000-06-07

    The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable

  1. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  2. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  3. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  4. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  5. A risk-informed perspective on deterministic safety analysis of nuclear power plants

    International Nuclear Information System (INIS)

    Wan, P.T.

    2009-01-01

    In this work, the deterministic safety analysis (DSA) approach to nuclear safety is examined from a risk-informed perspective. One objective of safety analysis of a nuclear power plant is to demonstrate via analysis that the risks to the public from events or accidents that are within the design basis of the power plant are within acceptable levels with a high degree of assurance. This nuclear safety analysis objective can be translated into two requirements on the risk estimates of design basis events or accidents: the nominal risk estimate to the public must be shown to be within acceptable levels, and the uncertainty in the risk estimates must be shown to be small on an absolute or relative basis. The DSA approach combined with the defense-in-depth (DID) principle is a simplified safety analysis approach that attempts to achieve the above safety analysis objective in the face of potentially large uncertainties in the risk estimates of a nuclear power plant by treating the various uncertainty contributors using a stylized conservative binary (yes-no) approach, and applying multiple overlapping physical barriers and defense levels to protect against the release of radioactivity from the reactor. It is shown that by focusing on the consequence aspect of risk, the previous two nuclear safety analysis requirements on risk can be satisfied with the DSA-DID approach to nuclear safety. It is also shown the use of multiple overlapping physical barriers and defense levels in the traditional DSA-DID approach to nuclear safety is risk-informed in the sense that it provides a consistently high level of confidence in the validity of the safety analysis results for various design basis events or accidents with a wide range of frequency of occurrence. It is hoped that by providing a linkage between the consequence analysis approach in DSA with a risk-informed perspective, greater understanding of the limitation and capability of the DSA approach is obtained. (author)

  6. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  7. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  8. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  9. An Empirical Analysis of the Patterns in Defense Industry Consolidation and Their Subsequent Impact

    National Research Council Canada - National Science Library

    Hensel, Nayantara

    2007-01-01

    .... This paper explores the causes of the wave of defense mergers, as well as their impact. The analysis finds that the frequency of defense mergers is more strongly correlated with overall merger activity in the economy than with DoD outlays...

  10. Environmental information document defense waste processing facility

    International Nuclear Information System (INIS)

    1981-07-01

    This report documents the impact analysis of a proposed Defense Waste Processing Facility (DWPF) for immobilizing high-level waste currently being stored on an interim basis at the Savannah River Plant (SRP). The DWPF will process the waste into a form suitable for shipment to and disposal in a federal repository. The DWPF will convert the high-level waste into: a leach-resistant form containing above 99.9% of all the radioactivity, and a residue of slightly contaminated salt. The document describes the SRP site and environs, including population, land and water uses; surface and subsurface soils and waters; meteorology; and ecology. A conceptual integrated facility for concurrently producing glass waste and saltcrete is described, and the environmental effects of constructing and operating the facility are presented. Alternative sites and waste disposal options are addressed. Also environmental consultations and permits are discussed

  11. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  12. 77 FR 54367 - Sharing Information Between the Department of Veterans Affairs and the Department of Defense

    Science.gov (United States)

    2012-09-05

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 1 RIN 2900-AN95 Sharing Information Between the...) regulatory restriction on the sharing of certain medical information with the Department of Defense (DoD... economy of $100 million or more or adversely affect in a material way the economy, a sector of the economy...

  13. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  14. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  15. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  16. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  17. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  18. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  19. Discussion and practice of information work in defense enterprises or institutes at the basic level

    International Nuclear Information System (INIS)

    Hu Junyong

    2010-01-01

    With the advent of an epoch when national economy and society is information-based and information transmission is predominantly implemented through networks and information carrier is characterized by digitalisation, information workers in defense enterprises or institutes at the basic level are faced with unprecedented pressures and at the same time with new opportunities and challenges. The integration of information resources with library resources can bring the resources into play effectively and efficiently, thus being propitious to information work. Demand orientation and deepening of services are the foundations for the existence and development of information team or department in theses enterprise or institutes. Resources construction in terms of literature and qualified information workers is the foundation for information work and can safeguard the development of information work in these enterprises or institutes. (author)

  20. Defense Analysis Students' SNA Research Captures the Attention of SOUTHCOM Leadership

    OpenAIRE

    Dionne, Patrick

    2017-01-01

    News Stories Archive U.S. Army Majs. Matthew Bauer, Andrew Maggard and Robert Murray, all students at the Naval Postgraduate School’s (NPS) Defense Analysis department, had the opportunity to brief members of United States Southern Command (SOUTHCOM).

  1. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  2. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  3. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  4. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  5. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  6. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  8. Enhancing Safeguards through Information Analysis: Business Analytics Tools

    International Nuclear Information System (INIS)

    Vincent, J.; Midwinter, J.

    2015-01-01

    For the past 25 years the IBM i2 Intelligence Analysis product portfolio has assisted over 4,500 organizations across law enforcement, defense, government agencies, and commercial private sector businesses to maximize the value of the mass of information to discover and disseminate actionable intelligence that can help identify, investigate, predict, prevent, and disrupt criminal, terrorist, and fraudulent acts; safeguarding communities, organizations, infrastructures, and investments. The collaborative Intelligence Analysis environment delivered by i2 is specifically designed to be: · scalable: supporting business needs as well as operational and end user environments · modular: an architecture which can deliver maximum operational flexibility with ability to add complimentary analytics · interoperable: integrating with existing environments and eases information sharing across partner agencies · extendable: providing an open source developer essential toolkit, examples, and documentation for custom requirements i2 Intelligence Analysis brings clarity to complex investigations and operations by delivering industry leading multidimensional analytics that can be run on-demand across disparate data sets or across a single centralized analysis environment. The sole aim is to detect connections, patterns, and relationships hidden within high-volume, all-source data, and to create and disseminate intelligence products in near real time for faster informed decision making. (author)

  9. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  10. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Style Questionnaire-40 translated into French, but not validated, assessed defenses and defense style. Descriptive, comparative and correlational analysis was carried out using Statistica software - version 10. The alcohol-dependent people preferentially use emotion focused coping blame and less the problem focused coping humor. The highest immature defense is acting out. Correlational analyses confirm the presence of some significant relationships between defense style and some coping strategies. Thus, the mature style is the only defense style, which is linked with the problem focused strategy humor, and another one coping called distraction. Some singular relationships were found with these two dimensions of coping. Alcohol and drug disengagement show particularly strong relationships with immature defenses such as projection and somatization. Another singular result is indicated by a negative relationship between immature defenses autistic fantasy with the strategy expression of feelings. This study found a significant number of relationships between defensive styles, defenses and coping strategies. This research also highlights the value of an integrative approach of defense mechanisms for the analysis of defensive functioning of people with alcohol dependence. Indeed, the relationships between these elements are consistent and allow understanding the defensive operation as a whole to promote a new adapted means of support. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  11. 2003 annual report. Information and health, defense, energy

    International Nuclear Information System (INIS)

    2004-01-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  12. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  13. Defense Industry Restructuring: Updated Cost and Savings Information

    National Research Council Canada - National Science Library

    1998-01-01

    ...) the restructuring costs were allowable under the Federal Acquisition Regulation and (2) a DOD contracting officer determined the business combination would result in overall reduced costs to DOD or preserve a critical defense capability...

  14. Defense Waste Processing Facility staged operations: environmental information document

    International Nuclear Information System (INIS)

    1981-11-01

    Environmental information is presented relating to a staged version of the proposed Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The information is intended to provide the basis for an Environmental Impact Statement. In either the integral or the staged design, the DWPF will convert the high-level waste currently stored in tanks into: a leach-resistant form containing about 99.9% of all the radioactivity, and a residual, slightly contaminated salt, which is disposed of as saltcrete. In the first stage of the staged version, the insoluble sludge portion of the waste and the long lived radionuclides contained therein will be vitrified. The waste glass will be sealed in canisters and stored onsite until shipped to a Federal repository. In the second stage, the supernate portion of the waste will be decontaminated by ion exchange. The recovered radionuclides will be transferred to the Stage 1 facility, and mixed with the sludge feed before vitrification. The residual, slightly contaminated salt solution will be mixed with Portland cement to form a concrete product (saltcrete) which will be buried onsite in an engineered landfill. This document describes the conceptual facilities and processes for producing glass waste and decontaminated salt. The environmental effects of facility construction, normal operations, and accidents are then presented. Descriptions of site and environs, alternative sites and waste disposal options, and environmental consultations and permits are given in the base Environmental Information Document

  15. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  16. Financial Management: U.S. Army Corps of Engineers Financial Information Imported Into the Defense Departmental Reporting System - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul J; Peek, Marvin L; Armstrong, Jack L; Wenzel, Paul C; Furey, Kathleen A; Zimmerman, Craig W

    2004-01-01

    ... are: the Corps of Engineers Financial Management System, the Corps of Engineers Enterprise Management Information System, and the Defense Departmental Reporting System - Audited Financial Statements...

  17. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  18. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Root defense analysis against Fusarium oxysporum reveals new regulators to confer resistance

    Science.gov (United States)

    Chen, Yi Chung; Wong, Chin Lin; Muzzi, Frederico; Vlaardingerbroek, Ido; Kidd, Brendan N.; Schenk, Peer M.

    2014-01-01

    Fusarium oxysporum is a root-infecting fungal pathogen that causes wilt disease on a broad range of plant species, including Arabidopsis thaliana. Investigation of the defense response against this pathogen had primarily been conducted using leaf tissue and little was known about the root defense response. In this study, we profiled the expression of root genes after infection with F. oxysporum by microarray analysis. In contrast to the leaf response, root tissue did not show a strong induction of defense-associated gene expression and instead showed a greater proportion of repressed genes. Screening insertion mutants from differentially expressed genes in the microarray uncovered a role for the transcription factor ETHYLENE RESPONSE FACTOR72 (ERF72) in susceptibility to F. oxysporum. Due to the role of ERF72 in suppressing programmed cell death and detoxifying reactive oxygen species (ROS), we examined the pub22/pub23/pub24 U-box type E3 ubiquitin ligase triple mutant which is known to possess enhanced ROS production in response to pathogen challenge. We found that the pub22/23/24 mutant is more resistant to F. oxysporum infection, suggesting that a heightened innate immune response provides protection against F. oxysporum. We conclude that root-mediated defenses against soil-borne pathogens can be provided at multiple levels. PMID:24998294

  20. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    information accurately and in conformance with Generally Accepted Accounting Principles , to comply with Congressional requirements of the Chief Financial ...2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting

  1. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  2. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  3. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  4. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  5. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  6. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    Science.gov (United States)

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  7. A cause-defense approach to the understanding and analysis of common cause failures

    International Nuclear Information System (INIS)

    Paula, Henrique M.; Campbell, David J.; Parry, Gareth W.; Mitchell, Donald B.; Rasmuson, Dale M.

    1990-03-01

    For improved reliability and safety, nuclear power plants are designed with redundant safety systems, many of which also have redundant trains of equipment within the system. However, the very high reliability theoretically achievable through the use of redundancy is often compromised by single events that can individually render redundant components unavailable (common cause failure [CCF] events). As evidenced by the results of probabilistic risk assessments (PRAs) and by historical experience with nuclear power plant operations, CCF events are usually major contributors to the risk posed by nuclear power plant operation. Thus, it is important that PRAs recognize the potential for CCF events and realistically account for CCF contributions to system unavailability and plant risk. Much progress has been made over the years in the area of CCF analysis, including the development of both qualitative and quantitative analysis methods. Until now, however, CCF methodologies have not explicitly and systematically accounted for the impact of plant-specific defenses, such as design features and operational and maintenance policies, in place to reduce the likelihood of failure occurrences at nuclear power plants. Recognizing the importance of this issue, the NRC has funded a research effort that has focused on developing the cause-defense methodology for CCF analysis and prevention. This report presents the results of this research. Specifically, this report discusses the development of (1) procedures for identifying the potential for CCF events at individual nuclear power plants and (2) cause-defense matrices for analysis of CCF events. Also, new concepts and more precise definitions are introduced to enhance CCF terminology and interpretation of historical event data. (author)

  8. Issues with Access to Acquisition Data and Information in the Department of Defense: A Closer Look at the Origins and Implementation of Controlled Unclassified Information Labels and Security Policy

    Science.gov (United States)

    2016-12-19

    directly affect the access and utility of acquisition databases. The current information security environment does not establish a consistent... information ” without a nondisclosure agreement • proposing a legislative amendment to 10 U.S.C. 2320, which allows access to technical data for providing...ISSUES WITH Access to Acquisition Data and Information IN THE DEPARTMENT OF DEFENSE A Closer Look at the Origins and Implementation of

  9. Differential regulation of defense-related proteins in soybean during compatible and incompatible interactions between Phytophthora sojae and soybean by comparative proteomic analysis.

    Science.gov (United States)

    Jing, Maofeng; Ma, Hongyu; Li, Haiyang; Guo, Baodian; Zhang, Xin; Ye, Wenwu; Wang, Haonan; Wang, Qiuxia; Wang, Yuanchao

    2015-07-01

    Few proteomic studies have focused on the plant- Phytophthora interactions, our study provides important information regarding the use of proteomic methods for investigation of the basic mechanisms of plant-Phytophthora interactions. Phytophthora sojae is a fast-spreading and devastating pathogen that is responsible for root and stem rot in soybean crops worldwide. To better understand the response of soybean seedlings to the stress of infection by virulent and avirulent pathogens at the proteomic level, proteins extracted from the hypocotyls of soybean reference cultivar Williams 82 infected by P. sojae P6497 (race 2) and P7076 (race 19), respectively, were analyzed by two-dimensional gel electrophoresis. 95 protein spots were differently expressed, with 83 being successfully identified by matrix-assisted laser desorption/ionization time-of-flight mass spectrometry and subjected to further analysis. Based on the majority of the 83 defense-responsive proteins, and defense-related pathway genes supplemented by a quantitative reverse transcription PCR assay, a defense-related network for soybean infected by virulent and avirulent pathogens was proposed. We found reactive oxygen species (ROS) burst, the expression levels of salicylic acid (SA) signal pathway and biosynthesis of isoflavones were significantly up-regulated in the resistant soybean. Our results imply that following the P. sojae infection, ROS and SA signal pathway in soybean play the major roles in defense against P. sojae. This research will facilitate further investigation of the molecular regulatory mechanism of the defense response in soybean following infection by P. sojae.

  10. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  11. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  12. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  13. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1998-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods of cope with the concern. Common-mode failures have been a 'fact-of-life' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D and D) - coupled with the fact that hardware common-mode failures are often distributed in time - has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D and D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of common-mode failure analysis called 'defense-in-depth and diversity analysis' has been developed to identify possible common-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided. (author)

  14. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1997-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ''fact-of-life'' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D ampersand D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D ampersand D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ''defense-in-depth and diversity analysis'' has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided

  15. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  16. 32 CFR 903.10 - Information collections, records, and forms or information management tools (IMTS).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information collections, records, and forms or information management tools (IMTS). 903.10 Section 903.10 National Defense Department of Defense (Continued... Information collections, records, and forms or information management tools (IMTS). (a) Information...

  17. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  18. 26 CFR 301.6110-3 - Deletion of certain information in written determinations open to public inspection.

    Science.gov (United States)

    2010-04-01

    ... land to be purchased. (2) Information concerning national defense and foreign policy. Information... national defense or foreign policy and which is in fact properly classified pursuant to such order. (3... preferences. A clearly unwarranted invasion of personal privacy exists if from analysis of information...

  19. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  20. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  1. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  2. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  3. 32 CFR 285.5 - Information requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Information requirements. 285.5 Section 285.5 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DOD FREEDOM OF INFORMATION ACT (FOIA) PROGRAM § 285.5 Information...

  4. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  5. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  6. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  7. Lexical Link Analysis (LLA) Application: Improving Web Service to Defense Acquisition Visibility Environment (DAVE)

    Science.gov (United States)

    2015-05-01

    1 LEXICAL LINK ANALYSIS (LLA) APPLICATION: IMPROVING WEB SERVICE TO DEFENSE ACQUISITION VISIBILITY ENVIRONMENT(DAVE) May 13-14, 2015 Dr. Ying...REPORT DATE MAY 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Lexical Link Analysis (LLA) Application...Making 3 2 1 3 L L A Methods • Lexical Link Analysis (LLA) Core – LLA Reports and Visualizations • Collaborative Learning Agents (CLA) for

  8. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  9. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  10. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  11. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  12. A Management Case Analysis of the Department of Defense Contractor Risk Assessment Guide Program

    Science.gov (United States)

    1990-12-01

    ORGANIZATION ......... 17 1. Past Government Organization Problems... 17 2. Current Government Organization ......... 17 3. The Contractor’s Organizatin ...Program and urged CODSIA to take a leadership role in encouraging its members to participate. The DCAA [Ref ll:p. 45] informed defense contractors in...conferences, and through the leadership of officials including the Under Secretary of the Navy for Acquisition, DOD Comptroller General, DOD Inspector General

  13. 78 FR 36012 - 30-Day Notice of Proposed Information Collection: Export Declaration of Defense Technical Data or...

    Science.gov (United States)

    2013-06-14

    ... Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of... Declaration of Defense Technical Data or Services ACTION: Notice of request for public comment and submission... and brokering of defense articles, defense services and related technical data are licensed by the...

  14. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  15. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  16. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  17. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  18. Key attributes of the SAPHIRE risk and reliability analysis software for risk-informed probabilistic applications

    International Nuclear Information System (INIS)

    Smith, Curtis; Knudsen, James; Kvarfordt, Kellie; Wood, Ted

    2008-01-01

    The Idaho National Laboratory is a primary developer of probabilistic risk and reliability analysis (PRRA) tools, dating back over 35 years. Evolving from mainframe-based software, the current state-of-the-practice has led to the creation of the SAPHIRE software. Currently, agencies such as the Nuclear Regulatory Commission, the National Aeronautics and Aerospace Agency, the Department of Energy, and the Department of Defense use version 7 of the SAPHIRE software for many of their risk-informed activities. In order to better understand and appreciate the power of software as part of risk-informed applications, we need to recall that our current analysis methods and solution methods have built upon pioneering work done 30-40 years ago. We contrast this work with the current capabilities in the SAPHIRE analysis package. As part of this discussion, we provide information for both the typical features and special analysis capabilities, which are available. We also present the application and results typically found with state-of-the-practice PRRA models. By providing both a high-level and detailed look at the SAPHIRE software, we give a snapshot in time for the current use of software tools in a risk-informed decision arena

  19. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Price, D E; Durling, R L

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  20. Molecular Dynamics Simulation and Statistics Analysis Reveals the Defense Response Mechanism in Plants

    Science.gov (United States)

    Liu, Zhichao; Zhao, Yunjie; Zeng, Chen; Computational Biophysics Lab Team

    As the main protein of the bacterial flagella, flagellin plays an important role in perception and defense response. The newly discovered locus, FLS2, is ubiquitously expressed. FLS2 encodes a putative receptor kinase and shares many homologies with some plant resistance genes and even with some components of immune system of mammals and insects. In Arabidopsis, FLS2 perception is achieved by the recognition of epitope flg22, which induces FLS2 heteromerization with BAK1 and finally the plant immunity. Here we use both analytical methods such as Direct Coupling Analysis (DCA) and Molecular Dynamics (MD) Simulations to get a better understanding of the defense mechanism of FLS2. This may facilitate a redesign of flg22 or de-novo design for desired specificity and potency to extend the immune properties of FLS2 to other important crops and vegetables.

  1. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  2. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  3. The Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition Defensive Functioning Scale: a validity study.

    Science.gov (United States)

    Porcerelli, John H; Cogan, Rosemary; Markova, Tsveti; Miller, Kristen; Mickens, Lavonda

    2011-01-01

    We assess the convergent and predictive validity of the Defensive Functioning Scale (DFS) with measures of life events, including childhood abuse and adult partner victimization; dimensions of psychopathology, including axis I (depressive) and axis II (borderline personality disorder) symptoms; and quality of object relations. One hundred and ten women from a university-based urban primary care clinic completed a research interview from which defense mechanisms were assessed. The quality of object relations was also assessed from interview data. The women completed self-report measures assessing depression, borderline personality disorder symptoms, childhood physical and sexual abuse, and adult partner physical and sexual victimization. Inter-rater reliability of the scoring of the DFS levels was good. High adaptive defenses were positively correlated with the quality of object relations and pathological defenses were positively correlated with childhood and adult victimization and symptom measures. Although major image distorting defenses were infrequently used, they were robustly correlated with all study variables. In a stepwise multiple regression analysis, major image distorting defenses, depressive symptoms, and minor image distorting defenses significantly predict childhood victimization, accounting for 37% of the variance. In a second stepwise multiple regression analysis, borderline personality disorder symptoms and disavowal defenses combined to significantly predict adult victimization, accounting for 16% of the variance. The DFS demonstrates good convergent validity with axis I and axis II symptoms, as well as with measures of childhood and adult victimization and object relations. The DFS levels add nonredundant information to Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition beyond axis I and axis II. Copyright © 2011 Elsevier Inc. All rights reserved.

  4. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  5. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  6. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  7. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  8. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    Science.gov (United States)

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  9. 32 CFR 48.501 - General information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false General information. 48.501 Section 48.501 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN RETIRED SERVICEMAN'S FAMILY PROTECTION PLAN Annuity § 48.501 General information. Except as provided in...

  10. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  11. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  12. A qualitative content analysis of global health engagements in Peacekeeping and Stability Operations Institute's stability operations lessons learned and information management system.

    Science.gov (United States)

    Nang, Roberto N; Monahan, Felicia; Diehl, Glendon B; French, Daniel

    2015-04-01

    Many institutions collect reports in databases to make important lessons-learned available to their members. The Uniformed Services University of the Health Sciences collaborated with the Peacekeeping and Stability Operations Institute to conduct a descriptive and qualitative analysis of global health engagements (GHEs) contained in the Stability Operations Lessons Learned and Information Management System (SOLLIMS). This study used a summative qualitative content analysis approach involving six steps: (1) a comprehensive search; (2) two-stage reading and screening process to identify first-hand, health-related records; (3) qualitative and quantitative data analysis using MAXQDA, a software program; (4) a word cloud to illustrate word frequencies and interrelationships; (5) coding of individual themes and validation of the coding scheme; and (6) identification of relationships in the data and overarching lessons-learned. The individual codes with the most number of text segments coded included: planning, personnel, interorganizational coordination, communication/information sharing, and resources/supplies. When compared to the Department of Defense's (DoD's) evolving GHE principles and capabilities, the SOLLIMS coding scheme appeared to align well with the list of GHE capabilities developed by the Department of Defense Global Health Working Group. The results of this study will inform practitioners of global health and encourage additional qualitative analysis of other lessons-learned databases. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  13. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  14. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  15. Comparison of elastic and inelastic analysis and test results for the defense high level waste shipping cask

    International Nuclear Information System (INIS)

    Zimmer, A.; Koploy, M.A.; Madsen, M.M.

    1991-01-01

    In the early 1980s, the US DOE/Defense Programs (DOE/DP) initiated a project to develop a safe and efficient transportation system for defense high level waste (DHLW). A long-standing objective of the DHLW transportation project is to develop a truck cask that represents the leading edge of cask technology as well as fully complies with all applicable DOE, Nuclear Regulatory Commission, and DOT regulations. General Atomics designed the DHLW Truck Shipping Cask using state-of-the-art analytical techniques verified by model testing performed by Sandia National Labs. (SNL). The analytical techniques include two approaches, inelastic analysis and elastic analysis. This paper will compare the results of the two analytical approaches and with model testing results. The purpose of this work is to provide data to support licensing of the DHLW cask and to support the acceptance by the NRC of inelastic analysis as a tool in packaging design and licensing

  16. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  17. Control of Database Applications at the Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The Defense Finance and Accounting Service Financial Systems Organization, under the control of the Deputy Director for Information Management, Defense Finance and Accounting Service, is responsible...

  18. Material Accounting and Management Control Weaknesses in the Defense Agencies' FYs 1995 and 1996 Financial Information

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1997-01-01

    The primary audit objective was to summarize Defense agency accounting system weaknesses and related management control program weaknesses identified during audits of defense agencies' FYs 1995 and 1996 financial data...

  19. 32 CFR 635.10 - Release of information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Release of information. 635.10 Section 635.10 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Release of Information § 635.10 Release of information. (a) Release of information from Army...

  20. 77 FR 23322 - Proposed Information Collection (Report of General Information) Activity: Comment Request

    Science.gov (United States)

    2012-04-18

    ... Information. d. VA Form 21-0820c, Report of Defense Finance and Accounting Service (DFAS). e. VA Form 21-0820d.... VA Form 21-0820c, Report of Defense Finance and Accounting Service (DFAS)--2,500. e. VA Form 21-0820d... Nursing Home Information--30,000. d. VA Form 21-0820c, Report of Defense Finance and Accounting Service...

  1. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  2. NATO and U.S. Ballistic Missile Defense Programs: Divergent or Convergent Paths?

    National Research Council Canada - National Science Library

    Toms, Kevin E

    2008-01-01

    ...) information network to support the Theater Missile Defense (TMD) capabilities of specific Allies for the protection of forward deployed troops, and studies of the feasibility and political-military implications of Ballistic Missile Defense (BMD...

  3. Year 2000 Reporting for Defense Finance and Accounting Service Cleveland Center Systems

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this report, we evaluated whether DFAS: entered all required data elements into the Defense Integration Support Tools for each system, and verified that information in the Defense Integration Support Tools database was consistent...

  4. Canonical Information Analysis

    DEFF Research Database (Denmark)

    Vestergaard, Jacob Schack; Nielsen, Allan Aasbjerg

    2015-01-01

    is replaced by the information theoretical, entropy based measure mutual information, which is a much more general measure of association. We make canonical information analysis feasible for large sample problems, including for example multispectral images, due to the use of a fast kernel density estimator......Canonical correlation analysis is an established multivariate statistical method in which correlation between linear combinations of multivariate sets of variables is maximized. In canonical information analysis introduced here, linear correlation as a measure of association between variables...... for entropy estimation. Canonical information analysis is applied successfully to (1) simple simulated data to illustrate the basic idea and evaluate performance, (2) fusion of weather radar and optical geostationary satellite data in a situation with heavy precipitation, and (3) change detection in optical...

  5. Market Research Gathering Information About Commercial Products and Services

    National Research Council Canada - National Science Library

    1997-01-01

    DoD 5000.2-R, Mandatory Procedures for Major Defense Acquisition Programs and Major Automated Information System Acquisition Programs, requires that market research and analysis be conducted to determine...

  6. 77 FR 38397 - Agency Information Collection (Report of General Information) Activities Under OMB Review

    Science.gov (United States)

    2012-06-27

    ...-0820c, Report of Defense Finance and Accounting Service (DFAS). e. VA Form 21-0820d, Report of Lost... Information--2,500. d. VA Form 21-0820c, Report of Defense Finance and Accounting Service (DFAS)--2,500. e. VA..., Report of Nursing Home Information--30,000. d. VA Form 21-0820c, Report of Defense Finance and Accounting...

  7. 32 CFR 806b.54 - Information collections, records, and forms or information management tools (IMT).

    Science.gov (United States)

    2010-07-01

    ... information management tools (IMT). 806b.54 Section 806b.54 National Defense Department of Defense (Continued..., records, and forms or information management tools (IMT). (a) Information Collections. No information.../pubfiles/af/37/afman37-139/afman37-139.pdf. (c) Forms or Information Management Tools (Adopted and...

  8. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    International Nuclear Information System (INIS)

    Durling, Jr. R.L.; Price, D.E.

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  9. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  11. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  12. Attacking and defensive styles of play in soccer: analysis of Spanish and English elite teams.

    Science.gov (United States)

    Fernandez-Navarro, Javier; Fradua, Luis; Zubillaga, Asier; Ford, Paul R; McRobert, Allistair P

    2016-12-01

    The aim of this study was to define and categorise different styles of play in elite soccer and associated performance indicators by using factor analysis. Furthermore, the observed teams were categorised using all factor scores. Data were collected from 97 matches from the Spanish La Liga and the English Premier League from the seasons 2006-2007 and 2010-2011 using the Amisco® system. A total of 19 performance indicators, 14 describing aspects of attacking play and five describing aspects of defensive play, were included in the factor analysis. Six factors, representing 12 different styles of play (eight attacking and four defensive), had eigenvalues greater than 1 and explained 87.54% of the total variance. Direct and possession styles of play, defined by factor 1, were the most apparent styles. Factor analysis used the performance indicators to cluster each team's style of play. Findings showed that a team's style of play was defined by specific performance indicators and, consequently, teams can be classified to create a playing style profile. For practical implications, playing styles profiling can be used to compare different teams and prepare for opponents in competition. Moreover, teams could use specific training drills directed to improve their styles of play.

  13. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  14. 76 FR 5340 - Federal Advisory Committee; Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2011-01-31

    ... Hilton Washington Dulles Hotel, 13869 Park Center Road, Herndon, Virginia, 20171 FOR FURTHER INFORMATION... meeting registration are available online at the Defense Health Board (DHB) Web site: http://www.ha.osd... the Defense Health Board until the next open meeting. The Designated Federal Officer will review all...

  15. Contribution to the improvement of management in defense logistics

    OpenAIRE

    LJUBOJEVIC SRDJAN D.; ANDREJIC MARKO D.; DRAGOVIC NEBOJSA K.

    2013-01-01

    Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with inter...

  16. Defense IRM: Alternatives Should Be Considered in Developing the New Civilian Personnel System

    National Research Council Canada - National Science Library

    1999-01-01

    ... regional centers, and attempting to improve personnel management business processes. A key part of this initiative is Defense's development of a new information management system-the Defense Civilian Personnel Data System (DCPDs...

  17. Changing Manufacturing Technology and Jobs in Defense Industries.

    Science.gov (United States)

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  18. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  19. 32 CFR 1900.31 - Procedures for business information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Procedures for business information. 1900.31 Section 1900.31 National Defense Other Regulations Relating to National Defense CENTRAL INTELLIGENCE... Matters § 1900.31 Procedures for business information. (a) In general. Business information obtained by...

  20. 32 CFR 298.5 - Information requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Information requirements. 298.5 Section 298.5... OF INFORMATION ACT PROGRAM DEFENSE INVESTIGATIVE SERVICE (DIS) FREEDOM OF INFORMATION ACT PROGRAM § 298.5 Information requirements. The DIS Office of Information and Public Affairs is responsible for...

  1. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  2. The journal of medical chemical, biological and radiological defense, an update

    International Nuclear Information System (INIS)

    Price, B. B. S.; Peitersen, L.E.

    2009-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense (www.JMedCBR.org) is a peer-reviewed scientific online journal focusing on the biology, chemistry, physiology, toxicology and treatment of exposure to threat agents. JMedCBR provides a central international forum for the publication of current research and development information on medical chemical, biological and radiological defense, as well as training, doctrine, and problems related to chemical, biological and radiological casualties. JMedCBR is sponsored by the US Defense Threat Reduction Agency (DTRA) Chem-Bio Technologies Directorate as part of its scientific outreach program in chemical and biological defense solutions for the Department of Defense. In addition to scientific and medical research, JMedCBR hosts an archive of related papers from authors in the field. Although organized into annual issues, articles are published on the web continuously. The complete JMedCBR is published electronically and is made available to the scientific community free of charge. JMedCBR is committed to providing its readers with quality scientific information and critical analyses. All submissions are peer-reviewed by an editorial board of recognized and respected international scientists who represent expertise in different aspects of medical chemical, biological and radiological defense. Contributions to JMedCBR must be original works of the author(s) and must not have been previously published or simultaneously submitted to other publications. The author(s) transfer the copyright of articles published in JMedCBR to the journal. A copyright transfer form must accompany each manuscript submission. For more information on submitting to JMedCBR, see the Authors' Guide, available at http://www.jmedcbr.org/authorGuide.html.(author)

  3. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  4. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  5. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  6. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  7. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    International Nuclear Information System (INIS)

    Blanchard, A.

    1999-01-01

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  8. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  9. An Analysis of Defense Information and Information Technology Articles: A Sixteen-Year Perspective

    Science.gov (United States)

    2009-03-01

    exploratory,” or “subjective” ( Denzin & Lincoln , 2000). Existing Research This research is based on content analysis methodologies utilized by Carter...same codes ( Denzin & Lincoln , 2000). Different analysts should code the same text in a similar manner (Weber, 1990). Typically, researchers compute...chosen. Krippendorf recommends an agreement level of at least .70 (Krippendorff, 2004). Some scholars use a cut-off rate of .80 ( Denzin & Lincoln

  10. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  11. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  12. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    Department of Defense INSTRUCTION NUMBER 5525.19 May 4, 2016 USD(P&R) SUBJECT: DoD Identity Matching Engine for Security and Analysis...DoD Identity Management Capability Enterprise Services Application (IMESA) Access to FBI National Crime Information Center (NCIC) Files,” April 22...Coordinates with: (1) The USD(I) for oversight and maintenance responsibilities, and for changes to digital DoD personnel identity data and

  13. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike -Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike -Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...1999). Additionally, there are cultural impacts (Gordon & Gordon, 1999). A company choosing an Apple OS may have to wage a big fight against the

  14. Analysis of Government Accountability Office and Department of Defense Inspector General Reports and Commercial Sources on Service Contracts

    Science.gov (United States)

    2010-06-01

    Acquisition Research Program BIM Building Information Modeling COR Contracting Officer Representative DoD Department of Defense FPDS...WBS), performance work statements (PWS) and statement of work (SOW), market research, budget and cost estimates, determining contract type, and...contracting within this project. The recurrent best practices in contracting among all sources emphasized planning, defining requirements, market research

  15. Türk Savunma Sanayi Firmaları Vizyon ve Misyon İfadelerinin İçerik Analizi (The Content Analysis of Vision and Mission Statements in Turkish Defense Industry Firms

    Directory of Open Access Journals (Sweden)

    Metin OCAK

    2016-08-01

    Full Text Available In this research, components used in mission and vision statements by Turkish Defense Industry Firms and their relations with national defense industry guidance documents are examined. For this reason 87 vision and 79 mission statements which mentioned on the web pages of 148 Turkish Defense Industry Firms’ are taken into consideration. A qualitative research design phenomenology was used and the data were analyzed through content analysis in this study. At the end of the analysis, it is identified that there are common 14 components in vision statements and 13 common components in mission statements. Also it is discovered that some of the components are relevant with components mentioned in the national defense industry guidance documents.

  16. Department of Defense (DOD) Military Casualty/Wounded Warrior

    Data.gov (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  17. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  18. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  19. Defense In-Depth Accident Analysis Evaluation of Tritium Facility Bldgs. 232-H, 233-H, and 234-H

    Energy Technology Data Exchange (ETDEWEB)

    Blanchard, A.

    1999-05-10

    'The primary purpose of this report is to document a Defense-in-Depth (DID) accident analysis evaluation for Department of Energy (DOE) Savannah River Site (SRS) Tritium Facility Buildings 232-H, 233-H, and 234-H. The purpose of a DID evaluation is to provide a more realistic view of facility radiological risks to the offsite public than the bounding deterministic analysis documented in the Safety Analysis Report, which credits only Safety Class items in the offsite dose evaluation.'

  20. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  1. The role of defensive ecological interactions in the evolution of conotoxins.

    Science.gov (United States)

    Prashanth, J R; Dutertre, S; Jin, A H; Lavergne, V; Hamilton, B; Cardoso, F C; Griffin, J; Venter, D J; Alewood, P F; Lewis, R J

    2016-01-01

    Venoms comprise of complex mixtures of peptides evolved for predation and defensive purposes. Remarkably, some carnivorous cone snails can inject two distinct venoms in response to predatory or defensive stimuli, providing a unique opportunity to study separately how different ecological pressures contribute to toxin diversification. Here, we report the extraordinary defensive strategy of the Rhizoconus subgenus of cone snails. The defensive venom from this worm-hunting subgenus is unusually simple, almost exclusively composed of αD-conotoxins instead of the ubiquitous αA-conotoxins found in the more complex defensive venom of mollusc- and fish-hunting cone snails. A similarly compartmentalized venom gland as those observed in the other dietary groups facilitates the deployment of this defensive venom. Transcriptomic analysis of a Conus vexillum venom gland revealed the αD-conotoxins as the major transcripts, with lower amounts of 15 known and four new conotoxin superfamilies also detected with likely roles in prey capture. Our phylogenetic and molecular evolution analysis of the αD-conotoxins from five subgenera of cone snails suggests they evolved episodically as part of a defensive strategy in the Rhizoconus subgenus. Thus, our results demonstrate an important role for defence in the evolution of conotoxins. © 2015 John Wiley & Sons Ltd.

  2. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  3. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  4. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  5. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  6. High-throughput phenotyping allows for QTL analysis of defense, symbiosis and development-related traits

    DEFF Research Database (Denmark)

    Hansen, Nina Eberhardtsen

    -throughput phenotyping of whole plants. Additionally, a system for automated confocal microscopy aiming at automated detection of infection thread formation as well as detection of lateral root and nodule primordia is being developed. The objective was to use both systems in genome wide association studies and mutant...... the analysis. Additional phenotyping of defense mutants revealed that MLO, which confers susceptibility towards Blumeria graminis in barley, is also a prime candidate for a S. trifoliorum susceptibility gene in Lotus....

  7. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  8. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  9. 75 FR 75549 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-12-03

    ..., et al. Defense Federal Acquisition Regulation Supplement; Business Systems-- Definition and... Regulation Supplement; Business Systems--Definition and Administration (DFARS Case 2009-D038) AGENCY: Defense.... SUPPLEMENTARY INFORMATION: I. Background DoD published a proposed rule for Business Systems--Definition and...

  10. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges; Rapport annuel 2004. Defense, securite, energie, information, sante. Le CEA au coeur des grands defis europeens

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  11. Compilation of the FY 1998 Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    1999-01-01

    ...." The entity represents a consolidation of financial information from various Defense organizations and funds, including the Military Departments, which use the Treasury Index 97 symbol, also referred to as Department 97. The FY 1998 financial statements for Other Defense Organizations reported $45.2 billion in assets, $227.5 billion in liabilities, and $54.6 billion in budget authority.

  12. Defense Technical Information Center thesaurus

    Energy Technology Data Exchange (ETDEWEB)

    Dickert, J.H. [ed.] [comp.

    1996-10-01

    This DTIC Thesaurus provides a basic multidisciplinary subject term vocabulary used by DTIC to index and retrieve scientific and technical information from its various data bases and to aid DTIC`s users in their information storage and retrieval operations. It includes an alphabetical posting term display, a hierarchy display, and a Keywork Out of Context (KWOC) display.

  13. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  14. Analysis of Russian Federation Foreign Policy in the Field of International Information Security

    Directory of Open Access Journals (Sweden)

    Elena S. Zinovieva

    2014-01-01

    Full Text Available Information and communication technologies (ICT play an essential role in the improvement of the quality of life, economic and socio-political of individual countries and humanity in general. However, ICT development is fraught with new challenges and threats to international and national security. Interstate rivalry in the information sphere generates conflicts, an extreme form of which is an information war. Since 1998, the Russian initiative supports the international cooperation on information security at the global and regional level as well as within the framework of the bilateral relations. The article analyzes the characteristics of the global information society, which has a decisive influence on the international security in the information age, as well as international cooperation in this field. The analysis of Russian foreign policy initiatives in the field of international information security is also presented. Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. It's difficult to trace the source of information attacks and its consequences can be devastating and cause retaliation, including the use of conventional weapons. In this situation Russian approach, advocating for the development of the rules of conduct of States and demilitarization of information space in order to ensure its safety, seems urgent and relevant with the international situation.

  15. 75 FR 33237 - Defense Federal Acquisition Regulation Supplement; Contractor Insurance/Pension Review (DFARS...

    Science.gov (United States)

    2010-06-11

    ... Acquisition Regulation Supplement; Contractor Insurance/Pension Review (DFARS Case 2009-D025) AGENCY: Defense.../Pension Review from Procedures, Guidance, and Information to the Defense Acquisition Regulation Supplement..., February 23, 2006, moved requirements for Contractor Insurance/Pension Review (CIPR) from DFARS 242.7302 to...

  16. Simultaneous transcriptome analysis of Colletotrichum gloeosporioides and tomato fruit pathosystem reveals novel fungal pathogenicity and fruit defense strategies.

    Science.gov (United States)

    Alkan, Noam; Friedlander, Gilgi; Ment, Dana; Prusky, Dov; Fluhr, Robert

    2015-01-01

    The fungus Colletotrichum gloeosporioides breaches the fruit cuticle but remains quiescent until fruit ripening signals a switch to necrotrophy, culminating in devastating anthracnose disease. There is a need to understand the distinct fungal arms strategy and the simultaneous fruit response. Transcriptome analysis of fungal-fruit interactions was carried out concurrently in the appressoria, quiescent and necrotrophic stages. Conidia germinating on unripe fruit cuticle showed stage-specific transcription that was accompanied by massive fruit defense responses. The subsequent quiescent stage showed the development of dendritic-like structures and swollen hyphae within the fruit epidermis. The quiescent fungal transcriptome was characterized by activation of chromatin remodeling genes and unsuspected environmental alkalization. Fruit response was portrayed by continued highly integrated massive up-regulation of defense genes. During cuticle infection of green or ripe fruit, fungi recapitulate the same developmental stages but with differing quiescent time spans. The necrotrophic stage showed a dramatic shift in fungal metabolism and up-regulation of pathogenicity factors. Fruit response to necrotrophy showed activation of the salicylic acid pathway, climaxing in cell death. Transcriptome analysis of C. gloeosporioides infection of fruit reveals its distinct stage-specific lifestyle and the concurrent changing fruit response, deepening our perception of the unfolding fungal-fruit arms and defenses race. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  17. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  18. Human biomonitoring in civil defense; Humanbiomonitoring im Bevoelkerungsschutz

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Michael; Schmiechen, Katharina [Universitaetsmedizin Goettingen (Germany). Arbeits-, Sozial- und Umweltmedizin

    2012-07-01

    The booklet on human biomonitoring (HBM) in civil defense covers the following issues within two sections: (1) general part: definition and importance of human biomonitoring; application in civil defense; practice in a CBRN (chemical, biological, radiation, nuclear) scenario; sampling following a CBRN assignment; HBM for antidote administration; peculiarities of sampling in case of biological agents; microbiological detection procedure; human biomonitoring of radioactive metal isotopes. (2) Special part: substance profiles; list of HBM laboratories; list of poison information centers; questionnaire for exposure assessment in case of dangerous substance accidents; agreement for human biomonitoring examination.

  19. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  20. Defense Logistics: DOD Needs to Take Additional Actions to Address Challenges in Supply Chain Management

    Science.gov (United States)

    2011-07-01

    Jack E. Edwa appendix III. t rds Director, Defense Capabilities and Managemen Page 36 GAO-11-569 Defense Logistics List of Committees...Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302... operations . DOD faces asset visibility challenges due, in part, to a lack of interoperability among information technology

  1. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  2. 32 CFR 286.2 - DoD public information.

    Science.gov (United States)

    2010-07-01

    ..., consistent always with the legitimate public and private interests of the American people. A record requested... National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) FREEDOM OF INFORMATION ACT PROGRAM DOD FREEDOM OF INFORMATION ACT PROGRAM REGULATION General Provisions § 286...

  3. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  4. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  5. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  6. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    Science.gov (United States)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  7. Defense Industry Mergers and Monopoly Power: Analysis of Abnormal Earnings Using the Edwards-Bell-Ohlson Model

    National Research Council Canada - National Science Library

    Heisey, J

    1997-01-01

    Recent defense industry consolidation has created several large defense firms. As a result of merger activity with their suppliers and competitors, these firms account for an increasing percentage of sales to the Department of Defense...

  8. Defense Spending Databases for Countries in the Asia-Pacific Region: An Analysis and Comparison

    National Research Council Canada - National Science Library

    Reuning, Charles

    2001-01-01

    The purpose of this research was to identify and analyze a select number of unclassified databases that cover defense spending and other defense related criteria for countries in the Asia-Pacific region...

  9. Defense Logistics Agency Disposition Services Needs to Improve Demilitarization Program Self-Assessment Evaluations - Redacted

    Science.gov (United States)

    2016-12-20

    from mandatory disclosure under the Freedom of Information Act. Defense Logistics Agency Disposition Services Needs to Improve Demilitarization...Project No. D2016-D000RD-0057.000) │ i Results in Brief Defense Logistics Agency Disposition Services Needs to Improve Demilitarization Program Self...Assessment Evaluations Visit us at www.dodig.mil December 20, 2016 Objective Our audit objective was to determine whether the Defense Logistics Agency

  10. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  11. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  12. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  13. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  14. Early transcriptome analyses of Z-3-Hexenol-treated zea mays revealed distinct transcriptional networks and anti-herbivore defense potential of green leaf volatiles.

    Directory of Open Access Journals (Sweden)

    Jurgen Engelberth

    Full Text Available Green leaf volatiles (GLV, which are rapidly emitted by plants in response to insect herbivore damage, are now established as volatile defense signals. Receiving plants utilize these molecules to prime their defenses and respond faster and stronger when actually attacked. To further characterize the biological activity of these compounds we performed a microarray analysis of global gene expression. The focus of this project was to identify early transcriptional events elicited by Z-3-hexenol (Z-3-HOL as our model GLV in maize (Zea mays seedlings. The microarray results confirmed previous studies on Z-3-HOL -induced gene expression but also provided novel information about the complexity of Z-3-HOL -induced transcriptional networks. Besides identifying a distinct set of genes involved in direct and indirect defenses we also found significant expression of genes involved in transcriptional regulation, Ca(2+-and lipid-related signaling, and cell wall reinforcement. By comparing these results with those obtained by treatment of maize seedlings with insect elicitors we found a high degree of correlation between the two expression profiles at this early time point, in particular for those genes related to defense. We further analyzed defense gene expression induced by other volatile defense signals and found Z-3-HOL to be significantly more active than methyl jasmonate, methyl salicylate, and ethylene. The data presented herein provides important information on early genetic networks that are activated by Z-3-HOL and demonstrates the effectiveness of this compound in the regulation of typical plant defenses against insect herbivores in maize.

  15. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    National Research Council Canada - National Science Library

    Givens, Mark

    2004-01-01

    In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture...

  16. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  17. Defense Logistics: Department of Defense's Annual Report on the Status of Prepositioned Materiel and Equipment Can Be Enhanced to Better Inform Congress

    National Research Council Canada - National Science Library

    Solis, William M

    2008-01-01

    The Department of Defense (DOD) prepositions equipment at strategic locations around the world in order to field combat-ready forces in days, rather than the weeks it would take if equipment had to be moved from the United States...

  18. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  19. Defense or Development? A Decisive Question in Latin America

    National Research Council Canada - National Science Library

    Guarda, Esteban

    2008-01-01

    The purpose of this work is to inform the reader about the recent past, present, and future tendency in the Latin American countries regarding the balance of expenditures between defense and development...

  20. Strategy alternatives for homeland air and cruise missile defense.

    Science.gov (United States)

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  1. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    OpenAIRE

    Oleksandr Yu. Burov

    2016-01-01

    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  2. Economic considerations/comparisons for the disposal of defense high-level waste

    International Nuclear Information System (INIS)

    Leclaire, D.B.; Lazur, E.G.

    1985-01-01

    This paper provides a summary, in a generic sense, of the economic considerations and comparisons of permanent isolation of defense high-level waste (DHLW) in a licensed geologic repository. Topics considered include underground disposal, economic analysis, comparative evaluations, national defense, radioactive waste facilities, and licensing

  3. Massive activation of archaeal defense genes during viral infection.

    Science.gov (United States)

    Quax, Tessa E F; Voet, Marleen; Sismeiro, Odile; Dillies, Marie-Agnes; Jagla, Bernd; Coppée, Jean-Yves; Sezonov, Guennadi; Forterre, Patrick; van der Oost, John; Lavigne, Rob; Prangishvili, David

    2013-08-01

    Archaeal viruses display unusually high genetic and morphological diversity. Studies of these viruses proved to be instrumental for the expansion of knowledge on viral diversity and evolution. The Sulfolobus islandicus rod-shaped virus 2 (SIRV2) is a model to study virus-host interactions in Archaea. It is a lytic virus that exploits a unique egress mechanism based on the formation of remarkable pyramidal structures on the host cell envelope. Using whole-transcriptome sequencing, we present here a global map defining host and viral gene expression during the infection cycle of SIRV2 in its hyperthermophilic host S. islandicus LAL14/1. This information was used, in combination with a yeast two-hybrid analysis of SIRV2 protein interactions, to advance current understanding of viral gene functions. As a consequence of SIRV2 infection, transcription of more than one-third of S. islandicus genes was differentially regulated. While expression of genes involved in cell division decreased, those genes playing a role in antiviral defense were activated on a large scale. Expression of genes belonging to toxin-antitoxin and clustered regularly interspaced short palindromic repeat (CRISPR)-Cas systems was specifically pronounced. The observed different degree of activation of various CRISPR-Cas systems highlights the specialized functions they perform. The information on individual gene expression and activation of antiviral defense systems is expected to aid future studies aimed at detailed understanding of the functions and interplay of these systems in vivo.

  4. Design and Implementation of a Cyber-Defense Exercise

    OpenAIRE

    Adrian Furtuna

    2010-01-01

    Learning by practice is a very effective way of education in some activity domains, including information security. The article explores this idea by showing how a cyber-defense exercise can be designed and implemented in order to reach its educational goals.

  5. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  6. Economic Growth and Defense Spending in Greece, Turkey and Cyprus: Evidence from Cointegrated Panel Analysis

    Directory of Open Access Journals (Sweden)

    Stylianou Tasos

    2012-06-01

    Full Text Available This paper investigates the nexus between economic growth and defense spending for three adjacent countries, namely Greece, Turkey and Cyprus. Greece and Cyprus, members-countries of European Union spend much more money than other member countries of EU relatively to their GDP. Turkey is in accession negotiations with EU and is among the top 15 countries with the highest military expenditure. These three countries are particularly interesting case studies because of their high military burdens and the bad relations between them (Greece and Cyprus opposite Turkey. The empirical analysis is based on panel data analysis of data over the period 1960 – 2006.

  7. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 2. Nuclear Weapons Effects and Shelter.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    Basic information about nuclear weapons is presented so that their effects can be meaningfully related to the defensive countermeasures which will be most effective against them. Major topics include: (1) Explosive power of nuclear weapons, (2) Major effects of nuclear explosions, (3) Two basic types of nuclear explosions, (4) Contrast between air…

  8. 75 FR 22754 - Federal Advisory Committee; Department of Defense Board of Actuaries; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Board of Actuaries; Charter Renewal AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal... Department of Defense Board of Actuaries (hereafter referred to as the Board). FOR FURTHER INFORMATION... qualified professional actuaries who are members of the Society of Actuaries. Board members shall be...

  9. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  10. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  11. 77 FR 11495 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-02-27

    ... management, curricula, and methods of instructions, facilities, and other matters of interest. The Secretary... more than 10 members, who are eminent authorities in the fields of academia, business, national defense and security, the defense industry, and research and analysis. Not less than 50 percent of Board...

  12. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  13. Vaginal orgasm is associated with less use of immature psychological defense mechanisms.

    Science.gov (United States)

    Brody, Stuart; Costa, Rui Miguel

    2008-05-01

    Freud implied a link between inability to have a vaginal orgasm and psychosexual immaturity. Since Kinsey, many sexologists have asserted that no such link exists. However, empirical testing of the issue has been lacking. The objective was to determine the relationship between different sexual behavior triggers of female orgasm and use of immature psychological defense mechanisms. Women reported their past month frequency of different sexual behaviors and corresponding orgasm rates and completed the Defense Style Questionnaire (DSQ-40). The association between ability to have vaginal intercourse orgasm (versus clitoral orgasm) and the use of DSQ-40 immature psychological defense mechanisms (associated with various psychopathologies) was examined. In a sample of 94 healthy Portuguese women, vaginal orgasm (triggered solely by penile-vaginal intercourse) was associated with less use of DSQ-40 immature defenses. Vaginal orgasm was associated with less somatization, dissociation, displacement, autistic fantasy, devaluation, and isolation of affect. Orgasm from clitoral stimulation or combined clitoral-intercourse stimulation was not associated with less use of immature defenses, and was associated with more use of some immature defenses. In one regression analysis, more masturbation and less vaginal orgasm consistency made independent contributions to the statistical prediction of immature defenses. In another regression analysis, any use of extrinsic clitoral stimulation for intercourse orgasm, and lack of any vaginal orgasm, made independent contributions to the statistical prediction of immature defenses. Vaginally anorgasmic women had immature defenses scores comparable to those of established (depression, social anxiety disorder, panic disorder, and obsessive-compulsive disorder) outpatient psychiatric groups. Results were not confounded by social desirability responding or relationship quality. The results linking penile-vaginal orgasm with less use of immature

  14. 76 FR 38089 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Science.gov (United States)

    2011-06-29

    ... Defense Contract Audit Agency audit; (ii) By DoD Offices of the Inspector General as part of pending or on...-3 MA-4(6) SC-4. AC-3(4) Audit & Identification and MA-5 SC-7. Accountability. Authentication. AC-4... determined). [[Page 38095

  15. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  16. Defense.gov Special Report: Feds Feed Families

    Science.gov (United States)

    defense for civilian personnel policy. Story Mark McCaffrey Featured at FFF Rally Capital Area Food Bank community. For more information visit the Capital Area Food Bank. The Corporation for National and Community Feds Feed Families Website Capital Area Food Bank What Others Are Doing FFF People, Pets and Paper

  17. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  18. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  19. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  20. Antioxidant defense gene analysis in Brassica oleracea and Trifolium repens exposed to Cd and/or Pb.

    Science.gov (United States)

    Bernard, F; Dumez, S; Brulle, F; Lemière, S; Platel, A; Nesslany, F; Cuny, D; Deram, A; Vandenbulcke, F

    2016-02-01

    This study focused on the expression analysis of antioxidant defense genes in Brassica oleracea and in Trifolium repens. Plants were exposed for 3, 10, and 56 days in microcosms to a field-collected suburban soil spiked by low concentrations of cadmium and/or lead. In both species, metal accumulations and expression levels of genes encoding proteins involved and/or related to antioxidant defense systems (glutathione transferases, peroxidases, catalases, metallothioneins) were quantified in leaves in order to better understand the detoxification processes involved following exposure to metals. It appeared that strongest gene expression variations in T. repens were observed when plants are exposed to Cd (metallothionein and ascorbate peroxidase upregulations) whereas strongest variations in B. oleracea were observed in case of Cd/Pb co-exposures (metallothionein, glutathione transferase, and peroxidase upregulations). Results also suggest that there is a benefit to use complementary species in order to better apprehend the biological effects in ecotoxicology.

  1. 78 FR 13547 - Defense Federal Acquisition Regulation Supplement: Alleged Crimes By or Against Contractor Personnel

    Science.gov (United States)

    2013-02-28

    ... Contractor Personnel AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION... (FY) 2009 and expand coverage on contractor requirements and responsibilities relating to alleged crimes by or against contractor personnel. DATES: Effective February 28, 2013. FOR FURTHER INFORMATION...

  2. Proteomic analysis of the defense response of wheat to the powdery mildew fungus, Blumeria graminis f. sp. tritici.

    Science.gov (United States)

    Mandal, Md Siddikun Nabi; Fu, Ying; Zhang, Sheng; Ji, Wanquan

    2014-12-01

    Powdery mildew of wheat is caused by Blumeria graminis f. sp. tritici (Bgt). Although many wheat cultivars resistant to this disease have been developed, little is known about their resistance mechanisms. The aim of this study was to identify proteins showing changes in abundance during the resistance response of the wheat line N0308 infected by Bgt. In two-dimensional electrophoresis analyses, 45 spots on the gels showed significant changes in abundance at 24, 48, and 72 h after inoculation, as compared to non-inoculated plants. Of these 45 proteins, 44 were identified by mass spectrometry analysis using the NCBInr database of Triticum aestivum (26 spots) and closely related species in the Triticum genus (18 spots). These proteins were associated with the defense response, photosynthesis, metabolism, and other cellular processes in wheat. Most of the up-regulated proteins were identified as stress- and defense-related proteins. In particular, the product of a specific powdery mildew resistance gene (Pm3b and its homolog) and some other defense- and pathogenesis-related proteins were overexpressed. The resistance gene product mediates the immune response and coordinates other cellular processes during the resistance response to Bgt.

  3. 75 FR 12173 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Science.gov (United States)

    2010-03-15

    ... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...

  4. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  5. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  6. Data needs for common cause failure analysis

    International Nuclear Information System (INIS)

    Parry, G.W.; Paula, H.M.; Rasmuson, D.; Whitehead, D.

    1990-01-01

    The procedures guide for common cause failure analysis published jointly by USNRC and EPRI requires a detailed historical event analysis. Recent work on the further development of the cause-defense picture of common cause failures introduced in that guide identified the information that is necessary to perform the detailed analysis in an objective manner. This paper summarizes these information needs

  7. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Science.gov (United States)

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR...

  8. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  9. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  10. Defense.gov Special Report: Memorial Day 2012

    Science.gov (United States)

    information so we can address your issue or question. United States Department of Defense United States Veterans Past, Present on Memorial Day Obama: Memorial Day Honors the Fallen 'Flags In' Tradition Honors Blog: Everyone Can Find A Way to Honor our Service Members Over the past few years, I have been blessed

  11. Sanitization and Disposal of Excess Information Technology Equipment

    Science.gov (United States)

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  12. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  13. Biomechanical Analysis of Defensive Cutting Actions During Game Situations: Six Cases in Collegiate Soccer Competitions

    Directory of Open Access Journals (Sweden)

    Sasaki Shogo

    2015-06-01

    Full Text Available The strengths of interpersonal dyads formed by the attacker and defender in one-on-one situations are crucial for performance in team ball sports such as soccer. The purpose of this study was to analyze the kinematics of one-on-one defensive movements in soccer competitions, and determine the relationships between lower limb kinematics and the center of mass translation during cutting actions. Six defensive scenes in which a player was responding to an offender’s dribble attack were selected for analysis. To reconstruct the three-dimensional kinematics of the players, we used a photogrammetric model-based image-matching technique. The hip and knee kinematics were calculated from the matched skeleton model. In addition, the center of mass height was expressed as a ratio of each participant’s body height. The relationships between the center of mass height and the kinematics were determined by the Pearson’s product-moment correlation coefficient. The normalized center of mass height at initial contact was correlated with the vertical center of mass displacement (r = 0.832, p = 0.040 and hip flexion angle at initial contact (r = −0.823, p = 0.044. This suggests that the lower center of mass at initial contact is an important factor to reduce the downwards vertical center of mass translation during defensive cutting actions, and that this is executed primarily through hip flexion. It is therefore recommended that players land with an adequately flexed hip at initial contact during one-on-one cutting actions to minimize the vertical center of mass excursion.

  14. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  15. Crosstalk between endophytes and a plant host within information-processing networks

    Directory of Open Access Journals (Sweden)

    Kozyrovska N. O.

    2013-05-01

    Full Text Available Plants are heavily populated by pro- and eukaryotic microorganisms and represent therefore the tremendous complexity as a biological system. This system exists as an information-processing entity with rather complex processes of communication, occurring throughout the individual plant. The plant cellular information-proces- sing network constitutes the foundation for processes like growth, defense, and adaptation to the environment. Up to date, the molecular mechanisms, underlying perception, transfer, analysis, and storage of the endogenous and environmental information within the plant, remain to be fully understood. The associated microorganisms and their investment in the information conditioning are often ignored. Endophytes as plant partners are indispen- sable integrative part of the plant system. Diverse endophytic microorganisms comprise «normal» microbiota that plays a role in plant immunity and helps the plant system to survive in the environment (providing assistance in defense, nutrition, detoxification etc.. The role of endophytic microbiota in the processing of information may be presumed, taking into account a plant-microbial co-evolution and empirical data. Since the literature are be- ginning to emerge on this topic, in this article, I review key works in the field of plant-endophytes interactions in the context of information processing and represent the opinion on their putative role in plant information web under defense and the adaptation to changed conditions.

  16. Peptidoglycan from Fermentation By-Product Triggers Defense Responses in Grapevine

    Science.gov (United States)

    Chen, Yang; Takeda, Taito; Aoki, Yoshinao; Fujita, Keiko; Suzuki, Shunji; Igarashi, Daisuke

    2014-01-01

    Plants are constantly under attack from a variety of microorganisms, and rely on a series of complex detection and response systems to protect themselves from infection. Here, we found that a by-product of glutamate fermentation triggered defense responses in grapevine, increasing the expression of defense response genes in cultured cells, foliar chitinase activity, and resistance to infection by downy mildew in leaf explants. To identify the molecule that triggered this innate immunity, we fractionated and purified candidates extracted from Corynebacterium glutamicum, a bacterium used in the production of amino acids by fermentation. Using hydrolysis by lysozyme, a silkworm larva plasma detection system, and gel filtration analysis, we identified peptidoglycan as inducing the defense responses. Peptidoglycans of Escherichia coli, Bacillus subtilis, and Staphylococcus aureus also generated similar defensive responses. PMID:25427192

  17. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  18. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  19. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  1. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  2. Conflict and Withdrawal during Marital Interaction: The Roles of Hostility and Defensiveness.

    Science.gov (United States)

    Newton, Tamara L.; And Others

    1995-01-01

    Examined whether hostile and defensive personality characteristics contribute to conflict and withdrawal within marriage. Analysis of 90 newly wed couples' discussions showed that, among husbands, high levels of hostility combined with low levels of defensiveness accompanied increased conflict. This same personality pattern led to an increase in…

  3. Defense Forensic Enterprise: Assessment and Status Report Personnel Accounting Extract

    Science.gov (United States)

    2013-12-01

    pathology , forensic anthropology, forensic toxicology, and DNA analysis to iden- tify human remains. Per DOD Directive 5205.15E, the stakeholders fall...Defense Forensic Enterprise Assessment and Status Report Personnel Accounting Extract Christine A. Hughes • Jeffrey E. Chilton John J. Clifford • C...community-related sections from a CNA report titled, “Defense Forensic Enterprise Assessment and Status Report” [1]. The first sec- tion within this

  4. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  5. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  6. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    Science.gov (United States)

    1996-01-01

    security of the nation. The unicorn is the obvious symbol for this box. Even with a two percent of GDP or less defense budget, we will maintain our nuclear...systems is not going away. There are some unicorns in the defense herd and this would be a time to claim to be one. ACTIVITIES AND PERSONNEL Looking...macroeconomics and public finance is advisable. The subjects in the Forces and Force Analysis section will provide sufficient review of the technical

  7. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  8. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  9. Tyraminergic and Octopaminergic Modulation of Defensive Behavior in Termite Soldier.

    Directory of Open Access Journals (Sweden)

    Yuki Ishikawa

    Full Text Available In termites, i.e. a major group of eusocial insects, the soldier caste exhibits specific morphological characteristics and extremely high aggression against predators. Although the genomic background is identical to the other non-aggressive castes, they acquire the soldier-specific behavioral character during the course of caste differentiation. The high aggressiveness and defensive behavior is essential for colony survival, but the neurophysiological bases are completely unknown. In the present study, using the damp-wood termite Hodotermopsis sjostedti, we focused on two biogenic amines, octopamine (OA and tyramine (TA, as candidate neuromodulators for the defensive behavior in soldiers. High-performance liquid chromatographic analysis revealed that TA levels in the brain and suboesophageal ganglion (SOG and the OA level in brain were increased in soldiers than in pseudergates (worker caste. Immunohistochemical analysis revealed that TA/OA neurons that innervate specific areas, including the mandibular muscles, antennal nerve, central complex, suboesophageal ganglion, and thoracic and/or abdominal ganglia, were enlarged in a soldier-specific manner. Together with the results that pharmacological application of TA promoted the defensive behavior in pseudergates, these findings suggest that the increased TA/OA levels induce the higher aggressiveness and defensive behavior in termite soldiers. The projection targets of these soldier-specific enlarged TA/OA neurons may have important roles in the higher aggressiveness and defensive behavior of the termite soldiers, inducing the neuronal transition that accompanies external morphological changes.

  10. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  11. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  12. Review of the all Source Analysis System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process-FY 1993.

    Science.gov (United States)

    1993-04-20

    OFFICE OF THE INSPECTOR GENERAL REVIEW OF THE ALL SOURCE ANALYSIS SYSTEM AS A PART OF THE AUDIT OF THE EFFECTIVENESS OF THE DEFENSE...System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process--FY 1993 (Report No. 93-087) We are providing...appreciate the courtesies extended to the audit staff. If you have questions on this report, please contact Program Director Russell A. Rau at (703) 693

  13. Disclosure of information and informed consent: ethical and practical considerations.

    Science.gov (United States)

    Steinberg, Avraham

    2009-12-01

    Disclosure of information and informed consent are relatively new concepts in the patient-physician relationship. They are based primarily on the principle of autonomy and they have many favorable practical advantages. However, the practical implementation of these requirements is fraught with difficulties, some of which can cause harm to the patient or be obstacles in fulfilling the moral obligation of beneficence. This is particularly true when disclosure of information and informed consent are done by physicians in a defensive way for fear of malpractice suits. The most ethically defensible approach is to tailor and navigate the information according to the needs and desires of each individual patient in a sensitive and empathic manner. The informed consent should be a process of mutually shared responsibility by the patient and the physician, ensuring adequate and relevant information that is well comprehended by the individual patient, and is used correctly for his or her decision making.

  14. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  15. Defensive technology and welfare analysis of environmental quality change with uncertain consumer health impacts

    International Nuclear Information System (INIS)

    Lee, L.K.; Moffitt, L.J.

    1993-01-01

    Measuring the ex post losses from environmental quality change is an important issue when environmental contamination creates health risks, liability is assigned, and private compensation efforts are required. This paper proposes a methodology for measuring the ex post welfare impact of environmental quality change using market behavior from defensive expenditures. Conditions under which a defensive technology can provide a bound on welfare estimates are identified

  16. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  17. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  18. 论国防概念在信息化战争条件下的再认识%Reflection on the definition of national defense in the information-based war

    Institute of Scientific and Technical Information of China (English)

    赵岚

    2012-01-01

      The modernization of national defense has encountered many new issues in the information warfare. Therefore, a fresh recognition and comprehensive interpretation of the concept of national defense is required be it for its objectives or purposes. To enhance the dynamic adaptation of national defense concept to the diverse circumstances, it counts to focus on the subject of national defense and to highlight the idea of sovereignty.%  在信息化战争条件下,目前对国防定义的认识与我国现代国防建设的发展已经出现不相适应的情况,无论是从国防对象还是国防目的来看都有需要重新认识和全新解读的必要。为了适应不断发展的实际变化,回归国防主体,突出主权概念,有利于增强国防定义的动态适应性。

  19. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  20. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  1. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges

    International Nuclear Information System (INIS)

    2005-01-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  2. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  3. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  4. Principles of Defense-in-depth philosophy applied in NPP engineering management

    International Nuclear Information System (INIS)

    Wu Guangwei

    2011-01-01

    Based on the Defense-in-depth Concept in nuclear and radiation safety, Defense-in-depth Concept for design management of Nuclear Power Plant (NPP) is developed in this paper to analyze the feasibility and importance of the application of the basic principle: Defense-in-depth concept in NPP systems performed during the design control of NPP. This paper focuses on the NPP engineering management process, and according to the analysis of such process, 5 principles of Defense-in-depth Concept applied in NPP design management are raised: (1) preventing the non-conformities of design via effective design quality management system; (2) discovering and correcting non-conformities of design quality in time via design checkup and design review meeting; (3) carrying out timely analysis and treatment against design non-conformities which have been transferred to construction phase; (4) Assessing and judging the severe non-conformities in construction phase, putting forward treatment opinions and remedies accordingly so as to avoid the existence of such non-conformities in physical construction of NPP; (5) Paying 'return-visit' and performing 'post-assessment' for NPP design to assess the designed functions and safety of NPP comprehensively. (author)

  5. Payroll Expenses Reported by the Defense Finance and Accounting Service Cleveland Center

    National Research Council Canada - National Science Library

    1998-01-01

    .... To meet that requirement, a consolidation was done of the financial information received from offices providing accounting support to the Defense organizations and prepares the financial statement...

  6. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  7. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  8. Execute-Only Attacks against Execute-Only Defenses

    Science.gov (United States)

    2016-02-18

    strongest implementations of execute-only defenses: it exploits novel hardware features to incorporate non-readable code to prevent direct information...build two proof-of- concept exploits that can achieve control flow hijacking on a system protected by full- featured Readactor. • We evaluate the...According to the CVE [31], 123 such arbitrary read vulnerabilities were reported between January and September of 2015, in Firefox (CVE-2015-4495

  9. Information Flow Analysis for VHDL

    DEFF Research Database (Denmark)

    Tolstrup, Terkel Kristian; Nielson, Flemming; Nielson, Hanne Riis

    2005-01-01

    We describe a fragment of the hardware description language VHDL that is suitable for implementing the Advanced Encryption Standard algorithm. We then define an Information Flow analysis as required by the international standard Common Criteria. The goal of the analysis is to identify the entire...... information flow through the VHDL program. The result of the analysis is presented as a non-transitive directed graph that connects those nodes (representing either variables or signals) where an information flow might occur. We compare our approach to that of Kemmerer and conclude that our approach yields...

  10. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  11. Followup Audit of Controls Over Operating System and Security Software and Other General Controls for Computer Systems Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1996-01-01

    This is the third in a series of followup audits made to evaluate the corrective actions taken by the Defense Finance and Accounting Service, the Defense Information Systems Agency, and the Defense...

  12. Cluster as a Tool to Increase the Competitiveness and Innovative Activity of Enterprises of the Defense Industry Complex

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2017-01-01

    Full Text Available Purpose: the main goal of the publication is to make a comprehensive study of the possible application of the cluster approach to improve the competitiveness and innovation activity of enterprises of the defense industry complex.Methods: the methodology of the research is based on the collection and analysis of initial data and information, the article uses a systematic approach to the study of socio-economic processes and phenomena. The research is based on modern theory of competition, innovation, as well as the modern paradigm of cluster development of the economy. In preparing the study, practical materials from Corporation “Rostec”.Results: the article gives the notion of cluster, the prospects for the use of the cluster approach to enhance competitiveness and innovation enterprises of the military-industrial complex. It is noted that the activation of interaction with the “civil sector” is particularly relevant in the context of the reduction of the state defense order, and the theory and practice of cluster management offers a number of forms of cluster interaction between the enterprises of the defense industry and the civil sector. It is emphasized that the development of cluster mechanisms can solve a number of problems related to the insufficient financial stability of defense industry enterprises in the context of a reduction in the state defense order, low innovation activity and the lack of developed models of interaction with small innovative enterprises. Ultimately, the use of cluster mechanisms in the development of defense enterprises is intended to enhance the competitiveness of the complex, both nationally and globally. It is stated that the existing clusters are not able to fully solve a number of specific tasks related to the diversification of integrated defense industry structures. Attention is drawn to the fact that existing clusters are not able to fully solve a number of specific tasks related to the

  13. Logistički informacioni sistem / Logistics information system

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2010-01-01

    taking also into account compatibility with future allies and partners. Defense systems were among the first to accept the challenge (because they were forced to to introduce information technology in their management system and, with the help of innovations in this area, to increase the performance effectiveness under the conditions of environment dynamic changes. Information technology development mostly followed development of large military projects aimed at solving management or technology issues within military industry complex and management in the most technologically developed defense systems. These science and defense practice efforts resulted in many new methods and techniques such as the method of system analysis and information system design, methods of operational research and simulation, pattern recognition, expert systems for individual processes in management, as well as those for information retrieval and their implementation in decision making. Over time, partial innovations reached a high level of synthesis, leading to new management systems able to function in most complex task conditions. Mastering the procedure of creating autonomous partial information systems-where the operational research methods helped to optimally apply some of their particular values - has led to the creation of integrated automated information systems for management support. Our recent defense theory and practice have not concentrated enough on logistics information systems in professional journals, neither from the organizational nor from the technological point of view. Experiences gained from operational practice and knowledge acquired by visiting foreign armies, practical needs as well as modern times demands and current trends in the development of defense systems pointed out that it is necessary to pay more attention to this logistics segment in military journals. Logistics information systems cannot be researched, developed and introduced into operational practice

  14. Commercial nuclear fuel from U.S. and Russian surplus defense inventories: Materials, policies, and market effects

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    Nuclear materials declared by the US and Russian governments as surplus to defense programs are being converted into fuel for commercial nuclear reactors. This report presents the results of an analysis estimating the market effects that would likely result from current plans to commercialize surplus defense inventories. The analysis focuses on two key issues: (1) the extent by which traditional sources of supply, such as production from uranium mines and enrichment plants, would be displaced by the commercialization of surplus defense inventories or, conversely, would be required in the event of disruptions to planned commercialization, and (2) the future price of uranium considering the potential availability of surplus defense inventories. Finally, the report provides an estimate of the savings in uranium procurement costs that could be realized by US nuclear power generating companies with access to competitively priced uranium supplied from surplus defense inventories.

  15. Commercial nuclear fuel from U.S. and Russian surplus defense inventories: Materials, policies, and market effects

    International Nuclear Information System (INIS)

    1998-05-01

    Nuclear materials declared by the US and Russian governments as surplus to defense programs are being converted into fuel for commercial nuclear reactors. This report presents the results of an analysis estimating the market effects that would likely result from current plans to commercialize surplus defense inventories. The analysis focuses on two key issues: (1) the extent by which traditional sources of supply, such as production from uranium mines and enrichment plants, would be displaced by the commercialization of surplus defense inventories or, conversely, would be required in the event of disruptions to planned commercialization, and (2) the future price of uranium considering the potential availability of surplus defense inventories. Finally, the report provides an estimate of the savings in uranium procurement costs that could be realized by US nuclear power generating companies with access to competitively priced uranium supplied from surplus defense inventories

  16. Light-dependent expression of flg22-induced defense genes in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Satoshi eSano

    2014-10-01

    Full Text Available Chloroplasts have been reported to generate retrograde immune signals that activate defense gene expression in the nucleus. However, the roles of light and photosynthesis in plant immunity remain largely elusive. In this study, we evaluated the effects of light on the expression of defense genes induced by flg22, a peptide derived from bacterial flagellins which acts as a potent elicitor in plants. Whole-transcriptome analysis of flg22-treated Arabidopsis thaliana seedlings under light and dark conditions for 30 min revealed that a number of (30% genes strongly induced by flg22 (>4.0 require light for their rapid expression, whereas flg22-repressed genes include a significant number of genes that are down-regulated by light. Furthermore, light is responsible for the flg22-induced accumulation of salicylic acid, indicating that light is indispensable for basal defense responses in plants. To elucidate the role of photosynthesis in defense, we further examined flg22-induced defense gene expression in the presence of specific inhibitors of photosynthetic electron transport: 3-(3,4-dichlorophenyl-1,1-dimethylurea (DCMU and 2,5-dibromo-3-methyl-6-isopropyl-benzoquinone (DBMIB. Light-dependent expression of defense genes was largely suppressed by DBMIB, but only partially suppressed by DCMU. These findings suggest that photosynthetic electron flow plays a role in controling the light-dependent expression of flg22-inducible defense genes.

  17. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2014-12-01

    Full Text Available Here we report on the issue of Advanced Persistent Threats (APT, which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

  18. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  19. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  20. Inform: Efficient Information-Theoretic Analysis of Collective Behaviors

    Directory of Open Access Journals (Sweden)

    Douglas G. Moore

    2018-06-01

    Full Text Available The study of collective behavior has traditionally relied on a variety of different methodological tools ranging from more theoretical methods such as population or game-theoretic models to empirical ones like Monte Carlo or multi-agent simulations. An approach that is increasingly being explored is the use of information theory as a methodological framework to study the flow of information and the statistical properties of collectives of interacting agents. While a few general purpose toolkits exist, most of the existing software for information theoretic analysis of collective systems is limited in scope. We introduce Inform, an open-source framework for efficient information theoretic analysis that exploits the computational power of a C library while simplifying its use through a variety of wrappers for common higher-level scripting languages. We focus on two such wrappers here: PyInform (Python and rinform (R. Inform and its wrappers are cross-platform and general-purpose. They include classical information-theoretic measures, measures of information dynamics and information-based methods to study the statistical behavior of collective systems, and expose a lower-level API that allow users to construct measures of their own. We describe the architecture of the Inform framework, study its computational efficiency and use it to analyze three different case studies of collective behavior: biochemical information storage in regenerating planaria, nest-site selection in the ant Temnothorax rugatulus, and collective decision making in multi-agent simulations.

  1. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  2. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  3. PROBCON-HDW: A probability and consequence system of codes for long-term analysis of Hanford defense wastes

    International Nuclear Information System (INIS)

    Piepho, M.G.; Nguyen, T.H.

    1988-12-01

    The PROBCON-HDW (PROBability and CONsequence analysis for Hanford defense waste) computer code system calculates the long-term cumulative releases of radionuclides from the Hanford defense wastes (HDW) to the accessible environment and compares the releases to environmental release limits as defined in 40 CFR 191. PROBCON-HDW takes into account the variability of input parameter values used in models to calculate HDW release and transport in the vadose zone to the accessible environment (taken here as groundwater). A human intrusion scenario, which consists of drilling boreholes into the waste beneath the waste sites and bringing waste to the surface, is also included in PROBCON-HDW. PROBCON-HDW also includes the capability to combine the cumulative releases according to various long-term (10,000 year) scenarios into a composite risk curve or complementary cumulative distribution function (CCDF). The system structure of the PROBCON-HDW codes, the mathematical models in PROBCON-HDW, the input files, the input formats, the command files, and the graphical output results of several HDW release scenarios are described in the report. 3 refs., 7 figs., 9 tabs

  4. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  5. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  6. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    Science.gov (United States)

    2015-06-01

    the form of tax receipts from home and overseas sales, such as income taxes , corporate taxes , as well as avoiding unemployment pay (if workers are...Economic Co-Operation and Development [ OECD ], 2015) .............................................................30 Figure 3. Classification of Offset...domestic defense industry, the end result may be an unacceptably high cost to the government and the population. To avoid this outcome, the main function

  7. Analysis to Inform Defense Planning Despite Austerity

    Science.gov (United States)

    2014-01-01

    proved false : The “worst case” was much worse than planned for (Bensahel, Oliker, and Peterson, 2009, pp. 233ff). 26 Hoffman, 2009. 27 Ross, 2005...wisdom. Such work often has well-identified threats (named countries or groups), but not stereotyped point-case scenarios. Is such work threat-based...should be used only for narrow purposes and advertised as such. Endnotes 1 Gates, 2010, p. 90. 2 Kendall, 2013. 3 Boerman, 2013; Tompkins, Boerman, and

  8. 32 CFR 154.42 - Evaluation of personnel security information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Evaluation of personnel security information... SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Adjudication § 154.42 Evaluation of personnel security information. (a) The criteria and adjudicative policy to be used in applying the...

  9. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  10. Department of defense environmental cleanup cost allowability policy. Master`s thesis

    Energy Technology Data Exchange (ETDEWEB)

    Murdock, J.M.

    1994-12-01

    The purpose of this thesis was to investigate the factors affecting the allowability determination of defense contractor environmental remediation costs. The primary objective of this thesis was to determine what policies and contracting cost principles the Department of Defense (DOD) should develop to address environmental costs in a consistent manner, providing a `single face` to industry. A secondary objective was to develop an audit framework and questions to allow for consistent policy analysis and application to a contractor`s proposed environmental remediation costs based upon the materiality of the situation. Background material was presented to show the amount and complexity of environmental regulations, the effects of current judicial decisions and DOD`s efforts to develop a consistent policy. Research material was provided from Congress, the General Accounting Office, DOD, defense contractors, California, Washington, industry associations and environmental protection coalitions. The researcher`s analysis of the material produced an environmental cost principle. This cost principle was applied to a current environmental claim, producing an audit framework and tailored list of cost and/or pricing data analysis, questions. Both the cost principle and audit framework are recommended for incorporation into DOD`s final environmental cost allowability decision.

  11. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  12. Canonical analysis based on mutual information

    DEFF Research Database (Denmark)

    Nielsen, Allan Aasbjerg; Vestergaard, Jacob Schack

    2015-01-01

    combinations with the information theoretical measure mutual information (MI). We term this type of analysis canonical information analysis (CIA). MI allows for the actual joint distribution of the variables involved and not just second order statistics. While CCA is ideal for Gaussian data, CIA facilitates...

  13. Investigating aggressive styles and defense mechanisms in bipolar patients and in their parents

    Directory of Open Access Journals (Sweden)

    Nicola Luigi Bragazzi

    2014-10-01

    Full Text Available Bipolar disorder (BD is a very common mental health disorder, whose etiology concerning aggressive styles and defense mechanisms is still poorly known despite the efforts dedicated to develop psychological and biological theories. After obtaining written signed informed consent, this study will recruit inpatients with a clinical diagnosis of BD, based on Structured Clinical Interview and the Diagnostic and Statistical Manual of Mental Disorders criteria, and their parents. The Bus-Perry Aggression Questionnaire, the Defense Style Questionnaire 40, the Symptom check list SCL-90-R, developed by DeRogatis will be administered to the participants, together with a semi-structured questionnaire concerning demographic data (age, gender, employment, education and only for the patients clinical information (onset year of the disorder, presence of co-morbidities, alcohol and drug use, suicide tendencies, kind of treatment. All the questionnaires are in the Italian validated version. The successful completion of this study will shed light on the relationship between aggressive styles and defensive mechanisms in bipolar inpatients and in their parents, helping the clinicians to develop ad hoc psychological interventions.

  14. The Child's Demystification of Psychological Defense Mechanisms: A Structural and Developmental Analysis.

    Science.gov (United States)

    Chandler, Michael J.; And Others

    1978-01-01

    Explored the relationships between the cognitive developmental level of preoperational, concrete operational, and formal operational children (N=10) and their success in interpreting and explaining each of eight commonly described mechanisms of psychological defense. (JMB)

  15. Economic Sanctions as a Factor of Modernizing of Russian Defense Industry Complex

    Directory of Open Access Journals (Sweden)

    Rustem M. Nureev

    2017-09-01

    Full Text Available The article is devoted to the analysis of the defense-industrial complex (DIC of Russia in the conditions of economic sanctions. And although the center was the oil and gas industry, as well as the banking sector, economic sanctions against Russia affected the DCI. They touched first of all on such large Russian defense concerns as air defense "Almaz- Antey", "Sirius", "Stankoinstroment", "Kalashnikov", "Tula Arms Factory", NGO "Oriental Complexes", as well as "Dobrolyte". The prohibition of debt financing has affected such major enterprises of the defense industry as "Uralvagonzavod", "Oboronprom", "United Aircraft Corporation". The article shows, in general, the favorable impact of sanctions on the industry. At the end of 2016, Russia took the second place in world arms exports with a share of 23%, the US became the leader – their share was 33%. But the structure of the share capital in the defense industry companies is completely different if we compare these two countries: in the US, private companies dominate the market, in Russia – the largest enterprises are owned by the state. In the course of the analysis, it turned out that Russian defense industry enterprises are unprofitable or unprofitable, they do not have stability in financial performance, since they are highly dependent on government spending. To improve the current situation in this sector, it is advisable for the state to modernize the military-industrial complex companies in order to enhance the role of market mechanisms that will stimulate R & D, as under modern conditions of competition in any market, innovations represent an exclusive advantage for enterprise prosperity.

  16. Study of General health, resiliency, and defense mechanisms in patients with migraine headache

    Directory of Open Access Journals (Sweden)

    Alireza Aghayusefi

    2013-06-01

    Full Text Available Background: Migraine is a neurological disease that the etiology, several factors affect its onset or its exacerbation. One of the factors affecting disease is psychological factors such as defense mechanisms, resiliency, and general health. This study assessed the relationship between general health, resiliency, and general defense mechanisms, and also predicts the general health of people with migraine headaches that have a high resiliency and use mature defense mechanisms. Material and Methods: 50 women with migraine headache in the city of Bushehr using defense mechanisms, resiliency, and general health questionnaires were studied. For statistical analysis, Pearson correlation and multiple regression tests were used by SPSS 17 software. Results: The results showed that most of the defense mechanisms of migraine sufferers are Immature and Neuroticism. There is significant negative correlation between the deterioration of general health and resiliency as well as the mature defense mechanism (p=0/003, and also there is a significant positive correlation between this deterioration with neuroticism (p=0/040 and immature defense mechanisms (p=0/041. On the other hand there is significant negative correlation between resiliencies with immature (p=0/009 and neuroticism defense mechanisms (p=0/04, and also with mature defense mechanism has a significant positive correlation (p=0/003. Also, as more people use the mature defense mechanism, their deterioration of general health will be reduced, but this relationship will be stronger with the presence of resiliency. So migraine people use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health. Conclusion: This study showed that migraine patients use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health.

  17. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  18. The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe

    Science.gov (United States)

    2011-03-01

    Long-Term Defense Planning,” Information and Security: An International Journal 23, no. 1 (2009): 62-72; and Nicu Ionel Sava, Western (NATO/PfP...questionable relevance elsewhere in the world.” Huntington advanced his notions of “objective” and “subjective” control explicitly around the...chamber committees for defense: Public Order Committee and National Security Committee. These two discuss the proposals advanced by the government. Then

  19. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  20. REKONSTRUKSI PEMBENTUKAN NATIONAL CYBER DEFENSE SEBAGAI UPAYA MEMPERTAHANKAN KEDAULATAN NEGARA

    Directory of Open Access Journals (Sweden)

    Nur Khalimatus Sa'diyah

    2016-09-01

    Full Text Available Anxiety against cybercrime has become the world’s attention, but not all countries in the world is giving greater attention to the problem of cybercrime by having the rule and unless the developed countries and some developing countries. The purpose of this research is in order to find, examine and analyze the efforts of the Indonesia Government in the protection of State secrets information and data, also to research the forms of Indonesia Government resistance against cyber war. Find a reconstruction of national cyber defense formation or cyber army in an attempt to defend the sovereignty of the country. In Act No. 3 of 2002 on State Defense, it has been established that the threat in the country’s defense system consists of a military threat and non-military threat, which is including cyber threats. One of the negative effects of the cyber world development via the internet among other things is a crime in violation of the law cybercrime, where when the escalation widely spread, it could have threatened the country’s sovereignty, territorial integrity or the safety of the nation. In an effort to combat against the attacks in this virtual world, will require an agency that is in charge of being the world’s bulwark cyber or cyber defense.

  1. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  2. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  3. U.S. Department of Defense Application-Level Firewall Protection Profile for Medium Robustness Environments

    National Research Council Canada - National Science Library

    Dolan, Kathy

    2000-01-01

    .... S. Government organizations, specifically the Department of Defense, handling unclassified or sensitive but unclassified information for Mission-Critical Categories in a moderate-risk environment...

  4. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  5. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  6. Jasmonic acid and salicylic acid activate a common defense system in rice.

    Science.gov (United States)

    Tamaoki, Daisuke; Seo, Shigemi; Yamada, Shoko; Kano, Akihito; Miyamoto, Ayumi; Shishido, Hodaka; Miyoshi, Seika; Taniguchi, Shiduku; Akimitsu, Kazuya; Gomi, Kenji

    2013-06-01

    Jasmonic acid (JA) and salicylic acid (SA) play important roles in plant defense systems. JA and SA signaling pathways interact antagonistically in dicotyledonous plants, but, the status of crosstalk between JA and SA signaling is unknown in monocots. Our rice microarray analysis showed that more than half of the genes upregulated by the SA analog BTH are also upregulated by JA, suggesting that a major portion of the SA-upregulated genes are regulated by JA-dependent signaling in rice. A common defense system that is activated by both JA and SA is thus proposed which plays an important role in pathogen defense responses in rice.

  7. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  8. Performation Metrics Development Analysis for Information and Communications Technology Outsourcing: A Case Study

    Science.gov (United States)

    Travis, James L., III

    2014-01-01

    This study investigated how and to what extent the development and use of the OV-5a operational architecture decomposition tree (OADT) from the Department of Defense (DoD) Architecture Framework (DoDAF) affects requirements analysis with respect to complete performance metrics for performance-based services acquisition of ICT under rigid…

  9. INFORMATION SYSTEM OF THE FINANCIAL ANALYSIS

    Directory of Open Access Journals (Sweden)

    MIRELA MONEA

    2013-12-01

    Full Text Available Financial analysis provides the information necessary for decision making, and also helps both the external and internal users of these. The results of the financial analysis work are dependent on the quality, accuracy, relevance and effectiveness of the information collected, and processed. Essential sources of information for financial analysis are financial statements, which are considered the raw material of financial analysis. One of the financial statements -the balance sheet - provides information about assets, liabilities, equity, liquidity, solvency, risk, financial flexibility. The profit and loss account is a synthesis accounting document, part of the financial statement reporting enterprise financial performances during of a specified accounting period and summarizes all revenues earned and expenses of an accounting period and reports the results.

  10. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  11. By Land or By Sea: An Analysis of National Missile Defense Options

    National Research Council Canada - National Science Library

    Altman, Bern J

    2000-01-01

    In conformance with the National Missile Defense (NMD) Act of 1999, the United States is pursuing the path to fielding a system capable of providing protection for all of the United States against a limited ballistic missile attack...

  12. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  13. 78 FR 13543 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2013-02-28

    ..., 204, 215, 225, 227, 242, 245 and 252 Government procurement. Manuel Quinones, Editor, Defense...) shall be conducted only when-- (i) A contractor has $50 million of qualifying sales to the Government... circumstance(s) may result in a material impact on Government contract costs: (1) Information or data reveals a...

  14. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  15. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  16. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  17. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  18. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. The analysis of the defense mechanism against indigenous bacterial translocation in X-irradiated mice

    International Nuclear Information System (INIS)

    Kobayashi, Toshiya; Ohmori, Toshihiro; Yanai, Minoru; Kawanishi, Gosei; Mitsuyama, Masao; Nomoto, Kikuo.

    1991-01-01

    The defense mechanism against indigenous bacterial translocation was studied using a model of endogenous infection in X-irradiated mice. All mice irradiated with 9 Gy died from day 8 to day 15 after irradiation. The death of mice was observed in parallel with the appearance of bacteria from day 7 in various organs, and the causative agent was identified to be Escherichia coli, an indigenous bacterium translocating from the intestine. Decrease in the number of blood leukocytes, peritoneal cells and lymphocytes in Peyer's patches or mesenteric lymph nodes was observed as early as 1 day after irradiation with 6 or 9 Gy. The mitogenic response of lymphocytes from various lymphoid tissues was severely affected as well. The impairment of these parameters for host defense reached the peak 3 days after irradiation and there was no recovery. However, in vivo bacterial activity of Kupffer cells in mice irradiated with 9 Gy was maintained in a normal level for a longer period. It was suggested that Kupffer cells play an important role in the defense against indigenous bacteria translocating from the intenstine in mice. (author)

  20. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  1. Characterization of the defense-attack transition of a soccer team

    Directory of Open Access Journals (Sweden)

    Pedro Malta

    2014-02-01

    Full Text Available This study aimed to characterize the transition defense-attack in association football using the social networks analysis method. Four competitive matches from the 1st Portuguese League were analyzed with a total of 52 offensive patterns of play identified. Using SocNetV 0.81 software we computed the Betweenness (%BC and In-Out centralities (%IDC and %ODC. Data showed that the team in analysis have two preferential patterns of play for this moment of game: i supported play, with the defensive midfielder being the player that received more often the ball in the defensive central zone of the field and present the highest influence on the network of passing balls, and ii direct play, with the centre forward being the player that received more long balls in the first offensive central zone or on the first right wing zone of the offensive midfield. It is also suggested that the number of players surrounding the ball allow the emergence of a short or long pass. Using this type of methodology is possible to better identify and quantify the patterns of play of a team, providing reliable data that help coaches to improve performance of their teams.

  2. Development of SNS Stream Analysis Based on Forest Disaster Warning Information Service System

    Science.gov (United States)

    Oh, J.; KIM, D.; Kang, M.; Woo, C.; Kim, D.; Seo, J.; Lee, C.; Yoon, H.; Heon, S.

    2017-12-01

    Forest disasters, such as landslides and wildfires, cause huge economic losses and casualties, and the cost of recovery is increasing every year. While forest disaster mitigation technologies have been focused on the development of prevention and response technologies, they are now required to evolve into evacuation and border evacuation, and to develop technologies fused with ICT. In this study, we analyze the SNS (Social Network Service) stream and implement a system to detect the message that the forest disaster occurred or the forest disaster, and search the keyword related to the forest disaster in advance in real time. It is possible to detect more accurate forest disaster messages by repeatedly learning the retrieved results using machine learning techniques. To do this, we designed and implemented a system based on Hadoop and Spark, a distributed parallel processing platform, to handle Twitter stream messages that open SNS. In order to develop the technology to notify the information of forest disaster risk, a linkage of technology such as CBS (Cell Broadcasting System) based on mobile communication, internet-based civil defense siren, SNS and the legal and institutional issues for applying these technologies are examined. And the protocol of the forest disaster warning information service system that can deliver the SNS analysis result was developed. As a result, it was possible to grasp real-time forest disaster situation by real-time big data analysis of SNS that occurred during forest disasters. In addition, we confirmed that it is possible to rapidly propagate alarm or warning according to the disaster situation by using the function of the forest disaster warning information notification service. However, the limitation of system application due to the restriction of opening and sharing of SNS data currently in service and the disclosure of personal information remains a problem to be solved in the future. Keyword : SNS stream, Big data, Machine

  3. Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Year 1992 and 1993

    Science.gov (United States)

    1993-05-25

    OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE BASE CLOSURE AND REALIGNMENT BUDGET DATA FOR FISCAL YEARS 1992 AND 1993...ASSISTANT SECRETARY OF DEFENSE (INSTALLATIONS) SUBJECT: Summary Report on the Audit of Defense Base Closure and Realignment Budget Data for Fiscal Years...1992 and 1993 (Report No. 93-100) We are providing this final summary report for your information and use. The audit was required by Public Law

  4. Proof of patient information: Analysis of 201 judicial decisions.

    Science.gov (United States)

    Dugleux, E; Rached, H; Rougé-Maillart, C

    2018-05-01

    The ruling by the French Court of Cassation dated February 25, 1997 obliged doctors to provide proof of the information given to patients, reversing more than half a century of case law. In October 1997, it was specified that such evidence could be provided by "all means", including presumption. No hierarchy in respect of means of proof has been defined by case law or legislation. The present study analyzed judicial decisions with a view to determining the means of proof liable to carry the most weight in a suit for failure to provide due patient information. A retrospective qualitative study was conducted for the period from January 2010 to December 2015, by a search on the LexisNexis ® JurisClasseur website. Two hundred and one judicial decisions relating to failure to provide due patient information were selected and analyzed to study the characteristics of the practitioners involved, the content of the information at issue and the means of proof provided. The resulting cohort of practitioners was compared with the medical demographic atlas of the French Order of Medicine, considered as exhaustive. Two hundred and one practitioners were investigated for failure to provide information: 45 medical practitioners (22±3%), and 156 surgeons (78±3%) including 45 orthopedic surgeons (29±3.6% of surgeons). Hundred and ninety-three were private sector (96±1.3%) and 8 public sector (4±1.3%). Hundred and one surgeons (65±3.8% of surgeons), and 26 medical practitioners (58±7.4%) were convicted. Twenty-five of the 45 orthopedic surgeons were convicted (55±7.5%). There was no significant difference in conviction rates between surgeons and medical practitioners: odds ratio, 1.339916; 95% CI [0.6393982; 2.7753764] (Chi 2 test: p=0.49). Ninety-two practitioners based their defense on a single means of proof, and 74 of these were convicted (80±4.2%). Forty practitioners based their defense on several means of proof, and 16 of these were convicted (40±7.8%). There was

  5. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  6. The Value of Logistics Information to the Warfighter

    National Research Council Canada - National Science Library

    Corrigan, Christopher

    2004-01-01

    ...) technology into the Department of Defense supply chain management infrastructure. The project confirms the existence of an inherent value in logistics information used as a resource in Department of Defense supply chain management applications...

  7. Science and Technology of Nanostructures in the Department of Defense

    International Nuclear Information System (INIS)

    Murday, James S.

    1999-01-01

    The United States Department of Defense maintains a research and development program in nanostructures with special attention to miniaturization of information technology devices, nanostructured materials, and nanobiotechnology for detection of biological agents. This article provides a brief guide to those DoD funding officers and research scientists actively interested in nanostructures

  8. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  9. Government Performance and Results Act Reporting on Defense Working Capital Funds Net Operating Results

    National Research Council Canada - National Science Library

    2001-01-01

    ...". The Defense Working Capital Fund provides support services to the Military Departments. The support services include supply management, depot maintenance, finance and accounting, information services, and commissary...

  10. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  11. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  12. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  13. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  14. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  15. Expression analysis of chitinase upon challenge inoculation to Alternaria wounding and defense inducers in Brassica juncea

    Directory of Open Access Journals (Sweden)

    Sandhya Rawat

    2017-03-01

    Full Text Available Chitinases are the hydrolytic enzymes which belong to the pathogenesis-related (PR protein family and play an important role not only in plant defense but also in various abiotic stresses. However, only a limited number of chitinase genes have been characterised in B. juncea. In this study, we have characterised B. juncea class IV chitinase gene (accession no EF586206 in response to fungal infection, salicylic acid (SA, jasmonic acid (JA treatments and wounding. Gene expression studies revealed that the transcript levels of Bjchitinase (BjChp gene increases significantly both in local and distal tissues after Alternaria infection. Bjchitinase gene was also induced by jasmonic acid and wounding but moderately by salicylic acid. A 2.5 kb class IV chitinase promoter of this gene was isolated from B. juncea by Genome walking (accession no KF055403.1. In-silico analysis of this promoter revealed a number of conserved cis-regulatory elements related to defense, wounding and signalling molecules like SA, and JA. For validation, chitinase promoter was fused to the GUS gene, and the resultant construct was then introduced into Arabidopsis plants. Histochemical analysis of T2 transgenic Arabidopsis plants showed that higher GUS activity in leaves after fungal infection, wounding and JA treatment but weakly by SA. GUS activity was seen in meristematic tissues, young leaves, seeds and siliques. Finally investigation has led to the identification of a pathogen-inducible, developmentally regulated and organ-specific promoter. Present study revealed that Bjchitinase (BjChp promoter is induced during biotic and environmental stress and it can be used in developing finely tuned transgenics.

  16. Veiled Normalization: The Implications of Japanese Missile Defense

    Science.gov (United States)

    2008-09-01

    1 Mindy Kotler and Daisuke Okuyama. “Japan’s Global Ambivalence.” Foreign Policy, no. 130, (2002): 96-97. 19...risk in entering the arms market .93 (2006) Self Defense Law 82-2 : In 2006, a significant m ilestone was made in regards to the delegation of...Information Gathering Satellite (IGS) System." Intelligence and National Security 19, no. 3 (Autumn, 2004). Kotler , Mindy and Daisuke Okuyama

  17. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  18. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  19. Identification of Host Defense-Related Proteins Using Label-Free Quantitative Proteomic Analysis of Milk Whey from Cows with Staphylococcus aureus Subclinical Mastitis

    Directory of Open Access Journals (Sweden)

    Shaimaa Abdelmegid

    2017-12-01

    Full Text Available Staphylococcus aureus is the most common contagious pathogen associated with bovine subclinical mastitis. Current diagnosis of S. aureus mastitis is based on bacteriological culture of milk samples and somatic cell counts, which lack either sensitivity or specificity. Identification of milk proteins that contribute to host defense and their variable responses to pathogenic stimuli would enable the characterization of putative biomarkers of subclinical mastitis. To accomplish this, milk whey samples from healthy and mastitic dairy cows were analyzed using a label-free quantitative proteomics approach. In total, 90 proteins were identified, of which 25 showed significant differential abundance between healthy and mastitic samples. In silico functional analyses indicated the involvement of the differentially abundant proteins in biological mechanisms and signaling pathways related to host defense including pathogen-recognition, direct antimicrobial function, and the acute-phase response. This proteomics and bioinformatics analysis not only facilitates the identification of putative biomarkers of S. aureus subclinical mastitis but also recapitulates previous findings demonstrating the abundance of host defense proteins in intramammary infection. All mass spectrometry data are available via ProteomeXchange with identifier PXD007516.

  20. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  1. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  2. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  3. A Statistical Analysis of Officer Retention in the U.S. Military

    National Research Council Canada - National Science Library

    Demirel, Turgay

    2002-01-01

    ... policies by providing information on the effectiveness of each commissioning program. The Defense Manpower Data Center in Monterey, California, provided the data file used in the analysis of officer retention...

  4. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  5. An Analysis of Reasons Commercial Entities Prefer Not To Participate in Defense Business

    National Research Council Canada - National Science Library

    Randall, Susan

    1997-01-01

    ...) business and the principal reasons for their refusal. Since his study, major changes have occurred in the acquisition environment resulting from the collapse of the Soviet Union and subsequent Defense budget reductions...

  6. Influences on the Timing and Frequency of Cancellations and Truncations of Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    TPP) when it was judged to be practicable and, when not, a Fixed Price Incentive Fee (FPIF) or Cost Plus Incentive Fee (CPIF) contract. By 1966...left off, he ruled out the use of TPP and discouraged the use of FPIF for development contracts in favor of CPIF. ( Cost Plus Award Fee may not have...CPIF Cost Plus Incentive Fee CY Calendar Year DAB Defense Acquisition Board DAMIR Defense Acquisition Management Information Retrieval DCP

  7. Information needs analysis principles and practice in information organizations

    CERN Document Server

    Dorner, Daniel G; Calvert, Philip J

    2010-01-01

    If you want to provide an information service that truly fulfils your users' needs, this book is essential reading. The book supports practitioners in developing an information needs analysis strategy and offers the necessary professional skills and techniques to do so.

  8. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  9. Defense Finance and Accounting Service Work on the Navy General Fund 1996 Financial Statements

    National Research Council Canada - National Science Library

    1998-01-01

    ... for the Marine Corps, and on the Defense Finance and Accounting Service Cleveland Center, which consolidated the financial information for Navy and Marine Corps and compiled the financial statements...

  10. Sequence/structural analysis of xylem proteome emphasizes pathogenesis-related proteins, chitinases and β-1, 3-glucanases as key players in grapevine defense against Xylella fastidiosa

    Directory of Open Access Journals (Sweden)

    Sandeep Chakraborty

    2016-05-01

    Full Text Available Background. Xylella fastidiosa, the causative agent of various plant diseases including Pierce’s disease in the US, and Citrus Variegated Chlorosis in Brazil, remains a continual source of concern and economic losses, especially since almost all commercial varieties are sensitive to this Gammaproteobacteria. Differential expression of proteins in infected tissue is an established methodology to identify key elements involved in plant defense pathways. Methods. In the current work, we developed a methodology named CHURNER that emphasizes relevant protein functions from proteomic data, based on identification of proteins with similar structures that do not necessarily have sequence homology. Such clustering emphasizes protein functions which have multiple copies that are up/down-regulated, and highlights similar proteins which are differentially regulated. As a working example we present proteomic data enumerating differentially expressed proteins in xylem sap from grapevines that were infected with X. fastidiosa. Results. Analysis of this data by CHURNER highlighted pathogenesis related PR-1 proteins, reinforcing this as the foremost protein function in xylem sap involved in the grapevine defense response to X. fastidiosa. β-1, 3-glucanase, which has both anti-microbial and anti-fungal activities, is also up-regulated. Simultaneously, chitinases are found to be both up and down-regulated by CHURNER, and thus the net gain of this protein function loses its significance in the defense response. Discussion. We demonstrate how structural data can be incorporated in the pipeline of proteomic data analysis prior to making inferences on the importance of individual proteins to plant defense mechanisms. We expect CHURNER to be applicable to any proteomic data set.

  11. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  12. The Rationality/Emotional Defensiveness Scale--II. Convergent and discriminant correlational analysis in males and females with and without cancer.

    Science.gov (United States)

    Swan, G E; Carmelli, D; Dame, A; Rosenman, R H; Spielberger, C D

    1992-05-01

    The psychological correlates of the Rationality/Emotional Defensiveness Scale and its two subscales were examined in 1236 males and 863 females from the Western Collaborative Group Study. An additional 157 males and 164 females with some form of cancer other than of the skin were also included in this analysis. Characteristics measured included self-reported emotional control, anger expression, trait personality, depressive and neurotic symptomatology, Type A behavior, hostility, and social desirability. Results indicate that the Rationality/Emotional Defensiveness Scale is most strongly related to the suppression and control of emotions, especially anger. Scores on this scale also tend to be associated with less Type A behavior and hostility and with more social conformity. Analysis of the component subscale suggests that Antiemotionality, i.e. the extent to which an individual uses reason and logic to avoid interpersonally related emotions, is most strongly marked by the control of anger, while Rationality, i.e. the extent to which an individual uses reason and logic as a general approach to coping with the environment, is related to the control of anxiety and a higher level of trait curiosity. The psychological interpretation of the scale appears to be largely invariant across gender, unaffected by residualization of the total scale score for its association with Social Desirability, and, except for a few minor instances, unrelated to the diagnosis of cancer.

  13. Communication Analysis of Information Complexes.

    Science.gov (United States)

    Malik, M. F.

    Communication analysis is a tool for perceptual assessment of existing or projected information complexes, i.e., an established reality perceived by one or many humans. An information complex could be of a physical nature, such as a building, landscape, city street; or of a pure informational nature, such as a film, television program,…

  14. 75 FR 32122 - Revisions to Defense Priorities and Allocations System Regulations

    Science.gov (United States)

    2010-06-07

    ... INFORMATION CONTACT: John Isbell, Director (Acting), Defense Programs Division, Office of Strategic Industries.... 700.15 would reflect the time period in which the Office of Strategic Industries and Economic Security... allocation action; (c) The written signature on a manually placed order, or the digital signature or name on...

  15. Transcriptome Analysis Reveals Candidate Genes involved in Blister Blight defense in Tea (Camellia sinensis (L) Kuntze)

    Science.gov (United States)

    Jayaswall, Kuldip; Mahajan, Pallavi; Singh, Gagandeep; Parmar, Rajni; Seth, Romit; Raina, Aparnashree; Swarnkar, Mohit Kumar; Singh, Anil Kumar; Shankar, Ravi; Sharma, Ram Kumar

    2016-07-01

    To unravel the molecular mechanism of defense against blister blight (BB) disease caused by an obligate biotrophic fungus, Exobasidium vexans, transcriptome of BB interaction with resistance and susceptible tea genotypes was analysed through RNA-seq using Illumina GAIIx at four different stages during ~20-day disease cycle. Approximately 69 million high quality reads were assembled de novo, yielding 37,790 unique transcripts with more than 55% being functionally annotated. Differentially expressed, 149 defense related transcripts/genes, namely defense related enzymes, resistance genes, multidrug resistant transporters, transcription factors, retrotransposons, metacaspases and chaperons were observed in RG, suggesting their role in defending against BB. Being present in the major hub, putative master regulators among these candidates were identified from predetermined protein-protein interaction network of Arabidopsis thaliana. Further, confirmation of abundant expression of well-known RPM1, RPS2 and RPP13 in quantitative Real Time PCR indicates salicylic acid and jasmonic acid, possibly induce synthesis of antimicrobial compounds, required to overcome the virulence of E. vexans. Compendiously, the current study provides a comprehensive gene expression and insights into the molecular mechanism of tea defense against BB to serve as a resource for unravelling the possible regulatory mechanism of immunity against various biotic stresses in tea and other crops.

  16. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  17. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control.

    Science.gov (United States)

    Nicolas, Michel; Martinent, Guillaume; Drapeau, Martin; Chahraoui, Khadija; Vacher, Philippe; de Roten, Yves

    2017-01-01

    The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control) and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six ( N = 296) athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles) of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  18. Defense Profiles in Adaptation Process to Sport Competition and Their Relationships with Coping, Stress and Control

    Directory of Open Access Journals (Sweden)

    Michel Nicolas

    2017-12-01

    Full Text Available The purpose of this study was to identify the potentially distinct defense profiles of athletes in order to provide insight into the complex associations that can exist between defenses and other important variables tied to performance in sports (e.g., coping, perceived stress and control and to further our understanding of the complexity of the adaptation process in sports. Two hundred and ninety-six (N = 296 athletes participated in a naturalistic study that involved a highly stressful situation: a sports competition. Participants were assessed before and after the competition. Hierarchical cluster analysis and a series of MANOVAs with post hoc comparisons indicated two stable defense profiles (high and low defense profiles of athletes both before and during sport competition. These profiles differed with regards to coping, stress and control. Athletes with high defense profiles reported higher levels of coping strategies, perceived stress and control than athletes with low defense profiles. This study confirmed that defenses are involved in the psychological adaptation process and that research and intervention should not be based only on coping, but rather must include defense mechanisms in order to improve our understanding of psychological adaptation in competitive sports.

  19. Allowable residual contamination levels: transuranic advanced disposal systems for defense waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Napier, B.A.

    1982-01-01

    An evaluation of advanced disposal systems for defense transuranic (TRU) wastes is being conducted using the Allowable Residual Contamination Level (ARCL) method. The ARCL method is based on compliance with a radiation dose rate limit through a site-specific analysis of the potential for radiation exposure to individuals. For defense TRU wastes at the Hanford Site near Richland, Washington, various advanced disposal techniques are being studied to determine their potential for application. This paper presents a discussion of the results of the first stage of the TRU advanced disposal systems project

  20. Defense Technical Information Center Thesaurus

    Science.gov (United States)

    2000-10-01

    Functional analysis Drives UF Drive chains Drosophilidae Dressings UFC Constant speed drives UF Pomace flies RT First aid Electronic drives Vinegar flies...systems RT Endothermic reactions RT Electrons Manifolds(Engines) BT Chemical reactions+ BT Elementary particles+ NT Fermentation Exhaust nozzles...Barriers+ NT Electric fences Ferrocement Fertility Grilles BT Reinforced concrete+ BT Reproduction(Physiology)+ NT Birth+ Fermentation Ferrocenes Estrous

  1. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  2. Internet and Electronic Information Management

    Science.gov (United States)

    2003-04-01

    technologies ) and information markets (buying and selling information ), and the competitors’ success or failures. Such factors are beyond the control of... technology , and 1-19 market pressures. They have to cooperate with other entities within their organizations to develop more innovative information ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP014048 TITLE: Internet and Electronic Information Management

  3. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  4. Informational analysis involving application of complex information system

    Science.gov (United States)

    Ciupak, Clébia; Vanti, Adolfo Alberto; Balloni, Antonio José; Espin, Rafael

    The aim of the present research is performing an informal analysis for internal audit involving the application of complex information system based on fuzzy logic. The same has been applied in internal audit involving the integration of the accounting field into the information systems field. The technological advancements can provide improvements to the work performed by the internal audit. Thus we aim to find, in the complex information systems, priorities for the work of internal audit of a high importance Private Institution of Higher Education. The applied method is quali-quantitative, as from the definition of strategic linguistic variables it was possible to transform them into quantitative with the matrix intersection. By means of a case study, where data were collected via interview with the Administrative Pro-Rector, who takes part at the elaboration of the strategic planning of the institution, it was possible to infer analysis concerning points which must be prioritized at the internal audit work. We emphasize that the priorities were identified when processed in a system (of academic use). From the study we can conclude that, starting from these information systems, audit can identify priorities on its work program. Along with plans and strategic objectives of the enterprise, the internal auditor can define operational procedures to work in favor of the attainment of the objectives of the organization.

  5. Psychometric properties of the defense style questionnaire (DSQ-40) in adolescents.

    Science.gov (United States)

    Ruuttu, Titta; Pelkonen, Mirjami; Holi, Matti; Karlsson, Linnea; Kiviruusu, Olli; Heilä, Hannele; Tuisku, Virpi; Tuulio-Henriksson, Annamari; Marttunen, Mauri

    2006-02-01

    This study examined the psychometric properties of the Defense Style Questionnaire (DSQ-40) in adolescents. Internal consistency, factor structure, and discriminant and concurrent validity of the DSQ-40 were studied in 211 adolescent psychiatric outpatients aged 13 to 19 years and 199 age-matched and sex-matched controls. Principal components analysis yielded four internally consistent components: mature, neurotic, image-distorting, and immature defense styles. The outpatients reported more immature, image-distorting, and neurotic styles and less mature style than did the controls, suggesting adequate discriminant validity. As a demonstration of convergent and concurrent validity, the severity of psychiatric symptoms assessed by the General Health Questionnaire and psychosocial adjustment assessed by the Global Assessment of Functioning Scale correlated theoretically meaningfully with the different defense styles. The DSQ-40 appears to be a reliable and valid instrument for adolescents.

  6. Rejoinder to Block’s Defense of Evictionism

    Directory of Open Access Journals (Sweden)

    Jakub Bożydar Wiśniewski

    2010-11-01

    Full Text Available The present paper is an attempt to show that Walter Block’s defense of the ostensibly libertarian character of evictionism against my original criticisms is unsuccessful, thought certainly informative and thought-provoking. In my exploration of Block’s counter-criticisms, I focus in particular on the role played in his account by the principle of proportionality, as well as on the putative disanalogy between cases of abortion and child abandonment on the one hand and my airplane thought experiment on the other hand.

  7. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  8. Major Deficiencies in the Compilation and Consolidation of the Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    Steensma, David

    1998-01-01

    We are providing this report for your information and use. It identifies and summarizes the major deficiencies that contribute to the Other Defense Organizations financial statements being unreliable...

  9. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  10. Options for Department of Defense Total Workforce Supply and Demand Analysis: Potential Approaches and Available Data Sources

    Science.gov (United States)

    2014-01-01

    publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at...in Workforce Planning and Potential Modeling of Military Training, Land Defense Science and Technology Organisation , Australian Government Department...Technology Organisation , Australian Government Department of Defense, DSTO-TR-2037, 2007. Ward, D., “Workforce Demand Forecasting Techniques,” Human

  11. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  12. Tendencies of development of defensive-industrial complex of lead nations of the world

    Directory of Open Access Journals (Sweden)

    O. F. Salnikova

    2014-11-01

    Full Text Available In the article the analysis of development of defensive-industrial complex of lead nations of the world is conducted , namely the United States of America and countries-participants of European Union and NATO. Also in the the article control system of the defensive-industrial policy of the USA is schematically represented. The analysed materials gave an opportunity to draw conclusion, that guidance of military industrial concerns of the USA managed clearly to define acceptable strategies of restructuring and successfully to realize them, integrating new enterprises with the use of front-rank methods of organizational management that became the basic engine of development of defensive industry of the USA. To the number of basic progress of defensive-industrial complex of lead nations-participants of NATO and EU trends it is possible to take the following: creation of the large defensive-industrial integrated structures on development and production of modern armament and military technique on national, transnational and transatlantic levels; rapprochement of military and civil sectors of economy; large corporations go across from mass to the «flexible» production, due to what it is possible to arrive at high efficiency of production of weapons and military equipment even at small series; through diminishing of volumes of assignations on the purchase of defensive products and considerable complication of the modern systems of armament, some leading defensive firms-contractors began to work from the production of armament and military technique to scientific research-and-developments.

  13. Evolution of plant growth and defense in a continental introduction.

    Science.gov (United States)

    Agrawal, Anurag A; Hastings, Amy P; Bradburd, Gideon S; Woods, Ellen C; Züst, Tobias; Harvey, Jeffrey A; Bukovinszky, Tibor

    2015-07-01

    Substantial research has addressed adaptation of nonnative biota to novel environments, yet surprisingly little work has integrated population genetic structure and the mechanisms underlying phenotypic differentiation in ecologically important traits. We report on studies of the common milkweed Asclepias syriaca, which was introduced from North America to Europe over the past 400 years and which lacks most of its specialized herbivores in the introduced range. Using 10 populations from each continent grown in a common environment, we identified several growth and defense traits that have diverged, despite low neutral genetic differentiation between continents. We next developed a Bayesian modeling approach to account for relationships between molecular and phenotypic differences, confirming that continental trait differentiation was greater than expected from neutral genetic differentiation. We found evidence that growth-related traits adaptively diverged within and between continents. Inducible defenses triggered by monarch butterfly herbivory were substantially reduced in European populations, and this reduction in inducibility was concordant with altered phytohormonal dynamics, reduced plant growth, and a trade-off with constitutive investment. Freedom from the community of native and specialized herbivores may have favored constitutive over induced defense. Our replicated analysis of plant growth and defense, including phenotypically plastic traits, suggests adaptive evolution following a continental introduction.

  14. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  15. The ubiquitin ligase SEVEN IN ABSENTIA (SINA) ubiquitinates a defense-related NAC transcription factor and is involved in defense signaling.

    Science.gov (United States)

    Miao, Min; Niu, Xiangli; Kud, Joanna; Du, Xinran; Avila, Julian; Devarenne, Timothy P; Kuhl, Joseph C; Liu, Yongsheng; Xiao, Fangming

    2016-07-01

    We recently identified a defense-related tomato (Solanum lycopersicum) NAC (NAM, ATAF1,2, CUC2) transcription factor, NAC1, that is subjected to ubiquitin-proteasome system-dependent degradation in plant cells. In this study, we identified a tomato ubiquitin ligase (termed SEVEN IN ABSENTIA3; SINA3) that ubiquitinates NAC1, promoting its degradation. We conducted coimmunoprecipitation and bimolecular fluorescence complementation to determine that SINA3 specifically interacts with the NAC1 transcription factor in the nucleus. Moreover, we found that SINA3 ubiquitinates NAC1 in vitro and promotes NAC1 degradation via polyubiquitination in vivo, indicating that SINA3 is a ubiquitin ligase that ubiquitinates NAC1, promoting its degradation. Our real-time PCR analysis indicated that, in contrast to our previous finding that NAC1 mRNA abundance increases upon Pseudomonas infection, the SINA3 mRNA abundance decreases in response to Pseudomonas infection. Moreover, using Agrobacterium-mediated transient expression, we found that overexpression of SINA3 interferes with the hypersensitive response cell death triggered by multiple plant resistance proteins. These results suggest that SINA3 ubiquitinates a defense-related NAC transcription factor for degradation and plays a negative role in defense signaling. © 2016 The Authors. New Phytologist © 2016 New Phytologist Trust.

  16. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  17. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2017-05-01

    Full Text Available A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker receives less information, and mixed motives may exist between information sharing and own reputation gain. The second hacker’s attack is deterred by the first hacker’s reputation gain. Increasing information sharing effectiveness causes firms to substitute from defense to information sharing, which also increases in the firms’ unit defense cost, decreases in each firm’s unit cost of own information leakage, and increases in the unit benefit of joint leakage. Increasing interdependence between firms causes more information sharing between hackers caused by larger aggregate attacks, which firms should be conscious about. We consider three corner solutions. First and second, the firms deter disadvantaged hackers. When the second hacker is deterred, the first hacker does not share information. Third, the first hacker shares a maximum amount of information when certain conditions are met. Policy and managerial implications are provided for how firms should defend against hackers with various characteristics.

  18. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  19. 75 FR 38493 - Federal Advisory Committee; Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-07-02

    ... (from 7 a.m. to 2 p.m.). ADDRESSES: The meeting will be held at the Thayer Hotel, 674 Thayer Road, West...: Additional information, agenda updates, and meeting registration are available online at the Defense Health... casualties requiring transfusion, and the Joint Theater Trauma System, as well as the review of the...

  20. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  1. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... day-long workshop on the pros and cons of the defense-in-depth strategy for cyber security. The... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. Background...

  2. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  3. Strategic nuclear policy and ballistic missile defense

    International Nuclear Information System (INIS)

    1981-01-01

    The article explains the problems of the antirockets (ABM) as they were part of the presentation Salt I 1972. It is a translation from the English of a publication of the Foreign Affairs Research Institute in London. A topical analysis of the strategic nuclear policy of the two superpowers and their attitudes in the question of ballistic missile defense are given by means of two monographies. (orig./HSCH) [de

  4. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  5. Security investment, hacking, and information sharing between firms and between hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers' attacks and the firms' defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm's defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  6. A statistical analysis of individual success after successful completion of Defense Language Institute Foreign Language Center Training

    OpenAIRE

    Hinson, William B.

    2005-01-01

    "The Defense Language Institute Foreign Language Center (DLIFLC) trains students in various foreign languages and dialects for the Department of Defense (DOD). The majority of students are firstterm enlistees in the basic program. This study uses classification trees and logistic regression to understand the military, academic and personal characteristics that influence first-term success after successfully completing DLIFLC training. Success was defined as completing a firstterm enlistme...

  7. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    This is the final in a series of three audits of management controls over the operating systems and security software used by the information processing centers that support the Defense Finance and Accounting Centers (DFAS...

  8. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  9. Self-defense against verbal assault: shame, anger, and the social bond.

    Science.gov (United States)

    Scheff, T J

    1995-09-01

    With many years of experience and refinement, the arts of self-defense against physical assault are highly developed. Without an effective theory and and a useful practice, there is little in the way of self-defense against verbal assault. For THEORY, I draw upon ideas from aikido, family systems theory, and the sociology of emotions. Since unacknowledged shame seems to generate rage and damage social bonds, I emphasize the management of shame, anger, and bonds. To illustrate the meaning of these principles, I offer several episodes as examples, using the METHOD of discourse analysis. I apply this theory and method to the PRACTICE of psychotherapy by describing some rudimentary principles of defense of self against verbal aggression, especially the subtle aggression of innuendo. Psychotherapy is often an arena of verbal aggression by both therapist and client, even though it is usually unintentional and outside of awareness.

  10. 78 FR 53429 - Proposed Information Collection; Comment Request

    Science.gov (United States)

    2013-08-29

    ... Request AGENCY: Defense Finance and Accounting Service (DFAS), Office of the Secretary, DoD. ACTION... Defense Finance and Accounting Service announces a proposed public information collection and seeks public... Finance and Accounting Service--Cleveland, in order to pay the annuity to the correct person on behalf of...

  11. BombCAD - A new tool for bomb defense in nuclear facilities

    International Nuclear Information System (INIS)

    Massa, D.J.; Howard, J.W.; Sturm, S.R.

    1988-01-01

    This paper describes a new tool for analysis of the specific vulnerability of diverse facilites to bomb attack and for computer-aided-design (CAD) of siting, screening and hardening/softening aspects of comprehensive bomb defense programs. BombCAD combines the extensive architectural and engineering data base and graphics capabilities of modern architectural CAD systems with the bomb effects computational capability of the ''SECUREPLAN'' BOMB UTILITY. BombCAD permits architects/engineers, security professionals and facility managers to analytically estimate and graphically display facility vulnerability and changes (reductions) in vulnerability which result from the adoption of various bomb defense measures

  12. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  13. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... the pros and cons of the Defense-in-Depth strategy for cyber security. The workshop will be held March... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... notice is issued by the National Coordination Office for the Networking and Information Technology...

  14. An analysis of the effect of STEM initiatives on socially responsible diversity management in the US aerospace and defense industry

    Science.gov (United States)

    Johnson-Oliver, Patrick

    Workforce diversity is a growing concern at a global level and enlightened economic self-interest and corporate image compels industries to leverage it as a competitive advantage. The US aerospace and defense industry (US ADI) addresses workforce diversity through socially responsible diversity management. Prior research into the topic of approaching workforce diversity as a business rationale and a moral imperative has been limited. Scharmer and Kaufer's (2013) Theory U guided this longitudinal explanatory quantitative study, leading from the future as it emerged relative to socially responsible diversity management to compel industry to remove blind spots and co-create an economy that benefits all by promoting workforce diversity as a dual agenda. This study filled a research gap investigating the business case for diversity as a dual agenda in aerospace industry science, technology, engineering, and mathematics (STEM) disciplines. The study also investigated the America COMPETES Act as a moderator of the relationship between historically black colleges and universities (HBCUs) and industry. Data was retrieved for secondary data analysis from the National Science Foundation (NSF) and other public government services and agency websites. Two hypotheses were tested using quantitative analysis including descriptive statistics, linear regression, ANOVA, and two factor analysis. The statistical results were analyzed and deductive logic employed to develop conclusions for the study. There was a significant relationship found between both predictors and socially responsible diversity management. The results reinforce the necessity for the aerospace defense industry to promote the dual agenda of the business case for diversity as complementary; not as competing mandates.

  15. Sustained mitogen-activated protein kinase activation reprograms defense metabolism and phosphoprotein profile in Arabidopsis thaliana.

    Directory of Open Access Journals (Sweden)

    Ines eLassowskat

    2014-10-01

    Full Text Available Mitogen-activated protein kinases (MAPKs target a variety of protein substrates to regulate cellular signaling processes in eukaryotes. In plants, the number of identified MAPK substrates that control plant defense responses is still limited. Here, we generated transgenic Arabidopsis thaliana plants with an inducible system to simulate in vivo activation of two stress-activated MAPKs, MPK3 and MPK6. Metabolome analysis revealed that this artificial MPK3/6 activation (without any exposure to pathogens or other stresses is sufficient to drive the production of major defense-related metabolites, including various camalexin, indole glucosinolate and agmatine derivatives. An accompanying (phosphoproteome analysis led to detection of hundreds of potential phosphoproteins downstream of MPK3/6 activation. Besides known MAPK substrates, many candidates on this list possess typical MAPK-targeted phosphosites and in many cases, the corresponding phosphopeptides were detected by mass spectrometry. Notably, several of these putative phosphoproteins have been reported to be associated with the biosynthesis of antimicrobial defense substances (e.g. WRKY transcription factors and proteins encoded by the genes from the PEN pathway required for penetration resistance to filamentous pathogens. Thus, this work provides an inventory of candidate phosphoproteins, including putative direct MAPK substrates, for future analysis of MAPK-mediated defense control. (Proteomics data are available with the identifier PXD001252 via ProteomeXchange, http://proteomecentral.proteomexchange.org.

  16. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  17. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  18. Acquisition of Computers That Process Corporate Information

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1999-01-01

    The Secretary of Defense announced the Corporate Information Management initiative on November 16, 1990, to establish a DoD-wide concept for managing computer, communications, and information management functions...

  19. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  20. 76 FR 11414 - Defense Federal Acquisition Regulation Supplement; Independent Research and Development Technical...

    Science.gov (United States)

    2011-03-02

    ... Acquisition Regulation Supplement; Independent Research and Development Technical Descriptions (DFARS Case... (DFARS) to require contractors to report independent research and development (IR&D) projects generating... to the Defense Technical Information Center (DTIC). Beginning in the 1990s, DoD reduced its technical...

  1. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  2. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  3. Security Investment, Hacking, and Information Sharing between Firms and between Hackers

    OpenAIRE

    Kjell Hausken

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  4. Security Investment, Hacking, and Information Sharing Between Firms and Between Hackers

    OpenAIRE

    Hausken, Kjell

    2017-01-01

    A four period game between two firms and two hackers is analyzed. The firms first defend and the hackers thereafter attack and share information. Each hacker seeks financial gain, beneficial information exchange, and reputation gain. The two hackers’ attacks and the firms’ defenses are inverse U-shaped in each other. A hacker shifts from attack to information sharing when attack is costly or the firm’s defense is cheap. The two hackers share information, but a second more disadvantaged hacker...

  5. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  6. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  7. Preliminary assessment of the aquatic impacts of a proposed defense waste processing facility at the Savannah River Plant

    International Nuclear Information System (INIS)

    Mackey, H.E. Jr.

    1979-01-01

    A review of the literature indicates that a significant body of descriptive information exists concerning the aquatic ecology of Upper Three Runs Creek and Four Mile Creek of the Savannah River Plant south of Aiken, South Carolina. This information is adequate for preparation of an environmental document evaluating these streams. These streams will be impacted by construction and operation of a proposed Defense Waste Processing Facility for solidification of high level defense waste. Potential impacts include (1) construction runoff, erosion, and siltation, (2) effluents from a chemical and industrial waste treatment facility, and (3) radionuclide releases. In order to better evaluate potential impacts, recommend mitigation methods, and comply with NEPA requirements, additional quantitative biological information should be obtained through implementation of an aquatic baseline program

  8. Preliminary assessment of the aquatic impacts of a proposed defense waste processing facility at the Savannah River Plant

    Energy Technology Data Exchange (ETDEWEB)

    Mackey, H.E. Jr.

    1979-01-01

    A review of the literature indicates that a significant body of descriptive information exists concerning the aquatic ecology of Upper Three Runs Creek and Four Mile Creek of the Savannah River Plant south of Aiken, South Carolina. This information is adequate for preparation of an environmental document evaluating these streams. These streams will be impacted by construction and operation of a proposed Defense Waste Processing Facility for solidification of high level defense waste. Potential impacts include (1) construction runoff, erosion, and siltation, (2) effluents from a chemical and industrial waste treatment facility, and (3) radionuclide releases. In order to better evaluate potential impacts, recommend mitigation methods, and comply with NEPA requirements, additional quantitative biological information should be obtained through implementation of an aquatic baseline program.

  9. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  11. Federal Emergency Management Information Systems (FEMIS), System Administration Guide FEMIS: Phase 1, Version 1.1u

    Energy Technology Data Exchange (ETDEWEB)

    Cerna, P.A.; Conner, W.M.; Curtis, L.M. [and others

    1995-06-01

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and analysis tool that is being developed under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide defines FEMIS hardware and software requirements and gives instructions for installing the FEMIS software package.

  12. Department of Defense Information Enterprise Architecture Version 1.2

    Science.gov (United States)

    2010-05-07

    Internet Protocol (IP) boundaries of the Global Information Grid (GIG). Outside of these boundaries, the principles still should be considered, but...Capability Portfolio Managers) in managing the overall DoD Information Technology (IT) portfolio. Components will use DoD IEA to strategically... Information Sharing Strategy (May 2007) DoD Information Assurance Policies (DoDD 8500.01E, October 2002) DoD Computing Infrastructure Strategy

  13. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  14. 32 CFR 935.102 - Information.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information. 935.102 Section 935.102 National... WAKE ISLAND CODE Criminal Actions § 935.102 Information. (a) Any offense may be prosecuted by a written information signed by the Island Attorney. However, if the offense is one for which issue of a citation is...

  15. France, Germany, Greece and the United Kingdom an analysis and comparison of budget deficits and defense spending

    OpenAIRE

    Schoettelndreyer, Friedrich.

    2011-01-01

    Approved for public release; distribution is unlimited. This thesis documents findings on the relationship of government budget deficits and defense spending for France, Germany, Greece, and the United Kingdom in detail and for NATO and OECD country collectives. The thesis topic is relevant, as many European countries are justifying their recent cuts in defense spending with high government budget deficits. The author looked at different data sources and metrics to graphically analyze the ...

  16. Defense Spending, Growth And Inequality, 1970-2008: An Econometric Analysis

    Directory of Open Access Journals (Sweden)

    Seyhan TAŞ

    2013-12-01

    Full Text Available This paper examines the relationship between defense expentures, income inequality and growth in Turkey for the period of 1970-2008. In the study, the problem of lack of time series data has been overcome by using manufacturing pay inequality index constructed by Theil T Statistic. Although there are numerous studies that examine the different aspects of military spending in Turkey, there are few studies that analyse the impact of military spending on income distribution in Turkey. Considering this lack in the literature, the study, utilizing basic cointegration and VAR model, aims to contribute to the literaure

  17. 32 CFR Appendix G to Part 275 - Releasing Information Obtained From Financial Institutions

    Science.gov (United States)

    2010-07-01

    ... SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS OBTAINING INFORMATION FROM FINANCIAL INSTITUTIONS: RIGHT TO... Financial Institutions A. Financial records obtained under 12 U.S.C. chapter 35 shall be marked: “This... 32 National Defense 2 2010-07-01 2010-07-01 false Releasing Information Obtained From Financial...

  18. 32 CFR 806b.19 - Information compiled in anticipation of civil action.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information compiled in anticipation of civil action. 806b.19 Section 806b.19 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR... compiled in anticipation of civil action. Withhold records compiled in connection with a civil action or...

  19. 32 CFR 701.115 - Protected personal information (PPI).

    Science.gov (United States)

    2010-07-01

    ... Section 701.115 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY UNITED STATES... information (PPI). (a) Access/disclosure. Access to and disclosure of PPI such as SSN, date of birth, home... notice and understand PA rules. DON activities shall ensure that PPI (e.g., home address, date of birth...

  20. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  1. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  2. Analytical methods and laboratory facility for the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Coleman, C.J.; Dewberry, R.A.; Lethco, A.J.; Denard, C.D.

    1985-01-01

    This paper describes the analytical methods, instruments, and laboratory that will support vitrification of defense waste. The Defense Waste Processing Facility (DWPF) is now being constructed at Savannah River Plant (SRP). Beginning in 1989, SRP high-level defense waste will be immobilized in borosilicate glass for disposal in a federal repository. The DWPF will contain an analytical laboratory for performing process control analyses. Additional analyses will be performed for process history and process diagnostics. The DWPF analytical facility will consist of a large shielded sampling cell, three shielded analytical cells, a laboratory for instrumental analysis and chemical separations, and a counting room. Special instrumentation is being designed for use in the analytical cells, including microwave drying/dissolution apparatus, and remote pipetting devices. The instrumentation laboratory will contain inductively coupled plasma, atomic absorption, Moessbauer spectrometers, a carbon analyzer, and ion chromatography equipment. Counting equipment will include intrinsic germanium detectors, scintillation counters, Phoswich alpha, beta, gamma detectors, and a low-energy photon detector

  3. Impact of defense spending on unemployment in five countries from Asia

    Directory of Open Access Journals (Sweden)

    Abdul Qayyum Khan

    2015-11-01

    Full Text Available The objective of this study is to examine empirically the impact of defense spending on unemployment along with a number of control variables for a set of five selected countries from Asia which include Cambodia, China, Malaysia, Pakistan, and the Philippines. For empirical investigation annual data over the period of 1992 to 2013 are used. While, prior to regression analysis, the data were sensibly checked using sundry of relevant tests. The empirical results reveal that defense spending is not a better option to overcome unemployment problem in most of the sample countries. Thus, the findings suggest that lower defense budget allocation will provide more resources for other sectors which are relatively more productive and can help to improve economic and social welfare of these selected countries from Asia. Besides decreased military expenditures, encouraging domestic investment and discouraging population growth can help reduce unemployment. Remittance appears to have a positive relation with unemployment, the implications of which need to be addressed by policymakers

  4. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    Directory of Open Access Journals (Sweden)

    Oleksandr Yu. Burov

    2016-05-01

    Full Text Available Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc., and in everyday life (home computers, education, leisure. Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corresponding changes in HF/E: (1 information becomes a tool, goal, mean and environment of a human activity, (2 it becomes a part of the human nature and this makes him/her unprotected, (3 human psycho-physiological status becomes not only a basis of effective performance, but an object of control and support, and means of a human security and safety should be a part of information habitat, (4 networking environment becomes an independent actor in a human activity. Accompanying cyber-security challenges and tasks are discussed, as well as types of networking threats and Human View regarding the cyber security challenges.

  5. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  6. Construction and characteristics of questionnaire for the assessment of defense mechanisms: MOD

    Directory of Open Access Journals (Sweden)

    Džamonja-Ignjatović Tamara

    2014-01-01

    Full Text Available Defense mechanisms are psychological constructs of key importance for the assessment of personality and planning therapeutic process. Their assessment is mainly based on interview, observation and projective techniques. Questionnaires, as the self-assessment techniques, apparently are not suitable method for unconscious processes such as defense mechanisms. The paper presents the results of construction of the questionnaire for the assessment of defense mechanisms, abbreviated called MOD (Mechanisms of Defense, which represents an attempt to clarify conceptualization and operationalization of these constructs through a variety of behavioral and emotional manifestations, personal attitudes and beliefs, patterns of interpersonal relationships and feedback from environment. Research objectives included testing of metric characteristics and the factor structure of the questionnaire, as well as its validity for differentiating subjects from clinical and non-clinical populations. The questionnaire has 110 items assessed at the 5-point Likert scale for evaluation of 20 defense mechanisms. The sample consisted of 194 subjects of both sexes, of which 136 students of psychology and social work and 58 nonpsychotic patients from clinical populations. The results showed that the reliability of the scale varies from high to unsatisfactory (Cronbach alpha .82- .35, although for most subscales is around .65-.70. The most of defense mechanisms has one factor structure, whereas from about a third of the subscales two principal components were isolated. Analysis of the structure of mature defense mechanisms clearly derived out four factors corresponding to the presumed mechanisms of defense, while for the groups of neurotic and immature mechanisms were not obtained pure solutions. The questionnaire successfully differentiate clinical from non-clinical sample, based on higher scores on mature and lower scores on immature mechanisms, while the groups did not differ

  7. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  8. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  9. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  10. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  11. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  12. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  13. 32 CFR 2700.51 - Information Security Oversight Committee.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  14. 32 CFR Appendix E to Part 286 - DD Form 2564, “Annual Report Freedom of Information Act”

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DD Form 2564, âAnnual Report Freedom of Information Actâ E Appendix E to Part 286 National Defense Department of Defense (Continued) OFFICE OF THE... REGULATION Pt. 286, App. E Appendix E to Part 286—DD Form 2564, “Annual Report Freedom of Information Act...

  15. Base Information Transport Infrastructure Wired (BITI Wired)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Base Information Transport Infrastructure Wired (BITI Wired) Defense Acquisition Management...Combat Information Transport System program was restructured into two pre-Major Automated Information System (pre-MAIS) components: Information...Major Automated Information System MAIS OE - MAIS Original Estimate MAR – MAIS Annual Report MDA - Milestone Decision Authority MDD - Materiel

  16. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  17. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  18. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  19. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  20. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  1. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  2. Application of accident progression event tree technology to the Savannah River Site Defense Waste Processing Facility SAR analysis

    International Nuclear Information System (INIS)

    Brandyberry, M.D.; Baker, W.H.; Wittman, R.S.; Amos, C.N.

    1993-01-01

    The Accident Analysis in the Safety Analysis Report (SAR) for the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) has recently undergone an upgrade. Non-reactor SARs at SRS (and other Department of Energy (DOE) sites) use probabilistic techniques to assess the frequency of accidents at their facilities. This paper describes the application of an extension of the Accident Progression Event Tree (APET) approach to accidents at the SRS DWPF. The APET technique allows an integrated model of the facility risk to be developed, where previous probabilistic accident analyses have been limited to the quantification of the frequency and consequences of individual accident scenarios treated independently. Use of an APET allows a more structured approach, incorporating both the treatment of initiators that are common to more than one accident, and of accident progression at the facility

  3. 76 FR 39015 - Contractor Performance Information

    Science.gov (United States)

    2011-07-05

    ...] Contractor Performance Information AGENCY: Environmental Protection Agency (EPA), ACTION: Direct final rule... contractor performance information. EPA is issuing a final rule because the changes are procedural in nature... Institutes of Health's Contractor Performance System (CPS) to the Department of Defense's Contractor...

  4. Hybrid Information Flow Analysis for Programs with Arrays

    Directory of Open Access Journals (Sweden)

    Gergö Barany

    2016-07-01

    Full Text Available Information flow analysis checks whether certain pieces of (confidential data may affect the results of computations in unwanted ways and thus leak information. Dynamic information flow analysis adds instrumentation code to the target software to track flows at run time and raise alarms if a flow policy is violated; hybrid analyses combine this with preliminary static analysis. Using a subset of C as the target language, we extend previous work on hybrid information flow analysis that handled pointers to scalars. Our extended formulation handles arrays, pointers to array elements, and pointer arithmetic. Information flow through arrays of pointers is tracked precisely while arrays of non-pointer types are summarized efficiently. A prototype of our approach is implemented using the Frama-C program analysis and transformation framework. Work on a full machine-checked proof of the correctness of our approach using Isabelle/HOL is well underway; we present the existing parts and sketch the rest of the correctness argument.

  5. Building Stakeholder Trust: Defensible Government Decisions - 13110

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

    2013-07-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the

  6. Building Stakeholder Trust: Defensible Government Decisions - 13110

    International Nuclear Information System (INIS)

    Franklin, Victor A.

    2013-01-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of

  7. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  8. 32 CFR Appendix C to Part 286 - DD Form 2086, “Record of Freedom of Information (FOI) Processing Cost”

    Science.gov (United States)

    2010-07-01

    ... Information (FOI) Processing Cost” ER25NO98.000 ER25NO98.001 ... 32 National Defense 2 2010-07-01 2010-07-01 false DD Form 2086, âRecord of Freedom of Information (FOI) Processing Costâ C Appendix C to Part 286 National Defense Department of Defense (Continued...

  9. Peculiarities of Coping and Mechanisms of Psychological Defense in Persons with Alcohol Dependence

    Directory of Open Access Journals (Sweden)

    Тинатин Владимировна Чхиквадзе

    2018-12-01

    Full Text Available The article is devoted to the study of the features of the defensive-coping behavior of alcohol dependent personality in the context of the necessity to optimize addiction therapy methods. An analysis of the range of coping strategies and mechanisms of psychological defense in alcoholism was conducted. The study involved 120 men and women between the ages of 30 and 60; 62 of them are patients with alcohol dependence, registered with the narcological clinic, and 58 people who do not have alcohol dependence. The following psychodiagnostic methods were used: “Strategic Approach to Coping Scale - SACS” (S. Hofball, “Life Style Index - LSI” (R. Plutchik, H. Kellerman & H.R. Conte. In the course of the analysis, it was found that behavioral pattern “aggressive actions” is expressed at a higher level in individuals with alcohol dependence. The leading coping strategies for both dependent respondents and the control sample are “seeking social support”, “cautious actions”, “coming into contact”. When assessing the gender characteristics of coping behavior, it was revealed that alcohol-dependent women use coping “avoidance” and “impulsive actions” more often than alcohol-dependent men. The dominant mechanisms of psychological defense for both dependent respondents and the control sample are “projection”, “intellectualization” and “negation”. There are differences between the group of respondents with alcohol dependence and the control group in the degree of tension of the defense mechanisms “substitution” and “compensation”: higher rates are observed in patients with alcoholism. The mechanism of defense “intellectualization” is more often and more intensively manifested in alcohol-dependent men, “reactive formations” - in alcoholdependent women. Identified in the course of the empirical study, the features are considered as possible “targets” for the psychological correction of an alcohol

  10. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  11. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Oehmen, Christopher S.

    2012-09-01

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

  12. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  13. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  14. Impact of Defense Industry Mergers on The Cost of Military Weapons Systems

    National Research Council Canada - National Science Library

    Alfonso, Grisko R

    2007-01-01

    .... The Selected Acquisition Reports (SARs) provided the data for this research. The analysis of the data suggests that the defense industry's consolidation did not result in higher costs for DoD's military weapons in the post-merger period...

  15. Erwinia carotovora elicitors and Botrytis cinerea activate defense responses in Physcomitrella patens

    Directory of Open Access Journals (Sweden)

    Bentancor Marcel

    2007-10-01

    Full Text Available Abstract Background Vascular plants respond to pathogens by activating a diverse array of defense mechanisms. Studies with these plants have provided a wealth of information on pathogen recognition, signal transduction and the activation of defense responses. However, very little is known about the infection and defense responses of the bryophyte, Physcomitrella patens, to well-studied phytopathogens. The purpose of this study was to determine: i whether two representative broad host range pathogens, Erwinia carotovora ssp. carotovora (E.c. carotovora and Botrytis cinerea (B. cinerea, could infect Physcomitrella, and ii whether B. cinerea, elicitors of a harpin (HrpN producing E.c. carotovora strain (SCC1 or a HrpN-negative strain (SCC3193, could cause disease symptoms and induce defense responses in Physcomitrella. Results B. cinerea and E.c. carotovora were found to readily infect Physcomitrella gametophytic tissues and cause disease symptoms. Treatments with B. cinerea spores or cell-free culture filtrates from E.c. carotovoraSCC1 (CF(SCC1, resulted in disease development with severe maceration of Physcomitrella tissues, while CF(SCC3193 produced only mild maceration. Although increased cell death was observed with either the CFs or B. cinerea, the occurrence of cytoplasmic shrinkage was only visible in Evans blue stained protonemal cells treated with CF(SCC1 or inoculated with B. cinerea. Most cells showing cytoplasmic shrinkage accumulated autofluorescent compounds and brown chloroplasts were evident in a high proportion of these cells. CF treatments and B. cinerea inoculation induced the expression of the defense-related genes: PR-1, PAL, CHS and LOX. Conclusion B. cinerea and E.c. carotovora elicitors induce a defense response in Physcomitrella, as evidenced by enhanced expression of conserved plant defense-related genes. Since cytoplasmic shrinkage is the most common morphological change observed in plant PCD, and that harpins and B

  16. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  17. Screening Analysis of Criticality Features, Events, and Processes for License Application

    International Nuclear Information System (INIS)

    J.A. McClure

    2004-01-01

    This report documents the screening analysis of postclosure criticality features, events, and processes. It addresses the probability of criticality events resulting from degradation processes as well as disruptive events (i.e., seismic, rock fall, and igneous). Probability evaluations are performed utilizing the configuration generator described in ''Configuration Generator Model'', a component of the methodology from ''Disposal Criticality Analysis Methodology Topical Report''. The total probability per package of criticality is compared against the regulatory probability criterion for inclusion of events established in 10 CFR 63.114(d) (consider only events that have at least one chance in 10,000 of occurring over 10,000 years). The total probability of criticality accounts for the evaluation of identified potential critical configurations of all baselined commercial and U.S. Department of Energy spent nuclear fuel waste form and waste package combinations, both internal and external to the waste packages. This criticality screening analysis utilizes available information for the 21-Pressurized Water Reactor Absorber Plate, 12-Pressurized Water Reactor Absorber Plate, 44-Boiling Water Reactor Absorber Plate, 24-Boiling Water Reactor Absorber Plate, and the 5-Defense High-Level Radioactive Waste/U.S. Department of Energy Short waste package types. Where defensible, assumptions have been made for the evaluation of the following waste package types in order to perform a complete criticality screening analysis: 21-Pressurized Water Reactor Control Rod, 5-Defense High-Level Radioactive Waste/U.S. Department of Energy Long, and 2-Multi-Canister Overpack/2-Defense High-Level Radioactive Waste package types. The inputs used to establish probabilities for this analysis report are based on information and data generated for the Total System Performance Assessment for the License Application, where available. This analysis report determines whether criticality is to be

  18. From Comprehensive Defense to Resilient City: Strategic Conception of Shanghai’s City Security in the New Normal

    Institute of Scientific and Technical Information of China (English)

    Shi Tingting; Li Min

    2017-01-01

    The trend of climate warming and deeper globalization is adding new content to urban risks in Shanghai, resulting in the adaption of traditional comprehensive defense planning to the new environment. Based on the resilient city theory, this paper proposes a transition for Shanghai from an original comprehensive defense to a resilient city vision through strategic framework and approaches from the three aspects of engineering technology, spatial defense, and social governance in the New Normal age. Meanwhile, it suggests that Shanghai should use information technology to enhance the level of risk monitoring and to improve engineering design standards; strengthen the resilience from the scales of “life circle-urban circle-municipal administrative area”; and innovate as well as improve the social safety governance.

  19. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  20. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    Science.gov (United States)

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  1. A dual-process model of defense against conscious and unconscious death-related thoughts: an extension of terror management theory.

    Science.gov (United States)

    Pyszczynski, T; Greenberg, J; Solomon, S

    1999-10-01

    Distinct defensive processes are activated by conscious and nonconscious but accessible thoughts of death. Proximal defenses, which entail suppressing death-related thoughts or pushing the problem of death into the distant future by denying one's vulnerability, are rational, threat-focused, and activated when thoughts of death are in current focal attention. Distal terror management defenses, which entail maintaining self-esteem and faith in one's cultural worldview, function to control the potential for anxiety that results from knowing that death is inevitable. These defenses are experiential, are not related to the problem of death in any semantic or logical way, and are increasingly activated as the accessibility of death-related thoughts increases, up to the point at which such thoughts enter consciousness and proximal threat-focused defenses are initiated. Experimental evidence for this analysis is presented.

  2. Control of Citrus Huanglongbing via Trunk Injection of Plant Defense Activators and Antibiotics.

    Science.gov (United States)

    Hu, J; Jiang, J; Wang, N

    2018-02-01

    Citrus huanglongbing (HLB) or greening is a devastating disease of citrus worldwide and no effective control measure is currently available. Plant defense activators environmentally friendly compounds capable of inducing resistance against many plant pathogens. Earlier studies showed that foliar spray of plant defense inducers could slow down HLB disease progress. In this study, eight plant defense activators and three antibiotics were evaluated in three field trials for their effect to control HLB by trunk injection of young and mature sweet orange trees. Results showed that four trunk injections of several activators, including salicylic acid, oxalic acid, acibenzolar-S-methyl, and potassium phosphate, provided significant control of HLB by suppressing 'Candidatus Liberibacter asiaticus' titer and disease progress. Trunk injection of penicillin, streptomycin, and oxytetracycline hydrochloride resulted in excellent control of HLB. In general, antibiotics were more effective in reduction of 'Ca. L. asiaticus' titer and HLB symptom expressions than plant defense activators. These treatments also resulted in increased yield and better fruit quality. Injection of both salicylic acid and acibenzolar-S-methyl led to significant induction of pathogenesis-related (PR) genes PR-1 and PR-2 genes. Meanwhile, injection of either potassium phosphate or oxalic acid resulted in significant induction of PR-2 or PR-15 gene expression, respectively. These results suggested that HLB diseased trees remained inducible for systemic acquired resistance under field conditions. In summary, this study presents information regarding controlling HLB via trunk injection of plant defense activators and antibiotics, which helps citrus growers in decision making regarding developing an effective HLB management program.

  3. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  4. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  5. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  6. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  7. A Framework for Seismic Design of Items in Safety-Critical Facilities for Implementing a Risk-Informed Defense-in-Depth-Based Concept

    Directory of Open Access Journals (Sweden)

    Tatsuya Itoi

    2017-05-01

    Full Text Available Recently, especially after the 2011 off the Pacific coast of Tohoku earthquake and the Fukushima Daiichi nuclear power plant accident, the need for treating residual risks and cliff-edge effects in safety-critical facilities has been widely recognized as an extremely important issue. In this article, the sophistication of seismic designs in safety-critical facilities is discussed from the viewpoint of mitigating the consequences of accidents, such as the avoidance of cliff-edge effects. For this purpose, the implementation of a risk-informed defense-in-depth-based framework is proposed in this study. A basic framework that utilizes diversity in the dynamic characteristics of items and also provides additional seismic margin to items important for safety when needed is proposed to prevent common cause failure and to avoid cliff-edge effects as far as practicable. The proposed method is demonstrated to be effective using an example calculation.

  8. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  9. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  10. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  11. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  12. 32 CFR 187.6 - Information requirements.

    Science.gov (United States)

    2010-07-01

    ... direct exports by the Department of Defense of defense articles and services to foreign governments and... providing to a foreign nation a nuclear production or utilization facility, as defined in the Atomic Energy... utility of the environmental analysis and the need for an in-depth review diminishes as DoD's role and...

  13. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  14. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  15. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  16. Gender Issues: Analysis of Methodologies in Reports to the Secretaries of Defense and the Army

    National Research Council Canada - National Science Library

    1998-01-01

    ... the Defense Advisory Committee on Women in the Services to meet with trainees and trainers. These incidents also prompted the Secretary of the Army to establish the Senior Review Panel on Sexual Harassment...

  17. Mathematical Analysis of Evolution, Information, and Complexity

    CERN Document Server

    Arendt, Wolfgang

    2009-01-01

    Mathematical Analysis of Evolution, Information, and Complexity deals with the analysis of evolution, information and complexity. The time evolution of systems or processes is a central question in science, this text covers a broad range of problems including diffusion processes, neuronal networks, quantum theory and cosmology. Bringing together a wide collection of research in mathematics, information theory, physics and other scientific and technical areas, this new title offers elementary and thus easily accessible introductions to the various fields of research addressed in the book.

  18. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  19. Defense-in-depth evaluation for the New Waste Transfer Facility

    International Nuclear Information System (INIS)

    Hayes, T.G.; Kelly, J.L.

    1995-01-01

    This report fulfills part of the requirements of References 2 and 3 by documenting a Defense-In-Depth evaluation for the New Waste Transfer Facility (NWTF). This evaluation was performed using methodology similar to that used in an evaluation for the Defense Waste Processing Facility (DWPF). It differs because the DWPF evaluation was based on an existing Process Hazards Analysis (PHA) while NWTF's is based on a Preoperational Process Hazards Review (PHR) (Ref. 1). The accidents in the Process Hazards Review (PHR) were reviewed to determine those that might have significant consequences. Significance was based on the findings of the PHR, The facility design was reviewed to determine the Structures, Systems, and Components (SSCs) and administrative controls available before and after each accident. From this was developed a list of the Lines of Defense (LODs) available to contain the hazard associated with the accident. A summary of these LODs is given in Appendix C. Items are tabulated that are suggested for consideration in the functional classification as worker protection items. The specific criteria used in the evaluation is given in the methodology section of this report. The results are documented in Appendices A, B, C, and D

  20. 32 CFR 776.10 - Informal ethics advice.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Informal ethics advice. 776.10 Section 776.10... § 776.10 Informal ethics advice. (a) Advisors. Covered attorneys may seek informal ethics advice either... of Director, JA Division, HQMC; and (5) Head, Standards of Conduct/Government Ethics Branch...