Sample records for defense initiative sdi

  1. SDI (Strategic Defense Initiative) Technology, Survivability and Software. (United States)


    deploy This section addresses strategic uefense genetically —i.e., goals for defense against all means of delivering nuclear weap- ons, not just...34 --■■v■""• o■ ’-j-:o-;.•:/:■ ’■,--i\\’’ •e.ry^vY.’.v’y-’ ftd » 6-1. Number of Space-Based Interceptors Launched Into Space .. ,y.V.,171 6-2. Number of...times." Each make and model of computer has a unique set of instructions in which it must be pro- grammed, genetically known as machine in- structions

  2. SDI (Strategic Defense Initiative) Software Technology Program Plan (United States)


    Computing Initiative program under Simpson and Sears . Industrial research labs are studying fundamental issues of the man-machine interface to formulate...Reform," The Brookings Review, Summer 1986, pp. 11-16. [Maidique 80] Maidique, Modesto , "Entrepreneurs, Champions, and % Technological Innovation...Management Tasks Area," from Computer t. Special Issue on STARS Program, (November 1983), pp. 56-62. [Maidique 80] Maidique, Modesto A., "Entrepreneurs

  3. A review of gas-cooled reactor concepts for SDI (Strategic Defense Initiative) applications

    Energy Technology Data Exchange (ETDEWEB)

    Marshall, A.C.


    We have completed a review of multimegawatt gas-cooled reactor concepts proposed for SDI applications. Our study concluded that the principal reason for considering gas-cooled reactors for burst-mode operation was the potential for significant system mass savings over closed-cycle systems if open-cycle gas-cooled operation (effluent exhausted to space) is acceptable. The principal reason for considering gas-cooled reactors for steady-state operation is that they may represent a lower technology risk than other approaches. In the review, nine gas-cooled reactor concepts were compared to identify the most promising. For burst-mode operation, the NERVA (Nuclear Engine for Rocket Vehicle Application) derivative reactor concept emerged as a strong first choice since its performance exceeds the anticipated operational requirements and the technology has been demonstrated and is retrievable. Although the NERVA derivative concepts were determined to be the lead candidates for the Multimegawatt Steady-State (MMWSS) mode as well, their lead over the other candidates is not as great as for the burst mode. 90 refs., 2 figs., 10 tabs.

  4. A Simple Example of an SADMT (SDI-Strategic Defense Initiative) Architecture Dataflow Modeling Technique) Architecture Specification. Version 1.5. (United States)


    Layton Senior Software Engineer Martin Marietta Denver Aerospace MS L0425 P.O. Box 179 Denver, CO 80201 Larry L. Lehman Integrated Systems Inc. 2500...Town Rockwell International Corp. 2600 ’Nest Minister Blvd. Seal Beach, CA 90740-7644 4... Larry Tubbs US Army Strategic Defense Command DASH-H-5B 106...Director Martin Marietta Information & Communication Systems P.O. Box 1260,-, Denver, CO 80201-1260 CSED Review Panel • Dr. Dan Alpert , Director 1

  5. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275. (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  6. Report of the Ad Hoc Committee on the Potential Benefits to U.S. Industry from the SDI/IST (Strategic Defense Initiative/Innovative Science and Technology) Scientific Program. (United States)


    discoveries or advances in research. For these open SDI/IST reports, contacts with industry may profitably include liaison with the Federal Science and...adaptive digital electronic countermeasures; synthetic aperture radar; targeting; and fire control and navi- gation. Conservatively estimated, SDI...1-4 ,C, I-% 0.981 Non-mech. Mossbauer Spectroscopy Demonstrated rf sidebands of Fe 57 Potential for extending M0’ssbauer spectroscopy over much larger

  7. Applications of the Strategic Defense Initiative's compact accelerators (United States)

    Montanarelli, Nick; Lynch, Ted


    The Strategic Defense Initiative's (SDI) investment in particle accelerator technology for its directed energy weapons program has produced breakthroughs in the size and power of new accelerators. These accelerators, in turn, have produced spinoffs in several areas: the radio frequency quadrupole linear accelerator (RFQ linac) was recently incorporated into the design of a cancer therapy unit at the Loma Linda University Medical Center, an SDI-sponsored compact induction linear accelerator may replace Cobalt-60 radiation and hazardous ethylene-oxide as a method for sterilizing medical products, and other SDIO-funded accelerators may be used to produce the radioactive isotopes oxygen-15, nitrogen-13, carbon-11, and fluorine-18 for positron emission tomography (PET). Other applications of these accelerators include bomb detection, non-destructive inspection, decomposing toxic substances in contaminated ground water, and eliminating nuclear waste.

  8. Strategic Defense Initiative Fact Book. (United States)


    increasing the available decision time in the event of an acci- dental launch of offensive weapons. In this way SDI could actually alleviate the "first...avoid another Chernobyl and assist in ameliorating current damage). Foreign policy experts make the following observations concerning the two first

  9. Future directions for SDI development (United States)

    Rajabifard, Abbas; Feeney, Mary-Ellen F.; Williamson, Ian P.


    Understanding the role of spatial data infrastructure (SDI) in the society is important to acceptance of the concept and its alignment with spatial industry objectives. Much has been done to describe and understand the components and operation of different aspects of SDIs and their integration into the spatial data community. However, what is often miss-understood is that the role SDI plays is by necessity greater than the sum of individual components of SDI and stakeholder groups. SDI is fundamentally about facilitation and coordination of the exchange and sharing of spatial data between stakeholders in the spatial data community. To this end, the authors propose that the roles of SDI have been pursued through two different approaches: product- and process-based. Both approaches have value, but contribute to the evolution, uptake and utilization of the SDI concept in different ways. They provide different frameworks for dealing with SDI mandates for the objectives of spatial data access and sharing. This paper reviews the nature and concept of SDI, including the components, which have helped to build the current understanding about the importance of an infrastructure to support the interactions of the spatial data community. Several examples of how SDIs have been described are offered to aid understanding of their complexity. The need for descriptions to represent the discrepancies between the role and deliverables of an SDI, and thus, contribute to a simpler, but dynamic, understanding of the complexity of the SDI concept, are postulated. The transition between the understanding of SDIs from product-based to process-based approaches is investigated, with a review of the positions taken by current SDI initiatives throughout the world. A model of how these approaches provide a framework to meet the mandates of the relevant jurisdictions is proposed, and factors contributing to the success of such positions in the future are discussed.

  10. SDI: Fallacy of last move in arms race

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S. (Univ. of California, San Diego (United States))

    The Strategic Defense Initiative (SDI), sold to the American people by a persuasive president as the weapons system to end all weapons systems, turned out to be only another step in the continuing arms race, contends the author. It might already have been terminated if President Bush did not fear the conservatives who see SDI as the strategic centerpiece of the Reagan legacy. He says the project was ill-conceived from the start because it was grounded in the simple-minded faith that technology can provide the answer to the arms race. The reason it got as far as it did was because this simple-minded faith had an adherent in an exceptionally popular president who sensed correctly that the voters shared the same naive confidence. He lists several factors that contributed to the unraveling of SDI: technical opposition based upon growing evidence that the system would not work; loss of the 1986 congressional elections and a subsequent drop in appropriations; and the dramatic improvement of relations between the superpowers. He concludes that SDI is but the latest in a series of fundamentally misguided efforts by both superpowers to achieve advantage; if it proves to be the final instance of the fallacy of the last move in the annals of the Cold War, at least it will not have been altogether in vain.

  11. geoSDI: dal GIS allo scenario Web Shared

    Directory of Open Access Journals (Sweden)

    Dimitri Dello Buono


    Full Text Available geoSDI: from GIS to web shared scenariosA year ago we discussed about the use of geoSDI suite, developedby the IMAA CNR - Center of Competence for the SDI, Spatial Data Infrastructure of the Department of Civil Defense, during the post-earthquake emergency in Abruzzo and then use the system during the G8 summit which took place just in L'Aquila in July 2009. In this article the update of the situation.

  12. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.


    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  13. Defense Exportability Features Initiative: A New Paradigm for International Cooperation (United States)


    exportability process. Consequently DEF should en- hance these traditional benefits in two important ways: • By providing advanced capability to allies and...Defense AT&L: January–February 2015 24 Defense Exportability Features Initiative A New Paradigm for International Cooperation Frank D. Kenlon n...Jay Mandelbaum Kenlon is a professor of international acquisition management (intermittent) in the Defense Systems Management College’s International

  14. Student Papers on Strategic Defense Initiative. (United States)


    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  15. A Strategic Defense Initiative Organization Software Testing Initiative (United States)


    Pentagon Washir gton, DC 20301-7100 Other Defense Technical Information Center 2 Cameron Station Alexandria, VA 22314 Dr. Dan Alpert , Director Program in...Science, Technology & Society University of Illinois Room 201 912-1/2 West Illinois Street Urbana, Illinois 61801 IDA General Larry D. Welch, HQ 1 Mr

  16. Advanced sensors, telecommunications and data processing: Technological spin-offs from the Strategic Defense Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.L.


    While the details of Nitze Criteria-satisfying architectures for defense against strategic attack with ballistic missiles are still being worked out, it is already clear that quite advanced sensors, telecommunications and data processing technologies will be features of all of them. It is concluded that the SDI, due to its institutional youthfulness, its charter for large-scale research and its self-evident need for such technologies, is likely to dominate many aspects of these technology development areas during the next two decades, especially if it continues more-or-less as the current American Administration contemplates. Both the technical and the economic aspects of data-gathering and manipulation seem likely to be substantially enhanced, due to the existence of the SDI.

  17. Roadmap for an EArth Defense Initiative (READI) (United States)

    Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.


    During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.

  18. Defense Agencies Initiative Increment 2 (DAI Inc 2) (United States)


    Information Assurance IATO - Interim Authority to Operate ICD - Initial Capability Document IEA - Information Enterprise Architecture IOC - Initial...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then... auditable accurate, timely, authoritative financial data to support the Department of Defense (DoD) goal of standardizing financial management practices

  19. Report to Congress on the Strategic Defense Initiative, 1992 (United States)


    Cell (BMDOC and BMDC ), Regional/Element Operations Centers (ROCEOC), the Command and Control Network (C2N), the Communications Network Management...and Architectures Figure 2-s Initial Defense Site The BMD cell located at Colorado Springs has a battle manager node that will allow CINCSPACE to enable...the system and direct the battle. The BMD cell will be connected to the Regional Operating Center (ROC) located at the initial site by both land line

  20. Report to the Congress on the Strategic Defense Initiative, 1991 (United States)


    experiments; Tracking Field Experiments (TFE); Astral Dancer experiments; the Ultraviolet Scitnce Package (UVSP); Red Tigress; and Project Zest. The following...9-1 Appendix: Congressional Descriptive Summary Extracts U SDI Program Elements Projects ...A-I TMDI Program Elements Projects ............................................... B- 1 TMDI Procurement Projects

  1. The STIG: A new SDI assessment method

    NARCIS (Netherlands)

    Nushi, B.; Van Loenen, B.; Crompvoets, J.


    To stimulate the Spatial Data Infrastructures (SDI) development effectively and efficiently, it is key to assess the progress and benefits of the SDI. Currently, several SDI assessment methods exist. However, these are still in an infant stage and none of these appear to meet the requirements of pra

  2. Application of SDI technology in space propulsion

    Energy Technology Data Exchange (ETDEWEB)

    Klein, A.J.


    Numerous technologies developed by the DOD within the SDI program are now available for adaptation to the requirements of commercial spacecraft; SDI has accordingly organized the Technology Applications Information System data base, which contains nearly 2000 nonproprietary abstracts on SDI technology. Attention is here given to such illustrative systems as hydrogen arcjets, ammonia arcjets, ion engines, SSTO launch vehicles, gel propellants, lateral thrusters, pulsed electrothermal thrusters, laser-powered rockets, and nuclear propulsion.

  3. Defense Institution Reform Initiative Program Elements Need to Be Defined (United States)


    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  4. SDI: Statistical dynamic interactions

    Energy Technology Data Exchange (ETDEWEB)

    Blann, M.; Mustafa, M.G. (Lawrence Livermore National Lab., CA (USA)); Peilert, G.; Stoecker, H.; Greiner, W. (Frankfurt Univ. (Germany, F.R.). Inst. fuer Theoretische Physik)


    We focus on the combined statistical and dynamical aspects of heavy ion induced reactions. The overall picture is illustrated by considering the reaction {sup 36}Ar + {sup 238}U at a projectile energy of 35 MeV/nucleon. We illustrate the time dependent bound excitation energy due to the fusion/relaxation dynamics as calculated with the Boltzmann master equation. An estimate of the mass, charge and excitation of an equilibrated nucleus surviving the fast (dynamic) fusion-relaxation process is used as input into an evaporation calculation which includes 20 heavy fragment exit channels. The distribution of excitations between residue and clusters is explicitly calculated, as is the further deexcitation of clusters to bound nuclei. These results are compared with the exclusive cluster multiplicity measurements of Kim et al., and are found to give excellent agreement. We consider also an equilibrated residue system at 25% lower initial excitation, which gives an unsatisfactory exclusive multiplicity distribution. This illustrates that exclusive fragment multiplicity may provide a thermometer for system excitation. This analysis of data involves successive binary decay with no compressional effects nor phase transitions. Several examples of primary versus final (stable) cluster decay probabilities for an A = 100 nucleus at excitations of 100 to 800 MeV are presented. From these results a large change in multifragmentation patterns may be understood as a simple phase space consequence, invoking neither phase transitions, nor equation of state information. These results are used to illustrate physical quantities which are ambiguous to deduce from experimental fragment measurements. 14 refs., 4 figs.


    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.


    The Savannah River Remediation (SRR) Organization requested that Savannah River National Laboratory (SRNL) develop a Computational Fluid Dynamics (CFD) method to mix and blend the miscible contents of the blend tanks to ensure the contents are properly blended before they are transferred from the blend tank; such as, Tank 50H, to the Salt Waste Processing Facility (SWPF) feed tank. The work described here consists of two modeling areas. They are the mixing modeling analysis during miscible liquid blending operation, and the flow pattern analysis during transfer operation of the blended liquid. The transient CFD governing equations consisting of three momentum equations, one mass balance, two turbulence transport equations for kinetic energy and dissipation rate, and one species transport were solved by an iterative technique until the species concentrations of tank fluid were in equilibrium. The steady-state flow solutions for the entire tank fluid were used for flow pattern analysis, for velocity scaling analysis, and the initial conditions for transient blending calculations. A series of the modeling calculations were performed to estimate the blending times for various jet flow conditions, and to investigate the impact of the cooling coils on the blending time of the tank contents. The modeling results were benchmarked against the pilot scale test results. All of the flow and mixing models were performed with the nozzles installed at the mid-elevation, and parallel to the tank wall. From the CFD modeling calculations, the main results are summarized as follows: (1) The benchmark analyses for the CFD flow velocity and blending models demonstrate their consistency with Engineering Development Laboratory (EDL) and literature test results in terms of local velocity measurements and experimental observations. Thus, an application of the established criterion to SRS full scale tank will provide a better, physically-based estimate of the required mixing time, and

  6. The Evaluation of SISMAKOM (Computerized SDI Project). (United States)

    University of Science, Penang (Malaysia).

    A survey of 88 users of SISMAKOM, a computerized selective dissemination of information (SDI) and document delivery service provided by the Universiti Sains Malaysia and four other Malaysian universities, was conducted in August 1982 in order to collect data about SISMAKOM and to assess the value of a computerized SDI service in a developing…

  7. Driving Innovation to Support the Warfighter: Additive Manufacturing Initiatives Within the Defense Logistics Agency (United States)


    43 Defense AT&L: November-December 2016 Driving Innovation to Support the Warfighter Additive Manufacturing Initiatives Within the Defense...AM) in the commercial sector, but it is also intense for the Defense Logistics Agency (DLA), which hopes to capitalize on the promise of innovation improve readiness and sup- port to the military. As it tracks AM through the Gartner Hype Cycle, which depicts phases that innovations move

  8. Evaluation of Computer-Aided System Design Tools for SDI (Strategic Defense Initiative) Battle Management/C3 (Command, Control and Communications) Architecture Development (United States)


    Ft. Meade, MD 20755-6000 Lee Cooper 1 copy Advanced Technology 2121 Crystal Drive, Suite 200 Arlington, VA 22202 Larry Cox I copy TRW 1950 Sunwest...Richmond Street Providence, RI 02903 " - Mr. Larry Christina, Jr. 1 copy Technology Branch, CSSD-H-SBY Battle Management Division U.S. Army Strategic...copy ’_ Advanced System Architectures Johnson House 73-79 Park Street GU 15 3PE, United Kingdom s. - .%° N. % S CSED Review Panel Dr. Dan Alpert

  9. Airway acidification initiates host defense abnormalities in cystic fibrosis mice (United States)

    Shah, Viral S.; Meyerholz, David K.; Tang, Xiao Xiao; Reznikov, Leah; Alaiwa, Mahmoud Abou; Ernst, Sarah E.; Karp, Philip H.; Wohlford-Lenane, Christine L.; Heilmann, Kristopher P.; Leidinger, Mariah R.; Allen, Patrick D.; Zabner, Joseph; McCray, Paul B.; Ostedgaard, Lynda S.; Stoltz, David A.; Randak, Christoph O.; Welsh, Michael J.


    Cystic fibrosis (CF) is caused by mutations in the gene that encodes the cystic fibrosis transmembrane conductance regulator (CFTR) anion channel. In humans and pigs, the loss of CFTR impairs respiratory host defenses, causing airway infection. But CF mice are spared. We found that in all three species, CFTR secreted bicarbonate into airway surface liquid. In humans and pigs lacking CFTR, unchecked H+ secretion by the nongastric H+/K+ adenosine triphosphatase (ATP12A) acidified airway surface liquid, which impaired airway host defenses. In contrast, mouse airways expressed little ATP12A and secreted minimal H+; consequently, airway surface liquid in CF and non-CF mice had similar pH. Inhibiting ATP12A reversed host defense abnormalities in human and pig airways. Conversely, expressing ATP12A in CF mouse airways acidified airway surface liquid, impaired defenses, and increased airway bacteria. These findings help explain why CF mice are protected from infection and nominate ATP12A as a potential therapeutic target for CF. PMID:26823428

  10. A Guide to International Participation in the Strategic Defense Initiative (United States)


    methods , devices, or techniques. Alpha Laser Ground testing of the Alpha laser occurs in a 50-foot tall vacuum chamber on TRW’s Southern California test...Processing Mathematical Methods and Algorithms Self Adaptive Processing and Simulation SENSING, DISCRIMINATION AND SIGNAL PROCESSING Detectors for...Based Laser ( GBL ) Address: Commander U.S. Army Strategic Defense Command P.O. Box 1500 Huntsville, Alabama 35807 Tel: (205) 895-4340 HEDI

  11. Transitioning Defense Organizational Initiatives: An Assessment of Key 2001-2008 Defense Reforms (United States)


    Pierre Chao Dr. Daniel Y. Chiu Mr. Raymond F. DuBois Ms. Michèle A. Flournoy Gen Ronald R. Fogleman, USAF (Ret.) Dr. Jacques S. Gansler Mr. Paul R.S...transformation was the Defense Business Board. First chaired by General Gus Pagonis (U. S. Army, Ret.), the chair since 2007 has been Michael Bayer . This

  12. Geomagnetic model investigations for 1980 - 1989: A model for strategic defense initiative particle beam experiments and a study in the effects of data types and observatory bias solutions (United States)

    Langel, Robert A.; Sabaka, T. J.; Baldwin, R. T.


    Two suites of geomagnetic field models were generated at the request of Los Alamos National Lab. concerning Strategic Defense Initiative (SDI) research. The first is a progression of five models incorporating MAGSAT data and data from a sequence of batches as a priori information. The batch sequence is: post 1979.5 observatory data, post 1980 land survey and selected aeromagnetic and marine survey data, a special White Sands (NM) area survey by Project Magnet with some additional post 1980 marine survey data, and finally DE-2 satellite data. These models are of 13th deg and order in their main field terms, and deg and order 10 in their first derivative temporal terms. The second suite consists of four models based solely upon post 1983.5 observatory and survey data. They are of deg and order 10 in main field and 8 in a first deg Taylor series. A comprehensive error analysis was applied to both series, which accounted for error sources such as the truncated core and crustal fields, and the neglected Sq and low deg crustal fields. Comparison of the power spectrum of the MGST (10/81) model with those of this series show good agreement.

  13. Multiview SDI Assessment of Kosovo (2007-2010): developing a solid base to support SDI strategy development

    NARCIS (Netherlands)

    Nushi, B.; Van Loenen, B.; Besemer, J.W.J.; Crompvoets, J.


    This paper presents the multi‐view assessment of SDI status in the Republic of Kosovo performed in 2007 and in 2010. The main objective of this research was to assess the SDI of Kosovo and to define the driving forces needed to support SDI strategy development. The research assesses the status of SD

  14. Multiview SDI Assessment of Kosovo (2007-2010): developing a solid base to support SDI strategy development

    NARCIS (Netherlands)

    Nushi, B.; Van Loenen, B.; Besemer, J.W.J.; Crompvoets, J.


    This paper presents the multi‐view assessment of SDI status in the Republic of Kosovo performed in 2007 and in 2010. The main objective of this research was to assess the SDI of Kosovo and to define the driving forces needed to support SDI strategy development. The research assesses the status of SD

  15. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))


    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  16. Time Required to Initiate a Defensive Reaction to Direct and Feint Attacks in Fencing. (United States)

    Gutiérrez-Davila, Marcos; Rojas, F Javier; Gutiérrez-Cruz, Carmen; García, Carlos; Navarro, Enrique


    The two-fold purpose of this study was to analyze the time required by a fencer to initiate a defensive action in response to a direct attack, which involves identifying when the defending fencer detects the just-noticeable difference, and, secondly, to assess the effect that an attacker's rapid armed hand movement (feint attack) has on the time required to initiate a defensive move. Twenty-four elite fencers and a fencing master were included in the study. Four adapted force plates were installed on a scaffold used as a fencing piste. A 3D video analysis system recorded the location of 2 markers installed on the fencing master's shoulder and sword. The results confirm that the defending fencer has a mean movement time of 0.353 ± 0.028 s to perform the defensive action, which provides an advantage over the attacking fencer. The velocity of movement in the peripheral visual field has no influence on the time required by elite fencers to initiate a defensive action. This confirms the crucial role that response inhibition processes play when nonrelevant actions are perceived. Kinematic analysis of markers suggests that the eye movements of elite fencers are not the only source of information used while observing an attack.

  17. Parasitic Cuscuta factor(s) and the detection by tomato initiates plant defense. (United States)

    Fürst, Ursula; Hegenauer, Volker; Kaiser, Bettina; Körner, Max; Welz, Max; Albert, Markus


    Dodders (Cuscuta spp.) are holoparasitic plants that enwind stems of host plants and penetrate those by haustoria to connect to the vascular bundles. Having a broad host plant spectrum, Cuscuta spp infect nearly all dicot plants - only cultivated tomato as one exception is mounting an active defense specifically against C. reflexa. In a recent work we identified a pattern recognition receptor of tomato, "Cuscuta Receptor 1" (CuRe1), which is critical to detect a "Cuscuta factor" (CuF) and initiate defense responses such as the production of ethylene or the generation of reactive oxygen species. CuRe1 also contributes to the tomato resistance against C. reflexa. Here we point to the fact that CuRe1 is not the only relevant component for full tomato resistance but it requires additional defense mechanisms, or receptors, respectively, to totally fend off the parasite.

  18. Argonne CW Linac (ACWL) -- Legacy from SDI and opportunities for the future

    Energy Technology Data Exchange (ETDEWEB)

    McMichael, G.E.; Yule, T.J.


    The former Strategic Defense Initiative Organization (SDIO) invested significant resources over a 6-year period to develop and build an accelerator to demonstrate the launching of a cw beam with characteristics suitable for a space-based Neutral Particle Beam (NPD) system. This accelerator, the CWDD (Continuous Wave Deuterium Demonstrator) accelerator, was designed to accelerate 80 mA cw of D{sup {minus}} to 7.5 MeV. A considerable amount of hardware was constructed and installed in the Argonne-based facility, and major performance milestones were achieved before program funding from the Department of Defense ended in October 1993. Existing assets have been turned over to Argonne. Assets include a fully functional 200 kV cw D{sup {minus}} injector, a cw RFQ that has been tuned, leak checked and aligned, beam lines and a high-power beam stop, all installed in a shielded vault with appropriate safety and interlock systems. In addition, there are two high power (1 MW) cw rf amplifiers and all the ancillary power, cooling and control systems required for a high-power accelerator system. The SDI mission required that the CWDD accelerator structures operate at cryogenic temperatures (26 K), a requirement that placed severe limitations on operating period (CWDD would have provided 20 seconds of cw beam every 90 minutes). However, the accelerator structures were designed for full-power rf operation with water cooling and ACWL (Argonne Continuous Wave Linac), the new name for CWDD in its water-cooled, positive-ion configuration, will be able to operate continuously. Project status and achievements will be reviewed. Preliminary design of a proton conversion for the RFQ, and other proposals for turning ACWL into a testbed for cw-linac engineering, will be discussed.

  19. Force Structure: Actions Needed to Improve DOD’s Ability to Manage, Assess, and Report on Global Defense Posture Initiatives (United States)


    Representatives Subject: Force Structure: Actions Needed to Improve DOD’s Ability to Manage, Assess, and Report on Global Defense Posture well as the fidelity of the global basing plan given the rapidly changing global security environment. GAO-09-706R Global Defense Posture Manage, Assess, and Report on Global Defense Posture Initiatives 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S


    Directory of Open Access Journals (Sweden)

    M. Shakeri


    Full Text Available Spatial data is one of the most critical elements underpinning decision making for many disciplines. Accessing and sharing spatial data have always been a great struggle for researchers. Spatial data infrastructure (SDI plays a key role in spatial data sharing by building a suitable platform for collaboration and cooperation among the different data producer organizations. In recent years, SDI vision has been moved toward a user-centric platform which has led to development of a new and enriched generation of SDI (third generation. This vision is to provide an environment where users can cooperate to handle spatial data in an effective and satisfactory way. User-centric SDI concentrates on users, their requirements and preferences while in the past, SDI initiatives were mainly concentrated on technological issues such as the data harmonization, standardized metadata models, standardized web services for data discovery, visualization and download. On the other hand, new technologies such as the GPS-equipped smart phones, navigation devices and Web 2.0 technologies have enabled citizens to actively participate in production and sharing of the spatial information. This has led to emergence of the new phenomenon called the Volunteered Geographic Information (VGI. VGI describes any type of content that has a geographic element which has been voluntarily collected. However, its distinctive element is the geographic information that can be collected and produced by citizens with different formal expertise and knowledge of the spatial or geographical concepts. Therefore, ordinary citizens can cooperate in providing massive sources of information that cannot be ignored. These can be considered as the valuable spatial information sources in SDI. These sources can be used for completing, improving and updating of the existing databases. Spatial information and technologies are an important part of the transportation systems. Planning, design and operation

  1. eSDI-NET+: una rete tematica per l’arricchimento e il riuso dell’informazione geografica in Europa

    Directory of Open Access Journals (Sweden)

    Redazione Redazione


    Full Text Available eSDI-NET+: a thematic net for the enhancement and reuse of european geographic informationThe enhancement of geographic data through well defined semantic metadata – as expected by the INSPIRE initiative – together with the creation of comprehensive Spatial Data  Infrastructures (SDIs contemplating the extensive re-use of geographic information, could contribute in solving the divulgation and accessibility problems concerned with geographic data. In this context, eSDI-Net+ task is to establish a Thematic Net working asa communication and information exchange platform between different subjects involved in the creation and use of SDIs.

  2. Evaluating a Public Sector Organisation for SDI Readiness – The ...

    African Journals Online (AJOL)


    Case of a South African Government Department ... Abstract. Spatial data infrastructure (SDI) facilitates the collection and sharing of geographic ..... with respect to awareness as part of this human index, DEA contributes conducting GIS Open.

  3. National Defense Education and Innovation Initiative: Meeting America's Economic and Security Challenges in the 21st Century (United States)

    Association of American Universities, 2006


    The Association of American Universities (AAU) calls on the Administration, Congress, and academia, with the help of the business sector, to implement a 21st Century National Defense Education and Innovation Initiative aimed at meeting the economic and security challenges we will face over the next half-century. Government and America's…

  4. Assessment of Silt Density Index (SDI) as Fouling Propensity Parameter in Reverse Osmosis Desalination

    KAUST Repository

    Rachman, Rinaldi


    Reverse osmosis operations are facing persistent fouling phenomenon that has challenged the integrity of these processes. Prediction of fouling potential by measuring a fouling index toward feed water is essential to ensure robust operation. Moreover, employing a reliable fouling index with good reproducibility and precision is necessary. Silt density index (SDI) is considered insufficient in terms of reliability and empirical theory, among other limitations. Nevertheless due its simplicity, SDI measurement is utilized extensively in RO desalination systems. The aim of this research is to assess the reliability of SDI. Methods include the investigation of different SDI membranes and study of the nature of the SDI filtration. Results demonstrate the existence of the membrane properties\\' variation within manufacturers, which then causes a lack of accuracy in fouling risk estimation. The nature of particles during SDI filtration provides information that particle concentration and size play a significant role on SDI quantification with substantial representation given by particles with size close to membrane nominal pore size. Moreover, turbidity assisted SDI measurements along with determination of UF pretreated and clean water fouling potential, establishes the indication of non-fouling related phenomena involved on SDI measurement such as a natural organic matter adsorption and hydrodynamic condition that alters during filtration. Additionally, it was found that the latter affects the sensitivity of SDI by being represented by some portions of SDI value. Keywords: Reverse Osmosis, Fouling index, Particulate Fouling, Silt Density Index (SDI), and Assessment of SDI.

  5. SDI HDTV video transmission unit; SDI high vision eizo denso sochi

    Energy Technology Data Exchange (ETDEWEB)



    The number is increasing of broadcasting stations who use HDTV (high-definition television) signals for program formulation for the improvement of video quality for general broadcasting programs. The above-named unit, which transmits HDTV signals which are broadcasting materials over a long distance with their high quality well preserved, is capable of the optical transmission of SDI (serial digital interface) signals meeting the standards of BTA (Broadcasting Technologies Association) on 1 video channel and 2 digital audio channels. It can also work on the light wavelength multiplex system. It was developed under the guidance of TTNet (Tokyo Telecommunication Network Co., Inc.), and gained public favor when it successfully transmitted programs over a distance of approximately 400km from Nagano to Tokyo during the Nagano Olympic Games. It now transmits various high-quality video signals for instance in the relay of baseball games, thereby contributing to the improvement of video quality for broadcasting. (translated by NEDO)

  6. Televised reality - representation or simulation A study of television news reports on the Strategic Defense Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Dethridge, L.F.


    In recent years, the relationship between sign and meaning has been challenged by the work of Jean Baudrillard. While Baudrillard's ideas derive from semiotics, they imply a radical departure from a notion of the sign as the necessary representation of any fixed reality. Baudrillard refers to the signs produced by mass media and suggests that these include a new semiotic category called simulation. This term describes a false hyperreality that results when the borderline between sign and reality is confused. Baudrillard traces the historical phases of the image to compare either modes of representation with the most recent phase of simulation. He provides a number of criteria that can be used to distinguish between various modes of the sign. This research explicates Baudrillard's theory by applying it to the analysis of specific television texts, two ABC news reports on the Strategic Defense Initiative or Star Wars. In this application of Baudrillard's theory, sophisticated computer graphics are seen to simulate the hyperrealistic scenario of a war in space.

  7. "Star Wars" on Campus: Scientists Debate the Wisdom of SDI. (United States)

    Rosenblatt, Jean


    President Reagan's Strategic Defense Initiative is opposed by many university scientists, but government officials have no problem placing research contracts. Specific arrangements and personal opinions are cited, and the text of the Star Wars Petition signed by 6,500 faculty and graduate student scientists is included. (MSE)

  8. SDIO (Strategic Defense Initiative Office) Technical Information Management Center Bibliography of Unclassified Documents: January - December 1988 (United States)


    Electromagnetic Beam Algebra Stream Physic Radial Collision Equation Axial Density Velocity Dimension Accession #: 1054 AD #: ADA179909 TITLE: Wide...Codoped Crystals Author(s): Rotman , S.R.; Hartman, F.X. Date: 03/01/88 Pages:63 Report #: M-405 Corp. Author: Institute For Defense Analysis, 1801 N

  9. Strategy and Mechanisms for Encouraging Reuse in the Acquisition of Strategic Defense Initiative Software. (United States)


    that are narrower in scope than those covered in Reports. IDA Papers are reviewed to ensure that they meet the high standards expected of refereed ...Inc. 133 Defense Hwy Suite 212 Annapolis, MD 21401 0 301-261-8373 SDIO Technical Information Center 1 DRC 1755 Jeff Davis Highway Suite 802 Crystal

  10. Suppression of Salicylic Acid-Mediated Plant Defense Responses During Initial Infection of Dyer's Woad by Puccinia thlaspeos

    Directory of Open Access Journals (Sweden)

    Elizabeth Thomas


    Full Text Available Problem statement: Puccinia thlaspeos is a microcyclic rust pathogen that is being investigated as a potential biocontrol agent of the noxious weed, dyer’s woad (Isatis tinctoria. Although, the initial events in the colonization of dyer’s woad by the rust pathogen has been elucidated using scanning electron microscopy and PCR, little is known regarding the susceptibility response of this plant to its rust pathogen. Approach: The induction kinetics and amplitude of the Salicylic Acid (SA-responsive Pathogenesis-Related (PR genes, PR-1, â-1, 3-glucanase and ChiA in the compatible interaction between the rust pathogen Puccinia thlaspeos and dyer’s woad were examined during the first 72 h of the infection process. Furthermore SA, an inducer of plant defense response was applied to infected plants in order to reprogram the host defense response at periods that coincided with key events of the infection process. Results: PR genes were upregulated following host penetration by the pathogen. A subsequent pathogen-mediated suppression of PR genes was seen that corresponded with haustorium formation. This was followed by a second up-regulation of these genes that was, in turn, followed by a second long-term pathogen-induced suppression of the defense response that appears to allow successful infections in dyer’s woad. Exogenous application of SA to uninoculated plants led to activation of defense responses by 8 h after treatment. In treatments where inoculated plants were treated with SA, responses differed depending on the timing of SA application. Application of SA at times corresponding to the pre-haustorial and posthaustorial phases of infection triggered an up-regulation of defense genes and increased protection against the pathogen. However, the application of SA during haustorium formation could not override the pathogen-mediated suppression of defense responses and consequently, did not offer the host increased protection. Conclusion

  11. Determination of SDI parameters for single crystal AGS

    DEFF Research Database (Denmark)

    Aage, Helle Karina


    The responses for 1 and 4 AGS detectectors were compared. It was found that 1 detector reacts approximately as 25% of four detectors. Altitude and angle variations follow the same tendensies whether 1 or 4 detectors are used. Kerma rates equations were compared and discussed. Parameters for calcu...... for calculation of SDI air kerma rate (1 m) were calculated for HMS, KNO3 and 137Cs....

  12. Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica

    Energy Technology Data Exchange (ETDEWEB)

    Deforest, Thomas J.; VanDyke, Damon S.


    Operational Testing and Evaluation Plan - Kingston Container Terminal, Port of Kingston, Jamaica was written for the Second Line of Defense Megaports Initiative. The purpose of the Operational Testing and Evaluation (OT&E) phase of the project is to prepare for turnover of the Megaports system supplied by U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA) located at the Kingston Container Terminal (KCT) of the Port of Kingston, Jamaica to the Government of Jamaica (GOJ). Activities conducted during the OT&E phase must demonstrate that the Megaports system can be operated effectively in real time by Jamaica Customs and KCT personnel to the satisfaction of the DOE/NNSA. These activities will also determine if the Megaports system, as installed and accepted, is performing according to the Megaports Program objectives such that the system is capable of executing the mission of the Second Line of Defense Megaports Initiative. The OT&E phase of the project also provides an opportunity to consider potential improvements to the system and to take remedial action if performance deficiencies are identified during the course of evaluation. Changes to the system should be considered under an appropriate change-control process. DOE/NNSA will determine that OT&E is complete by examining whether the Megaports system is performing as intended and that the GOJ is fully capable of operating the system independently without continued onsite support from the U.S. team.

  13. Assessment of silt density index (SDI) as fouling propensity parameter in reverse osmosis (RO) desalination systems

    KAUST Repository

    Rachman, Rinaldi


    Due to its simplicity, silt density index (SDI) is extensively used in reverse osmosis systems despite its limitations in predicting membrane fouling. Employing a reliable fouling index with good reproducibility and precision is necessary. The aim of this investigation is to assess the reliability of SDI in order to understand the reasons for the low level of precision and accuracy. Different commercial SDI membranes and feed water quality were used in this study. Results showed the existence of membrane properties\\' variation within manufacturers, which then causes a lack of accuracy in fouling risk estimation. The nature of particles during SDI filtration provides information that particle concentration and size play a significant role in SDI quantification with substantial representation given by particles with size close to membrane nominal pore size. Moreover, turbidity-assisted SDI measurements along with determination of ultrafiltration permeate and clean water fouling potential, establish the indication of nonfouling-related phenomena involved on SDI measurement such as natural organic matter adsorption and hydrodynamic conditions that alters during filtration. Additionally, it was found that the latter affects the sensitivity of SDI by being represented by some portions of SDI values. © 2013 Desalination Publications.

  14. Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama

    Energy Technology Data Exchange (ETDEWEB)

    Newhouse, Robert N.


    Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

  15. Using SDI-12 with ST microelectronics MCU's

    Energy Technology Data Exchange (ETDEWEB)

    Saari, Alexandra [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Hinzey, Shawn Adrian [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Frigo, Janette Rose [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Proicou, Michael Chris [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Borges, Louis [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)


    ST Microelectronics microcontrollers and processors are readily available, capable and economical processors. Unfortunately they lack a broad user base like similar offerings from Texas Instrument, Atmel, or Microchip. All of these devices could be useful in economical devices for remote sensing applications used with environmental sensing. With the increased need for environmental studies, and limited budgets, flexibility in hardware is very important. To that end, and in an effort to increase open support of ST devices, I am sharing my teams' experience in interfacing a common environmental sensor communication protocol (SDI-12) with ST devices.

  16. Second Line of Defense Megaports Initiative Sustainment Plan - Port Klang Malaysia

    Energy Technology Data Exchange (ETDEWEB)

    King, Curtis A.


    To reduce the risk of illicit trafficking of special nuclear and other radiological materials, the Megaports Initiative installs radiation detection systems at international seaports. Port Klang, Malaysia, is one such seaport identified by the Megaports Initiative as a key area to install equipment to accomplish the mission of preventing the acquisition and smuggling of materials that could be used to create weapons of mass destruction or radiological dispersal devices. Sustainability is a critical factor of all components of the Megaports Initiative. The sustainability plan is developed to assist the partner country in securing the technical, financial, and policy commitments required to develop and implement a country-specific strategy. A robust sustainability plan will define the long-term relationship between the U.S. Department of Energy and the Government of Malaysia as well as promote the ongoing proficient radiation detection system operations at Port Klang, Malaysia.

  17. A contextual ICA stakeholder model approach for the Namibian spatial data infrastructure (NamSDI)

    CSIR Research Space (South Africa)

    Sinvula, KM


    Full Text Available In 2011, the Namibian parliament presented and promulgated the Namibian Spatial Data Infrastructure (NamSDI) with the aim of promoting the sharing and improved access and use of geospatial data and services across Namibia. Notable SDI models...

  18. The Defense Acquisition Workforce Growth Initiative: Changing Workforce Characteristics and the Implications for Workforce Retention (United States)


    Year 2013). 2 Secretary Robert Gates announced a plan to increase the size of the DAW by 20,000 by FY 2015 (Gates, 2009a). Personnel managers ...the DoD “establish flexible personnel management policies” and “establish business-related education and experience criteria for civilian contracting... personnel managers responded, with help from the DAWDF and the Expedited Hiring Authority. In fact, the DoD neared its DAW growth initiative goals

  19. Defense Management: More Reliable Cost Estimates and Further Planning Needed to Inform the Marine Corps Realignment Initiatives in the Pacific (United States)


    remaining on Okinawa. Page 16 GAO-13-360 Defense Management Carrier Air Wing 5, a Navy unit paired with the aircraft carrier USS George...The Honorable Thad Cochran Ranking Member Subcommittee on Defense Committee on Appropriations United States Senate The Honorable Tim Johnson

  20. Building Better SDI Profiles for Users of Large, Multidisciplinary Data Bases. (United States)

    Sprague, Robert J.; Frendenreich, L. Ben


    Reports an investigation conducted to improve the performance of SDI profiles in a large, complex data base that contains over a million references to scientific and technical literature, and uses full text indexing for retrieval. (Author/MBR)

  1. geoSDI ERA: gestire le emergenze in maniera integrata e condivisa

    Directory of Open Access Journals (Sweden)

    Dimitri Dello Buono


    Full Text Available geoSDI: integrated and shared emergencies managingGeoSDI is a programme coordinated by the Italian Department for Civil Protection, aimed to the design and development of the Italian National Spatial Data Infrastructure, according to the provisions of the INSPIRE Directive, using open source software applications. The GeoSDI Framework follows the OGC Standards and is therefore compatible and interoperable with other SDI tools possibly being used by other Civil Protection actors in the Mediterranean region. The web application GeoSDI ERA (at the top of the logical geoSDI framework stack allows to manage collaboratively a system of open access web servers and to use their interoperable information services for creating personalised maps with multiple layers of information, sharing the maps with other users, aggregating and analysing information.GeoSDI ERA is succesfully being used during the emergency activities of recent eartquake in Abruzzo.dati

  2. A "bottom up" governance framework for developing Australia's marine Spatial Data Infrastructure (SDI

    Directory of Open Access Journals (Sweden)

    K T Finney


    Full Text Available Spatial Data Infrastructures (SDIs have been developing in some countries for over 10 years but still suffer from having a relatively small installed base. Most SDIs will soon converge around a service-oriented-architecture (SOA using IT standards promulgated primarily by the Open Geospatial Consortium (OGC and ISO Technical Committee 211. There are very few examples of these types of architected SDIs in action, and as a result little detailed information exists on suitable governance models. This paper discusses the governance issues that are posed by SOA-based SDIs, particularly those issues surrounding standards and services management, with reference to an Australian marine case study and the general literature. A generalised governance framework is then postulated using an idealised use case model which is applicable for "bottom-up," community-based initiatives. This model incorporates guiding principles and motivational and self-regulation instruments that are characteristically found in successful open source development activities. It is argued that harnessing an open development model, using a voluntary workforce, could rapidly increase the size of the SDI installed base and importantly defray infrastructure build costs.

  3. SDI and Markov Chains for Regional Drought Characteristics

    Directory of Open Access Journals (Sweden)

    Chen-Feng Yeh


    Full Text Available In recent years, global climate change has altered precipitation patterns, causing uneven spatial and temporal distribution of precipitation that gradually induces precipitation polarization phenomena. Taiwan is located in the subtropical climate zone, with distinct wet and dry seasons, which makes the polarization phenomenon more obvious; this has also led to a large difference between river flows during the wet and dry seasons, which is significantly influenced by precipitation, resulting in hydrological drought. Therefore, to effectively address the growing issue of water shortages, it is necessary to explore and assess the drought characteristics of river systems. In this study, the drought characteristics of northern Taiwan were studied using the streamflow drought index (SDI and Markov chains. Analysis results showed that the year 2002 was a turning point for drought severity in both the Lanyang River and Yilan River basins; the severity of rain events in the Lanyang River basin increased after 2002, and the severity of drought events in the Yilan River basin exhibited a gradual upward trend. In the study of drought severity, analysis results from periods of three months (November to January and six months (November to April have shown significant drought characteristics. In addition, analysis of drought occurrence probabilities using the method of Markov chains has shown that the occurrence probabilities of drought events are higher in the Lanyang River basin than in the Yilan River basin; particularly for extreme events, the occurrence probability of an extreme drought event is 20.6% during the dry season (November to April in the Lanyang River basin, and 3.4% in the Yilan River basin. This study shows that for analysis of drought/wet occurrence probabilities, the results obtained for the drought frequency and occurrence probability using short-term data with the method of Markov chains can be used to predict the long-term occurrence

  4. Identification of sdiA-regulated genes in a mouse commensal strain of Enterobacter cloacae. (United States)

    Sabag-Daigle, Anice; Dyszel, Jessica L; Gonzalez, Juan F; Ali, Mohamed M; Ahmer, Brian M M


    Many bacteria determine their population density using quorum sensing. The most intensively studied mechanism of quorum sensing utilizes proteins of the LuxI family to synthesize a signaling molecule of the acylhomoserine lactone (AHL) type, and a protein of the LuxR family to bind AHL and regulate transcription. Genes regulated by quorum sensing often encode functions that are most effective when a group of bacteria are working cooperatively (e.g., luminescence, biofilm formation, host interactions). Bacteria in the Escherichia, Salmonella, Klebsiella, and Enterobacter genera do not encode an AHL synthase but they do encode an AHL receptor of the LuxR family, SdiA. Instead of detecting their own AHL synthesis, these organisms use SdiA to detect the AHLs synthesized by other bacterial species. In this study, we used a genetic screen to identify AHL-responsive genes in a commensal Enterobacter cloacae strain that was isolated from a laboratory mouse. The genes include a putative type VI secretion system, copA (a copper transporter), and fepE (extends O-antigen chain length). A new transposon mutagenesis strategy and suicide vectors were used to construct an sdiA mutant of E. cloacae. The AHL-responsiveness of all fusions was entirely sdiA-dependent, although some genes were regulated by sdiA in the absence of AHL.

  5. Evaluating a public sector organisation for SDI readiness – the case of a South African government department

    CSIR Research Space (South Africa)

    Hlela, S


    Full Text Available challenges with respect to accessibility. Currently there is a process to make it even more easily accessible. The results show DEA’s willingness and capacity to contribute to the South African SDI. The voluntary participation in SDI activities...

  6. SAGEN (SADMT (Strategic Defense Initiative Architecture Dataflow Modeling Technique) Generator) User’s Guide Version. 1.5. (United States)


    L0425 P.O. Box 179 Denver, CO 80201 Larry L. Lehman Integrated Systems Inc. 2500 Mission College Road Santa Clara, CA 95054 Eric Leighninger Dynamics...Minister Blvd. ." , Seal Beach, CA 90740-7644 Larry Tubbs % US Army Strategic Defense Command DASH-H-5B - 106 Wynn Dr. Huntsville, AL 35807 -11 pp...Communication Systems P.O. Box 1260 Denver, CO 80201-1260 CSED Review Panel Dr. Dan Alpert , Director 1 copy ,- Center for Advanced Study University of

  7. An analysis of the effect of STEM initiatives on socially responsible diversity management in the US aerospace and defense industry (United States)

    Johnson-Oliver, Patrick

    Workforce diversity is a growing concern at a global level and enlightened economic self-interest and corporate image compels industries to leverage it as a competitive advantage. The US aerospace and defense industry (US ADI) addresses workforce diversity through socially responsible diversity management. Prior research into the topic of approaching workforce diversity as a business rationale and a moral imperative has been limited. Scharmer and Kaufer's (2013) Theory U guided this longitudinal explanatory quantitative study, leading from the future as it emerged relative to socially responsible diversity management to compel industry to remove blind spots and co-create an economy that benefits all by promoting workforce diversity as a dual agenda. This study filled a research gap investigating the business case for diversity as a dual agenda in aerospace industry science, technology, engineering, and mathematics (STEM) disciplines. The study also investigated the America COMPETES Act as a moderator of the relationship between historically black colleges and universities (HBCUs) and industry. Data was retrieved for secondary data analysis from the National Science Foundation (NSF) and other public government services and agency websites. Two hypotheses were tested using quantitative analysis including descriptive statistics, linear regression, ANOVA, and two factor analysis. The statistical results were analyzed and deductive logic employed to develop conclusions for the study. There was a significant relationship found between both predictors and socially responsible diversity management. The results reinforce the necessity for the aerospace defense industry to promote the dual agenda of the business case for diversity as complementary; not as competing mandates.

  8. Sustainable domestic effluent reuse via Subsurface Drip Irrigation (SDI): alfalfa as a perennial model crop. (United States)

    Kazumba, Shija; Gillerman, Leonid; DeMalach, Yoel; Oron, Gideon


    Scarcity of fresh high-quality water has heightened the importance of wastewater reuse primarily in dry regions together with improving its efficient use by implementing the Subsurface Drip Irrigation (SDI) method. Sustainable effluent reuse combines soil and plant aspects, along with the maintainability of the application system. In this study, field experiments were conducted for two years on the commercial farm of Revivim and Mashabay-Sade farm (RMF) southeast of the City of Beer-Sheva, Israel. The purpose was to examine the response of alfalfa (Medicago sativa) as a perennial model crop to secondary domestic effluent application by means of a SDI system as compared with conventional overhead sprinkler irrigation. Emitters were installed at different depths and spacing. Similar amounts of effluent were applied to all plots during the experimental period. The results indicated that in all SDI treatments, the alfalfa yields were 11% to 25% higher than the ones obtained under sprinkler irrigated plots, besides the one in which the drip laterals were 200 cm apart. The average Water Use Efficiency (WUE) was better in all SDI treatments in comparison with the sprinkler irrigated plots. An economic assessment reveals the dependence of the net profit on the emitters' installation geometry, combined with the return for alfalfa in the market.

  9. Social Development in Hong Kong: Development Issues Identified by Social Development Index (SDI) (United States)

    Chua, Hoi-wai; Wong, Anthony K. W.; Shek, Daniel T. L.


    Surviving the aftermaths of the Asian Financial Crisis and SARS in 2003, Hong Kong's economy has re-gained its momentum and its economic growth has been quite remarkable too in recent few years. Nevertheless, as reflected by the Social Development Index (SDI), economic growth in Hong Kong does not seem to have benefited the people of the city at…

  10. ExpI and PhzI are descendants of the long lost cognate signal synthase for SdiA.

    Directory of Open Access Journals (Sweden)

    Anice Sabag-Daigle

    Full Text Available SdiA of E. coli and Salmonella is a LuxR homolog that detects N-acyl homoserine lactones (AHLs. Most LuxR homologs function together with a cognate AHL synthase (a LuxI homolog, but SdiA does not. Instead, SdiA detects AHLs produced by other bacterial species. In this report, we performed a phylogenetic analysis of SdiA. The results suggest that one branch of the Enterobacteriaceae obtained a rhlR/rhlI pair by horizontal transfer. The Erwinia and Pantoea branches still contain the complete pair where it is known as expR/expI and phzR/phzI, respectively. A deletion event removed the luxI homolog from the remainder of the group, leaving just the luxR homolog known as sdiA. Thus ExpR and PhzR are SdiA orthologs and ExpI and PhzI are descendants of the long lost cognate signal synthase of SdiA.

  11. Structural and mechanistic roles of novel chemical ligands on the SdiA quorum-sensing transcription regulator. (United States)

    Nguyen, Y; Nguyen, Nam X; Rogers, Jamie L; Liao, Jun; MacMillan, John B; Jiang, Youxing; Sperandio, Vanessa


    Bacteria engage in chemical signaling, termed quorum sensing (QS), to mediate intercellular communication, mimicking multicellular organisms. The LuxR family of QS transcription factors regulates gene expression, coordinating population behavior by sensing endogenous acyl homoserine lactones (AHLs). However, some bacteria (such as Escherichia coli) do not produce AHLs. These LuxR orphans sense exogenous AHLs but also regulate transcription in the absence of AHLs. Importantly, this AHL-independent regulatory mechanism is still largely unknown. Here we present several structures of one such orphan LuxR-type protein, SdiA, from enterohemorrhagic E. coli (EHEC), in the presence and absence of AHL. SdiA is actually not in an apo state without AHL but is regulated by a previously unknown endogenous ligand, 1-octanoyl-rac-glycerol (OCL), which is ubiquitously found throughout the tree of life and serves as an energy source, signaling molecule, and substrate for membrane biogenesis. While exogenous AHL renders to SdiA higher stability and DNA binding affinity, OCL may function as a chemical chaperone placeholder that stabilizes SdiA, allowing for basal activity. Structural comparison between SdiA-AHL and SdiA-OCL complexes provides crucial mechanistic insights into the ligand regulation of AHL-dependent and -independent function of LuxR-type proteins. Importantly, in addition to its contribution to basic science, this work has implications for public health, inasmuch as the SdiA signaling system aids the deadly human pathogen EHEC to adapt to a commensal lifestyle in the gastrointestinal (GI) tract of cattle, its main reservoir. These studies open exciting and novel avenues to control shedding of this human pathogen in the environment. Quorum sensing refers to bacterial chemical signaling. The QS acyl homoserine lactone (AHL) signals are recognized by LuxR-type receptors that regulate gene transcription. However, some bacteria have orphan LuxR-type receptors and do not

  12. Indole is an inter-species biofilm signal mediated by SdiA

    Directory of Open Access Journals (Sweden)

    Wood Thomas K


    Full Text Available Abstract Background As a stationary phase signal, indole is secreted in large quantities into rich medium by Escherichia coli and has been shown to control several genes (e.g., astD, tnaB, gabT, multi-drug exporters, and the pathogenicity island of E. coli; however, its impact on biofilm formation has not been well-studied. Results Through a series of global transcriptome analyses, confocal microscopy, isogenic mutants, and dual-species biofilms, we show here that indole is a non-toxic signal that controls E. coli biofilms by repressing motility, inducing the sensor of the quorum sensing signal autoinducer-1 (SdiA, and influencing acid resistance (e.g., hdeABD, gadABCEX. Isogenic mutants showed these associated proteins are directly related to biofilm formation (e.g., the sdiA mutation increased biofilm formation 50-fold, and SdiA-mediated transcription was shown to be influenced by indole. The reduction in motility due to indole addition results in the biofilm architecture changing from scattered towers to flat colonies. Additionally, there are 12-fold more E. coli cells in dual-species biofilms grown in the presence of Pseudomonas cells engineered to express toluene o-monooxygenase (TOM, which converts indole to an insoluble indigoid than in biofilms with pseudomonads that do not express TOM due to a 22-fold reduction in extracellular indole. Also, indole stimulates biofilm formation in pseudomonads. Further evidence that the indole effects are mediated by SdiA and homoserine lactone quorum sensing is that the addition of N-butyryl-, N-hexanoyl-, and N-octanoyl-L-homoserine lactones repress E. coli biofilm formation in the wild-type strain but not with the sdiA mutant. Conclusion Indole is an interspecies signal that decreases E. coli biofilms through SdiA and increases those of pseudomonads. Indole may be manipulated to control biofilm formation by oxygenases of bacteria that do not synthesize it in a dual-species biofilm. Furthermore, E

  13. Full utilization of silt density index (SDI) measurements for seawater pre-treatment

    KAUST Repository

    Wei, Chunhai


    In order to clarify the fouling mechanism during silt density index (SDI) measurements of seawater in the seawater reverse osmosis (SWRO) desalination process, 11 runs were conducted under constant-pressure (207kPa) dead-end filtration mode according to the standard protocol for SDI measurement, in which two kinds of 0.45μm membranes of different material and seawater samples from the Mediterranean including raw seawater and seawater pre-treated by coagulation followed by sand filtration (CSF) and coagulation followed by microfiltration (CMF) technologies were tested. Fouling mechanisms based on the constant-pressure filtration equation were fully analyzed. For all runs, only t/(V/A)∼t showed very good linearity (correlation coefficient R 2>0.99) since the first moment of the filtration, indicating that standard blocking rather than cake filtration was the dominant fouling mechanism during the entire filtration process. The very low concentration of suspended solids rejected by MF of 0.45μm in seawater was the main reason why a cake layer was not formed. High turbidity removal during filtration indicated that organic colloids retained on and/or adsorbed in membrane pores governed the filtration process (i.e., standard blocking) due to the important contribution of organic substances to seawater turbidity in this study. Therefore the standard blocking coefficient k s, i.e., the slope of t/(V/A)∼t, could be used as a good fouling index for seawater because it showed good linearity with feed seawater turbidity. The correlation of SDI with k s and feed seawater quality indicated that SDI could be reliably used for seawater with low fouling potential (SDI 15min<5) like pre-treated seawater in this study. From both k s and SDI, the order of fouling potential was raw seawater>seawater pre-treated by CSF>seawater pre-treated by CMF, indicating the better performance of CMF than CSF. © 2012 Elsevier B.V.

  14. SDI-based business processes: A territorial analysis web information system in Spain (United States)

    Béjar, Rubén; Latre, Miguel Á.; Lopez-Pellicer, Francisco J.; Nogueras-Iso, Javier; Zarazaga-Soria, F. J.; Muro-Medrano, Pedro R.


    Spatial Data Infrastructures (SDIs) provide access to geospatial data and operations through interoperable Web services. These data and operations can be chained to set up specialized geospatial business processes, and these processes can give support to different applications. End users can benefit from these applications, while experts can integrate the Web services in their own business processes and developments. This paper presents an SDI-based territorial analysis Web information system for Spain, which gives access to land cover, topography and elevation data, as well as to a number of interoperable geospatial operations by means of a Web Processing Service (WPS). Several examples illustrate how different territorial analysis business processes are supported. The system has been established by the Spanish National SDI (Infraestructura de Datos Espaciales de España, IDEE) both as an experimental platform for geoscientists and geoinformation system developers, and as a mechanism to contribute to the Spanish citizens knowledge about their territory.

  15. Many Scientists Welcome the Reluctance of Congress to Back Large Increases for "Star Wars" Research. (United States)

    Cordes, Colleen


    Ronald Reagan's Strategic Defense Initiative (SDI) program has inspired heated debate on campuses, and many scientists have pledged not to accept federal money for SDI research, for a variety of political, economic, and scientific reasons. (MSE)

  16. Defense Institution Building: An Assessment (United States)


    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  17. An open-source wireless sensor stack: from Arduino to SDI-12 to Water One Flow (United States)

    Hicks, S.; Damiano, S. G.; Smith, K. M.; Olexy, J.; Horsburgh, J. S.; Mayorga, E.; Aufdenkampe, A. K.


    Implementing a large-scale streaming environmental sensor network has previously been limited by the high cost of the datalogging and data communication infrastructure. The Christina River Basin Critical Zone Observatory (CRB-CZO) is overcoming the obstacles to large near-real-time data collection networks by using Arduino, an open source electronics platform, in combination with XBee ZigBee wireless radio modules. These extremely low-cost and easy-to-use open source electronics are at the heart of the new DIY movement and have provided solutions to countless projects by over half a million users worldwide. However, their use in environmental sensing is in its infancy. At present a primary limitation to widespread deployment of open-source electronics for environmental sensing is the lack of a simple, open-source software stack to manage streaming data from heterogeneous sensor networks. Here we present a functioning prototype software stack that receives sensor data over a self-meshing ZigBee wireless network from over a hundred sensors, stores the data locally and serves it on demand as a CUAHSI Water One Flow (WOF) web service. We highlight a few new, innovative components, including: (1) a versatile open data logger design based the Arduino electronics platform and ZigBee radios; (2) a software library implementing SDI-12 communication protocol between any Arduino platform and SDI12-enabled sensors without the need for additional hardware (; and (3) 'midStream', a light-weight set of Python code that receives streaming sensor data, appends it with metadata on the fly by querying a relational database structured on an early version of the Observations Data Model version 2.0 (ODM2), and uses the WOFpy library to serve the data as WaterML via SOAP and REST web services.

  18. Camera link to HD-SDI interface converting system using FPGA%基于 FPGA 的 Camera Link 转 HD-SDI 接口转换系统

    Institute of Scientific and Technical Information of China (English)

    陈东成; 朱明; 郝志成; 刘剑


    Aiming at the shortcoming that Camera Link has complex interface and can only transfer in short distance,an interface converting system converting Camer Link to HD-SDI is designed.A high performance FPGA EP2S60F1020 of Altera Company is used to acquire the image data and code the data based on SMPTE 274M standard.To solve the problem that the horizontal and vertical time are different between Camera Link and HD-SDI,3 pieces of SDRAM are used as frame buffer.And the output frame of HD-SDI is delayed for a frame.The coded data is output to a serializer LMH0030, and the HD-SDI data is the output.As the vertical time of Camera Link and HD-SDI is not accurate the same,a frame must be dropped after every 708 frames.But the images being processed by the FP-GA are not dropped.The result shows that the system can convert images coming from Camera Link to HD-SDI.And the data output can be acquired by a SDI acquiring card.%由于 Camera Link 相机具有接口复杂、传输距离近等局限性,设计并实现了一种基于 FPGA 的 Camera Link 转HD-SDI 接口转换系统。该系统采用 Altera 公司的 EP2S60F1020高性能 FPGA 完成图像数据的采集并按 SMPTE 274M 标准编码;为解决 Camera Link 相机输出数据同 HD-SDI 输出图像行、场时间不同的问题,采用3片 SDRAM 作为帧缓存模块,延迟1帧输出;编码完成的数据输出到并串转换芯片 LMH0030,从而得到 HD-SDI 格式的视频输出。由于Camera Link 相机输出数据同 HD-SDI 输出图像的帧频并不绝对相同,每隔708帧必须丢去一帧数据,从而导致输出时固定丢帧,但 FPGA 对图像的处理并不会丢帧。实验结果表明,本系统能够将 Camera Link 相机输出的图像数据转换成HD-SDI 输出,并用采集卡采集到图像数据。

  19. Atlas of INSPIRE: Evaluating SDI Development through an Inventory of INSPIRE Experiences of European National Mapping Agencies

    NARCIS (Netherlands)

    De Vries, W.T.; Crompvoets, J.; Stoter, J.; VandenBerghe, I.


    The paper describes how practice of INSPIRE implementation are affecting Spatial Data Infrastructure (SDI) development. It contains the results of a EuroSDR (European Spatial Data Research) project ‘Atlas of INSPIRE implementation methods’. Aim of the project was to make an inventory of experiences

  20. Atlas of INSPIRE: Evaluating SDI Development through an Inventory of INSPIRE Experiences of European National Mapping Agencies

    NARCIS (Netherlands)

    De Vries, W.T.; Crompvoets, J.; Stoter, J.; VandenBerghe, I.


    The paper describes how practice of INSPIRE implementation are affecting Spatial Data Infrastructure (SDI) development. It contains the results of a EuroSDR (European Spatial Data Research) project ‘Atlas of INSPIRE implementation methods’. Aim of the project was to make an inventory of experiences

  1. Can subsurface drip irrigation (SDI) be a competitive irrigation system in the Great Plains region for commodity crops (United States)

    Subsurface drip irrigation (SDI) as with all microirrigation systems is typically only used on crops with greater value. In the U.S. Great Plains region, the typical irrigated crops are the cereal and oil seed crops and cotton. These crops have less economic revenue than typical microirrigated cro...

  2. Strategic impasse offense, defense and deterence theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Cimbala, S.J.


    The book is divided into three parts: the first section, scrutinizes the relationship between offense and defense and examines SDI and more inclusive strategic defense matters. It also questions the connection between policy objectives and force, and explores the complication of externalities, such as relations with allies. In section two, Cimbala reviews the operational art likely to be employed by the Soviets in a conventionally fought European war and defines and appraised the sensor-cyber revolution in technology and its impacts on preferred strategies. The final part, considers was termination scenarios and related issues, including superpower competition in the Third World, and explains how issues of sovereignty effect deterrence, avoidance, and future super power relations.

  3. Impaired long-term memory retention and working memory in sdy mutant mice with a deletion in Dtnbp1, a susceptibility gene for schizophrenia

    Directory of Open Access Journals (Sweden)

    Takao Keizo


    Full Text Available Abstract Background Schizophrenia is a complex genetic disorder caused by multiple genetic and environmental factors. The dystrobrevin-binding protein 1 (DTNBP1: dysbindin-1 gene is a major susceptibility gene for schizophrenia. Genetic variations in DTNBP1 are associated with cognitive functions, general cognitive ability and memory function, and clinical features of patients with schizophrenia including negative symptoms and cognitive decline. Since reduced expression of dysbindin-1 has been observed in postmortem brains of patients with schizophrenia, the sandy (sdy mouse, which has a deletion in the Dtnbp1 gene and expresses no dysbindin-1 protein, could be an animal model of schizophrenia. To address this issue, we have carried out a comprehensive behavioral analysis of the sdy mouse in this study. Results In a rotarod test, sdy mice did not exhibit motor learning whilst the wild type mice did. In a Barnes circular maze test both sdy mice and wild type mice learned to selectively locate the escape hole during the course of the training period and in the probe trial conducted 24 hours after last training. However, sdy mice did not locate the correct hole in the retention probe tests 7 days after the last training trial, whereas wild type mice did, indicating impaired long-term memory retention. A T-maze forced alternation task, a task of working memory, revealed no effect of training in sdy mice despite the obvious effect of training in wild type mice, suggesting a working memory deficit. Conclusion Sdy mouse showed impaired long-term memory retention and working memory. Since genetic variation in DTNBP1 is associated with both schizophrenia and memory function, and memory function is compromised in patients with schizophrenia, the sdy mouse may represent a useful animal model to investigate the mechanisms of memory dysfunction in the disorder.

  4. CAN/SDI: Experience with Multi-Source Computer Based Current Awareness Services in the National Science Library, Ottawa * (United States)

    Gaffney, Inez M.


    CAN/SDI is Canada's national Selective Dissemination of Information Service offering a choice of nine data bases to its scientific and technical community. The system is based on central processing at the National Science Library combined with the utilization of decentralized expertise and resources for profile formulation and user education. Its greatest strength lies in its wide interdisciplinary quality. The major advantage of centralized processing of many data bases is that Canadians need learn only one method of profile formulation to access many files. A breakdown of services used confirms that a single tape service does not cover all the information requirements of most users. On the average each profile accesses approximately 1.5 data bases. Constant subscriber growth and a low cancellation rate indicate that CAN/SDI is and will continue to be an important element in Canada's information system. PMID:4740714

  5. OneGeology Web Services and Portal as a global geological SDI - latest standards and technology (United States)

    Duffy, Tim; Tellez-Arenas, Agnes


    The global coverage of OneGeology Web Services ( and achieved since 2007 from the 120 participating geological surveys will be reviewed and issues arising discussed. Recent enhancements to the OneGeology Web Services capabilities will be covered including new up to 5 star service accreditation scheme utilising the ISO/OGC Web Mapping Service standard version 1.3, core ISO 19115 metadata additions and Version 2.0 Web Feature Services (WFS) serving the new IUGS-CGI GeoSciML V3.2 geological web data exchange language standard ( with its associated 30+ IUGS-CGI available vocabularies ( and Use of the CGI simpelithology and timescale dictionaries now allow those who wish to do so to offer data harmonisation to query their GeoSciML 3.2 based Web Feature Services and their GeoSciML_Portrayal V2.0.1 ( Web Map Services in the OneGeology portal ( Contributing to OneGeology involves offering to serve ideally 1:1000,000 scale geological data (in practice any scale now is warmly welcomed) as an OGC (Open Geospatial Consortium) standard based WMS (Web Mapping Service) service from an available WWW server. This may either be hosted within the Geological Survey or a neighbouring, regional or elsewhere institution that offers to serve that data for them i.e. offers to help technically by providing the web serving IT infrastructure as a 'buddy'. OneGeology is a standards focussed Spatial Data Infrastructure (SDI) and works to ensure that these standards work together and it is now possible for European Geological Surveys to register their INSPIRE web services within the OneGeology SDI (e.g. see The Onegeology portal ( is the first port of call for anyone

  6. An in-house alternative to traditional SDI services at Argonne National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Noel, R.E.; Dominiak, R.R.


    Selective Dissemination of Information (SDIs) are based on automated, well-defined programs that regularly produce precise, relevant bibliographic information. Librarians have typically turned to information vendors such as Dialog or STN international to design and implement these searches for their users in business, academia, and the science community. Because Argonne National Laboratory (ANL) purchases the Institute for Scientific Information (ISI) Current Contents tapes (all subject areas excluding Humanities). ANL scientists enjoy the benefit of in-house developments with BASISplus software programming and no longer need to turn to outside companies for reliable SDI service. The database and its customized services are known as ACCESS (Argonne Current Contents Electronic Search Service). Through collaboration with librarians on Boolean logic and selection of terms, users can now design their own personal profiles to comb the new data, thereby avoiding service fees from outside providers. Based on the feedback from scientists, it seems that this new service can help transform the ANL distributed libraries into more efficient central functioning entities that better serve the users. One goal is to eliminate the routing of paper copies of many new journal issues to different library locations for users to browse; instead users may be expected to rely more on electronic dissemination of both table of contents and customized SDIs for new scientific and technical information.

  7. Quorum Sensing N-acyl Homoserine Lactones-SdiA Suppresses Escherichia coli-Pseudomonas aeruginosa Conjugation through Inhibiting traI Expression (United States)

    Lu, Yang; Zeng, Jianming; Wu, Binning; E, Shunmei; Wang, Lina; Cai, Renxin; Zhang, Ni; Li, Youqiang; Huang, Xianzhang; Huang, Bin; Chen, Cha


    Conjugation is a key mechanism for horizontal gene transfer and plays an important role in bacterial evolution, especially with respect to antibiotic resistance. However, little is known about the role of donor and recipient cells in regulation of conjugation. Here, using an Escherichia coli (SM10λπ)-Pseudomonas aeruginosa (PAO1) conjugation model, we demonstrated that deficiency of lasI/rhlI, genes associated with generation of the quorum sensing signals N-acyl homoserine lactones (AHLs) in PAO1, or deletion of the AHLs receptor SdiA in the donor SM10λπ both facilitated conjugation. When using another AHLs-non-producing E. coli strain EC600 as recipient cells, deficiency of sdiA in donor SM10λπ hardly affect the conjugation. More importantly, in the presence of exogenous AHLs, the conjugation efficiency between SM10λπ and EC600 was dramatically decreased, while deficiency of sdiA in SM10λπ attenuated AHLs-inhibited conjugation. These data suggest the conjugation suppression function of AHLs-SdiA chemical signaling. Further bioinformatics analysis, β-galactosidase reporter system and electrophoretic mobility shift assays characterized the binding site of SdiA on the promoter region of traI gene. Furthermore, deletion of lasI/rhlI or sdiA promoted traI mRNA expression in SM10λπ and PAO1 co-culture system, which was abrogated by AHLs. Collectively, our results provide new insight into an important contribution of quorum sensing system AHLs-SdiA to the networks that regulate conjugation. PMID:28164039

  8. Evaluation of Spatial Development Initiatives: Case studies of the Maputo Development Corridor and the West Coast Investment Initiative


    David Bek; Ian Taylor


    Spatial Development Initiatives (SDIs) form an integral part of the South African government strategy to attract investment. SDIs are claimed to be short-term and targeted undertakings to foster economic growth. This working paper reviews two SDI projects, namely the Maputo Development Corridor (MDC) and the West Coast Investment Initiative (WCII). The paper outlines many strengths within the MDC and WCII and draws out lessons to be learned that could improve the delivery of ongoing and futur...

  9. Sorbitol dehydrogenase inhibitors (SDIs): a new potent, enantiomeric SDI, 4-[2-1R-hydroxy-ethyl)-pyrimidin-4-yl]piperazine-1-sulfonic acid dimethylamide. (United States)

    Mylari, B L; Oates, P J; Beebe, D A; Brackett, N S; Coutcher, J B; Dina, M S; Zembrowski, W J


    We report here on our medicinal chemistry and pharmacology efforts to provide a potent sorbitol dehydrogenase inhibitor (SDI) as a tool to probe a recently disclosed hypothesis centered on the role of sorbitol dehydrogenase (SDH) in the second step of the polyol pathway, under conditions of high glucose flux. Starting from a weak literature lead, 2, and through newly developed structure-activity relationships, we have designed and executed an unambiguous synthesis of enantiomeric SDI, 6, which is at least 10x more potent than 2. Also, 6 potently inhibits SDH in streptozotocin-diabetic rat sciatic nerve. We have described an expedient synthesis of a key building template, 33, for future research in the SDI area that may facilitate the discovery of even more potent SDIs with longer duration of action in vivo.

  10. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka


    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  11. Defense Infrastructure: Department of Defense Renewable Energy Initiatives (United States)


    AZ Solar PV (Bldg 1958) Clearwell Solar Photovoltaic Fully Operational May-10 No 2010 194 $ 448 $ 448 Appropriated 303...Dept Navy MCAS Yuma AZ Solar PV (Bldg 1958) Clearwell 194 194 Limited Contributes Contributes Contributes Contributes 303 Dept Navy MCAS Yuma AZ Solar

  12. Reagan and the Nuclear Freeze: "Stars Wars" as a Rhetorical Strategy. (United States)

    Bjork, Rebecca S.


    Analyzes the interaction between nuclear freeze activists and proponents of a Strategic Defense Initiative (SDI). Argues that SDI strengthens Reagan's rhetorical position concerning nuclear weapons policy because it reduces the argumentative ground of the freeze movement by envisioning a defensive weapons system that would nullify nuclear weapons.…

  13. Enterohemorrhagic Escherichia coli O157:H7 requires quorum sensing transcriptional regulators QseA and SdiA for colonization and persistence in the bovine intestinal tract (United States)

    QseA and SdiA are two of several transcriptional regulators that regulate virulence gene expression of enterohemorrhagic Escherichia coli (EHEC) O157:H7 via quorum sensing (QS). QseA regulates the expression of the locus of enterocyte effacement (LEE). LEE encodes for a type III secretion (T3S) sys...

  14. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses. (United States)

    Boyd, Robert S


    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  15. Department of Defense Energy Security Initiatives (United States)


    efficient powerplants (engines, motors, power storage, etc.), to identify ways to reduce fuel consumption affordably and sustain- ably, while sustaining (or...etc.) and is also exploring new technologies, such as ocean and wave harvesting. Solar power. Solar power is the largest contributor in the Air Force’s...effectively. The Navy installed the first wave power buoy at Marine Corps Base Kaneohe Bay, Hawaii, and is partnering with industry to test a second buoy. In

  16. Defense Systems Modernization and Sustainment Initiative (United States)


    necessary. 591 New @ RCM: Inspect elevation drive and motor . 222, 247, 284, 328, 393, 425, 455 LAV Engine Performance Data Collection Problem...such as a model year 2004 Honda CRV, 2005 Honda Element, 2008 Honda Fit, 2004 Volkswagen Passat, 2000 Dodge Grand Caravan, 2003 Jeep Liberty, and...2010 Volkswagen Golf. Simulators based on data collected from these vehicles provided a quick way to test code in development against pre-CAN format

  17. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.


    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  18. An Imaging Survey for Extrasolar Planets around 45 Close, Young Stars with SDI at the VLT and MMT

    CERN Document Server

    Biller, Beth A; Masciadri, Elena; Nielsen, Eric; Lenzen, Rainer; Brandner, Wolfgang; McCarthy, Donald; Hartung, Markus; Kellner, Stephan; Mamajek, Eric; Henning, Thomas; Miller, Douglas; Kenworthy, Matthew; Kulesa, Craig


    We present the results of a survey of 45 young ( 10 mag (5 sigma) at a separation of 0.5" from the primary star on 45% of our targets and H band contrasts of > 9 mag at a separation of 0.5'' on 80% of our targets. With this degree of attenuation, we should be able to image (5sigma detection) a 5 M_{Jup} planet 15 AU from a 70 Myr K1 star at 15 pc or a 5 M_{Jup} planet at 2 AU from a 12 Myr M star at 10 pc. We believe that our SDI images are the highest contrast astronomical images ever made from ground or space for methane rich companions <1'' from their star. For the best 20 of our survey stars, we attained 50% 5 sigma completeness for 6-10 M_Jup planets at semi-major axes of 20-40 AU. Thus, our completeness levels are sufficient to signif icantly test theoretical planet distributions. From our survey null result, we can rule out (at the 98% confidence/2.0sigma level) a model planet population using a planet distribution where N(a) $\\propto$ constant out to a distance of 45 AU (further model assumptions d...

  19. Developing a Web-based system by integrating VGI and SDI for real estate management and marketing

    Directory of Open Access Journals (Sweden)

    J. Salajegheh


    Full Text Available Property importance of various aspects, especially the impact on various sectors of the economy and the country's macroeconomic is clear. Because of the real, multi-dimensional and heterogeneous nature of housing as a commodity, the lack of an integrated system includes comprehensive information of property, the lack of awareness of some actors in this field about comprehensive information about property and the lack of clear and comprehensive rules and regulations for the trading and pricing, several problems arise for the people involved in this field. In this research implementation of a crowd-sourced Web-based real estate support system is desired. Creating a Spatial Data Infrastructure (SDI in this system for collecting, updating and integrating all official data about property is also desired in this study. In this system a Web2.0 broker and technologies such as Web services and service composition has been used. This work aims to provide comprehensive and diverse information about property from different sources. For this purpose five-level real estate support system architecture is used. PostgreSql DBMS is used to implement the desired system. Geoserver software is also used as map server and reference implementation of OGC (Open Geospatial Consortium standards. And Apache server is used to run web pages and user interfaces. Integration introduced methods and technologies provide a proper environment for various users to use the system and share their information. This goal is only achieved by cooperation between all involved organizations in real estate with implementation their required infrastructures in interoperability Web services format.

  20. p21{sup WAF1/Cip1/Sdi1} knockout mice respond to doxorubicin with reduced cardiotoxicity

    Energy Technology Data Exchange (ETDEWEB)

    Terrand, Jerome; Xu, Beibei; Morrissy, Steve; Dinh, Thai Nho [Department of Pharmacology,College of Medicine, University of Arizona, 1501 N. Campbell Ave, Tucson, AZ 85724 (United States); Williams, Stuart [Biomedical Engineering Program, College of Medicine, University of Arizona, 1501 N. Campbell Ave, Tucson, AZ 85724 (United States); Chen, Qin M., E-mail: [Department of Pharmacology,College of Medicine, University of Arizona, 1501 N. Campbell Ave, Tucson, AZ 85724 (United States)


    Doxorubicin (Dox) is an antineoplastic agent that can cause cardiomyopathy in humans and experimental animals. As an inducer of reactive oxygen species and a DNA damaging agent, Dox causes elevated expression of p21{sup WAF1/Cip1/Sdi1} (p21) gene. Elevated levels of p21 mRNA and p21 protein have been detected in the myocardium of mice following Dox treatment. With chronic treatment of Dox, wild type (WT) animals develop cardiomyopathy evidenced by elongated nuclei, mitochondrial swelling, myofilamental disarray, reduced cardiac output, reduced ejection fraction, reduced left ventricular contractility, and elevated expression of ANF gene. In contrast, p21 knockout (p21KO) mice did not show significant changes in the same parameters in response to Dox treatment. In an effort to understand the mechanism of the resistance against Dox induced cardiomyopathy, we measured levels of antioxidant enzymes and found that p21KO mice did not contain elevated basal or inducible levels of glutathione peroxidase and catalase. Measurements of 6 circulating cytokines indicated elevation of IL-6, IL-12, IFN{gamma} and TNF{alpha} in Dox treated WT mice but not p21KO mice. Dox induced elevation of IL-6 mRNA was detected in the myocardium of WT mice but not p21KO mice. While the mechanism of the resistance against Dox induced cardiomyopathy remains unclear, lack of inflammatory response may contribute to the observed cardiac protection in p21KO mice. -- Highlights: Black-Right-Pointing-Pointer Doxorubicin induces p21 elevation in the myocardium. Black-Right-Pointing-Pointer Doxorubicin causes dilated cardiomyopathy in wild type mice. Black-Right-Pointing-Pointer p21 Knockout mice are resistant against doxorubicin induced cardiomyopathy. Black-Right-Pointing-Pointer Lack of inflammatory response correlates with the resistance in p21 knockout mice.

  1. Developing a Web-based system by integrating VGI and SDI for real estate management and marketing (United States)

    Salajegheh, J.; Hakimpour, F.; Esmaeily, A.


    Property importance of various aspects, especially the impact on various sectors of the economy and the country's macroeconomic is clear. Because of the real, multi-dimensional and heterogeneous nature of housing as a commodity, the lack of an integrated system includes comprehensive information of property, the lack of awareness of some actors in this field about comprehensive information about property and the lack of clear and comprehensive rules and regulations for the trading and pricing, several problems arise for the people involved in this field. In this research implementation of a crowd-sourced Web-based real estate support system is desired. Creating a Spatial Data Infrastructure (SDI) in this system for collecting, updating and integrating all official data about property is also desired in this study. In this system a Web2.0 broker and technologies such as Web services and service composition has been used. This work aims to provide comprehensive and diverse information about property from different sources. For this purpose five-level real estate support system architecture is used. PostgreSql DBMS is used to implement the desired system. Geoserver software is also used as map server and reference implementation of OGC (Open Geospatial Consortium) standards. And Apache server is used to run web pages and user interfaces. Integration introduced methods and technologies provide a proper environment for various users to use the system and share their information. This goal is only achieved by cooperation between all involved organizations in real estate with implementation their required infrastructures in interoperability Web services format.

  2. Subsurface Drip Irrigation As a Methold to Beneficiallly Use Coalbed Methane Produced Water: Initial Impacts to Groundwater, Soil Water, and Surface Water

    Energy Technology Data Exchange (ETDEWEB)

    Engle, M.A.: Bern, C: Healy, R: Sams, J: Zupancic, J.: Schroeder, K.


    Coalbed methane (CBM) currently accounts for >8% of US natural gas production. Compared to traditional sources, CBM co-produces large volumes of water. Of particular interest is CBM development in the Powder River Basin of Wyoming and Montana, the 2nd largest CBM production field in the US, where CBM produced waters exhibit low to moderate TDS and relatively high sodium-adsorption ratio (SAR) that could potentially impact the surface environment. Subsurface drip irrigation (SDI) is an emerging technology for beneficial use of pre-treated CBM waters (injectate) which are emitted into the root zone of an agricultural field to aid in irrigation. The method is designed to minimize environmental impacts by storing potentially detrimental salts in the vadose zone. Research objectives include tracking the transport and fate of the water and salts from the injected CBM produced waters at an SDI site on an alluvial terrace, adjacent to the Powder River, Johnson County, Wyoming. This research utilizes soil science, geochemical, and geophysical methods. Initial results from pre-SDI data collection and the first 6-months of post-SDI operation will be presented. Substantial ranges in conductivity (2732-9830 {micro}S/cm) and dominant cation chemistry (Ca-SO{sub 4} to Na-SO{sub 4}) have been identified in pre-SDI analyses of groundwater samples from the site. Ratios of average composition of local ground water to injectate demonstrate that the injectate contains lower concentrations of most constituents except for Cr, Zn, and Tl (all below national water quality standards) but exhibits a higher SAR. Composition of soil water varies markedly with depth and between sites, suggesting large impacts from local controls, including ion exchange and equilibrium with gypsum and carbonates. Changes in chemical composition and specific conductivity along surface water transects adjacent to the site are minimal, suggesting that discharge to the Powder River from groundwater underlying the

  3. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean


    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  4. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.


    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  5. SADA-Sat : Sistema de Adquisición y Almacenamiento de Datos Ambientales por Protocolo SDI-12 con transmisión satelital


    Díaz, Bruno; Díaz, Emanuel; Pereyra, Hugo; Mercado, Gustavo; Diedrichs, Ana


    El artículo describe el diseño e implementación de un sistema de adquisición automática de datos ambientales cuyos datos son transmitidos por comunicación satelital. El sistema ha sido desarrollado para su uso en ambientes agrestes, de difícil acceso y con escasos medios de comunicación tradicional. Los datos ambientales se digitalizan a través de un circuito específico cercano al sensor y se envían mediante el protocolo bus serie inspirado en SDI-12 a la plataforma colectora de datos (DCP...

  6. Analysis of Defense Products Contract Trends, 1990-2014 (United States)


    Analysis of Defense Products Contract Trends , 1990–2014 Andrew Hunter—is a senior fellow in the International Security Program and director of the Defense...a decade, the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies (CSIS) has analyzed and reported on trends ...countervailing trend of divestments, including Northrop Grumman’s divestment of its shipbuilding business into Huntington Ingalls Industries. As

  7. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus


    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  8. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.


    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  9. Defense Mechanisms: A Bibliography. (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  10. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir


    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  11. A sulphur deficiency-induced gene, sdi1, involved in the utilization of stored sulphate pools under sulphur-limiting conditions has potential as a diagnostic indicator of sulphur nutritional status. (United States)

    Howarth, Jonathan R; Parmar, Saroj; Barraclough, Peter B; Hawkesford, Malcolm J


    A sulphate deficiency-induced gene, sdi1, has been identified by cDNA-amplified fragment length polymorphism (AFLP) analysis utilizing field-grown, nutrient-deficient wheat (Triticum aestivum var. Hereward). The expression of sdi1 was specifically induced in leaf and root tissues in response to sulphate deficiency, but was not induced by nitrogen, phosphorus, potassium or magnesium deficiency. Expression was also shown to increase in plant tissues as the external sulphate concentration in hydroponically grown plants was reduced from 1.0 to 0.0 mm. On this basis, sdi1 gene expression has potential as a sensitive indicator of sulphur nutritional status in wheat. Genome-walking techniques were used to clone the 2.7-kb region upstream of sdi1 from genomic DNA, revealing several cis-element motifs previously identified as being associated with sulphur responses in plants. The Arabidopsis thaliana gene most highly homologous to sdi1 is At5g48850, which was also demonstrated to be induced by sulphur deficiency, an observation confirmed by the analysis of microarray data available in the public domain. The expression of Atsdi1 was induced more rapidly than previously characterized sulphur-responsive genes in the period immediately following the transfer of plants to sulphur-deficient medium. Atsdi1 T-DNA 'knockout' mutants were shown to maintain higher tissue sulphate concentrations than wild-type plants under sulphur-limiting conditions, indicating a role in the utilization of stored sulphate under sulphur-deficient conditions. The structural features of the sdi1 gene and its application in the genetic determination of the sulphur nutritional status of wheat crops are discussed.

  12. Molecular mechanisms of epithelial host defense in the airways

    NARCIS (Netherlands)

    Vos, Joost Bastiaan


    Airway epithelial cells are indispensable for the host defense system in the lungs. Various strategies by which epithelial cells protect the lungs against inhaled pathogens have been described. In spite of that, the molecular mechanisms by which epithelial cells initiate and control the host defense

  13. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen


    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  14. Optimization research on SDI test technology monitoring influent water quality in reverse osmosis system%反渗透系统进水SDI测试技术的优化研究

    Institute of Scientific and Technical Information of China (English)

    王旭亮; 潘献辉; 郝军; 张艳萍


    淤泥密度指数(SDI)作为重要的水质参数可以有效评价反渗透系统进水水质.开展反渗透系统进水SDI测试技术研究,考察各种测试条件和进水性质对SDI的影响,优化测试方法,从而实现对SDI准确高效的监测与分析.结果表明,SDI测试结果与测试条件密切相关,它随着测试时间间隔的缩短而增大,随着测试体积的增加而减小,随着测试水温的升高,SDI值会有增大的趋势,随着压力的增加,SDI值也会明显地增大;低浊度是反渗透系统进水的必要条件,测试时需控制进水的浊度在0.10 NTU以下.%Alstraet:Silt density index (SDI) is an important water quality parameter for evaluating influent water quality of reverse osmosis system.A research on SDI test technology monitoring influent water quality in reverse osmosis system was carried out.The effects of different conditions and influent water characteristics on SDI were investigated,and then,an optimized testing method was put forward,so as to realize the accurate and efficient monitoring of SDI.The test results showed that,SDI values were closely related to test conditions:it increased with the shortening of time interval between tests; decreased with the increasing of water sample volume; furthermore,along with the increasing of water temperature and pressure,SDI value also increased obviously.As low turbidity was a necessary characteristic of the influent water of reverse osmosis system,the turbidity of water sample should be controlled below 0.10 NTU during the SDI test.

  15. β- transitions of 16 7N9 → 16 8O8 with optimized SDI residual interaction using pnTDA and TDA approximations (United States)

    Pahlavani, M. R.; Firoozi, B.


    Within a developed particle-hole approach, a systematic study of the β- transition from the ground state of the 16N nucleus to the ground and some exited states of the 16O nucleus has been carried out. The energy spectrum and the wave functions of pure configuration of the 16N and 16O nuclei are numerically obtained using the mean-field shell model with respect to the Woods-Saxon nuclear potential accompanying spin-orbit and Coulomb interaction. Considering SDI residual interaction, mixed configuration of ground and excited pnTDA and TDA states are extracted for the aforementioned nucleus. These energy spectra and corresponding eigenstates are highly correspondent to the experimental energy spectrum and eigenstates after adjusting the residual potential parameters using the Nelder-Mead (NM) algorithm. In this approach, the endpoint energy, log ft and the partial half-lives of some possible transitions are calculated. The obtained results using the optimized SDI approach are reasonably close to the available experimental data.

  16. Defense and the Economy (United States)


    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  17. Rethinking Defensive Information Warfare (United States)


    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  18. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin


    @@ Following the start of its first test run on August 20, 2009, the website of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  19. Department of Defense (DOD) Military Casualty/Wounded Warrior (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  20. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting (United States)


    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  1. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting (United States)


    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  2. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...


    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI


    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  4. Evaluation of the impact of quorum sensing transcriptional regulator SdiA on long-term persistence and fecal shedding of Escherichia coli O157:H7 in weaned calves (United States)

    Quorum sensing transcriptional regulator SdiA has been shown to enhance the survival of Escherichia coli O157:H7 (O157) in the acidic compartment of bovine rumen in response to N-acyl-L-homoserine lactones (AHLs) produced by the rumen bacteria. Bacteria that survive the rumen environment subsequentl...

  5. Insanity Defense: Past, Present, and Future. (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney


    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  6. Defense styles of pedophilic offenders. (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas


    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  7. Defense Research Enterprise Assessment (United States)


    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  8. AFRL Defensive IO Programs (United States)


    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  9. Defense Business Transformation (United States)


    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  10. Robust Preallocated Preferential Defense. (United States)


    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  11. Avian host defense peptides. (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P


    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  12. A Defense Budget Primer (United States)


    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  13. Defensive Minefield Planning (United States)


    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  14. Establishing a Department of Defense Program Management Body of Knowledge (United States)


    Initiation, Implementation, and Termination (19:10-11). Another definition can be gained from Dr David Cleland, in his text Project Management Strategies...The Defense Systems Management College (DSMC) was established in 1971 under the direction of Deputy Secretary of Defense David Packard (5:5).. The...intelligence activities, cryptological activities, omand and control, equipment that is an integral part of a weapon or weapon system, equipment critical

  15. Plant Defense against Insect Herbivores (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren


    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  16. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren


    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  17. 基于FPGA的SDI到Camera Link视频接口转换系统设计%Design of Video Interface Conversion System from SDI to Camera Link Based on FPGA

    Institute of Scientific and Technical Information of China (English)

    朱超; 刘艳滢; 董月芳


    Aimed at camera with SDI interface output, a video interface conversion system that transforms SDI input into Camera Link output is designed and implemented, and Xilinx Corporation' s Spartan-3E XC3S250E is used as the main control chip. The cable equalizing, data retiming and video decoding circuit of SDI signal, and the data stream de-interweave, storage, color space conversion and the Camera Link timing generator module of FPGA are introduced in detail. Combined with actual application, the SDI video signal output from camera can be input into the frame grabber with the Camera Link interface by this system, which makes video displaying and processing more conveniently.%针对具有SDI接口输出的相机,采用Xilinx公司Spartan-3E系列的XC3S250E作为主控制芯片,设计并实现了由SDI输入到Camera Link输出的视频接口转换系统.详细介绍了SDI信号的电缆均衡、重新定时锁相、解码电路以及FPGA的数据流解交织、存储、彩色空间变换和Camera Link时序发生模块等.该系统结合实际应用,可使相机输出的SDI视频信号经转换后输入到具有Camera Link接口的图像采集卡上,便于图像的显示和处理.

  18. Identification and Characterization of Sex-Associated Loci in Sockeye Salmon Using Genotyping-by-Sequencing and Comparison with a Sex-Determining Assay Based on the sdY Gene. (United States)

    Larson, Wesley A; McKinney, Garrett J; Seeb, James E; Seeb, Lisa W


    Loci that can be used to screen for sex in salmon can provide important information for study of both wild and cultured populations. Here, we tested for associations between sex and genotypes at thousands of loci available from a genotyping-by-sequencing (GBS) dataset to discover sex-associated loci in sockeye salmon (Oncorhynchus nerka). We discovered 7 sex-associated loci, developed high-throughput assays for 2 loci, and tested the utility of these 2 assays in 8 collections of sockeye salmon sampled throughout North America. We also screened an existing assay based on the master sex-determining gene in salmon (sdY) in these collections. The ability of GBS-derived loci to assign fish to their phenotypic sex varied substantially among collections suggesting that recombination between the loci that we discovered and the sex-determining gene has occurred. Assignment accuracy to phenotypic sex was much higher with the sdY assay but was still less than 100%. Alignment of sequences from GBS-derived loci to draft genomes for 2 salmonids provided strong evidence that many of these loci are found on chromosomes orthologous to the known sex chromosome in sockeye salmon. Our study is the first to describe the approximate location of the sex-determining region in sockeye salmon and indicates that sdY is also the master sex-determining gene in this species. However, discordances between sdY genotypes and phenotypic sex and the variable performance of GBS-derived loci warrant more research.


    Directory of Open Access Journals (Sweden)

    Constantin PREDA


    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  20. American Bar Association Supplementary Guidelines for the Mitigation Function of Defense Teams in Death Penalty Cases: Implications for Social Work (United States)

    Andrews, Arlene Bowers


    When a client faces a penalty of death, defense attorneys may call on social workers in many capacities: mitigation specialist, expert witness, consulting specialist, direct witness, or defense-initiated victim outreach worker. The American Bar Association set forth standards for capital defense attorneys, which led an interdisciplinary team to…

  1. ASI/SDI transport stream player based on FPGA design and implementation%基于FPGA的ASI/SDI码流播放器的设计与实现

    Institute of Scientific and Technical Information of China (English)

    许盛世; 方志强; 俞东雷


    随着数字技术的发展,数字产品的普及,各种数字电视工作人员专用测试工具不断被开发.针对码流播放器的市场需要的目的,采用基于FPGA的系统架构的方法,结合硬件及软件设计等方面内容,文中详细介绍了一个包含码流录制、码流播放、码流分析等多种功能的ASI/SDI码流播放器的设计与实现的过程.%With the development of digital technology,the popularity of digital products,all kinds of digital TV staff special test tools for continuous was developed.For the market need of TS-Player,with the method based on FPGA system structure,this paper introduces the process of ASI/SDI code flow player design and implementation in detail from hardware and software design,etc.,which contains code flow recording,code flow play,code flow analysis and so on the many kinds of functions.

  2. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas


    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  3. Nanomaterials for Defense Applications (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  4. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova


    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  5. Defensive engagement and perceptual enhancement


    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.


    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  6. Ballistic Missile Defense System (BMDS) (United States)


    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  7. Herbivores can select for mixed defensive strategies in plants. (United States)

    Carmona, Diego; Fornoni, Juan


    Resistance and tolerance are the most important defense mechanisms against herbivores. Initial theoretical studies considered both mechanisms functionally redundant, but more recent empirical studies suggest that these mechanisms may complement each other, favoring the presence of mixed defense patterns. However, the expectation of redundancy between tolerance and resistance remains unsupported. In this study, we tested this assumption following an ecological genetics field experiment in which the presence/absence of two herbivores (Lema daturaphila and Epitrix parvula) of Datura stramonium were manipulated. In each of three treatments, genotypic selection analyses were performed and selection patterns compared. Our results indicated that selection on resistance and tolerance was significantly different between the two folivores. Tolerance and resistance are not redundant defense strategies in D. stramonium but instead functioned as complementary defenses against both beetle species, favoring the evolution of a mixed defense strategy. Although each herbivore was selected for different defense strategies, the observed average tolerance and resistance were closer to the adaptive peak predicted against E. parvula and both beetles together. In our experimental population, natural selection imposed by herbivores can favor the evolution of mixed defense strategies in plants, accounting for the presence of intermediate levels of tolerance and resistance.

  8. Insights from human studies into the host defense against candidiasis. (United States)

    Filler, Scott G


    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections.

  9. FY 1972-1976 Defense Program and the 1972 Defense Budget. (United States)


    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  10. Defense Modernization Plans Through the 2020s: Addressing the Bow Wave (United States)


    Johns Hopkins University’s School of Advanced International Studies. He is a term member of the Council on Foreign Relations and was named one of...45 p.m. Chair: Andrew Hunter, Senior Fellow in the International Security Program, Director of Defense-Industrial Initiatives Group, Center for...Strategic International Studies Defense Modernization Plans Through the 2020s: Addressing the Bow Wave Todd Harrison, Director, Defense Budget Analysis

  11. European Missile Defense and Russia (United States)


    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  12. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren


    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  13. Laboratory evaluation of the Design Analysis Associates DAA H-3613i radar water-level sensor—Results of temperature, distance, and SDI-12 tests (United States)

    Carnley, Mark V.


    The Design Analysis Associates (DAA) DAA H-3613i radar water-level sensor (DAA H-3613i), manufactured by Xylem Incorporated, was evaluated by the U.S. Geological Survey (USGS) Hydrologic Instrumentation Facility (HIF) for conformance to manufacturer’s accuracy specifications for measuring a distance throughout the sensor’s operating temperature range, for measuring distances from 3 to 15 feet at ambient temperatures, and for compliance with the SDI-12 serial-to-digital interface at 1200-baud communication standard. The DAA H-3613i is a noncontact water-level sensor that uses pulsed radar to measure the distance between the radar and the water surface from 0.75 to 131 feet over a temperature range of −40 to 60 degrees Celsius (°C). Manufacturer accuracy specifications that were evaluated, the test procedures that followed, and the results obtained are described in this report. The sensor’s accuracy specification of ± 0.01 feet (± 3 millimeters) meets USGS requirements for a primary water-stage sensor used in the operation of a streamgage. The sensor met the manufacturer’s stated accuracy specifications for water-level measurements during temperature testing at a distance of 8 feet from the target over its temperature-compensated operating range of −40 to 60 °C, except at 60 °C. At 60 °C, about half the measurements exceeded the manufacturer’s accuracy specification by not more than 0.005 feet.The sensor met the manufacturer’s stated accuracy specifications for water-level measurements during distance-accuracy testing at the tested distances from 3 to 15 feet above the water surface at the HIF.

  14. Initiative in the Operational Defense--Is It Possible? (United States)


    and his staff had reasoned the Japan- ese offensive would begin on 15 March. On 6 March Mutaguchi launched the 33d Division across the Manipur River...Imphal. Slim diverted the third brigade to Manipur . Having taken these immediate arrangements Slim told the XV Corps commander to get the 7th Indian

  15. Department of Defense Energy Initiatives: Background and Issues for Congress (United States)


    tactical vehicles and applications. Required by February 1, 2010, this assessment must consider domestically-produced algae -based, biodiesel and...disruption. Strategic challenges and risks relate to getting fuel to the overseas operating area, and ensuring the global free flow of oil . As part of its...some accounts the largest organizational user of petroleum in the world.4 DOD consumed about 117 million barrels of oil in FY2011.5 • Even so, DOD’s

  16. Moral and Morale Benefits of the Strategic Defense Initiative. (United States)


    Deterrence," Air University Review, July-August 1985, p. 37. 2.Ibid., p. 39. 3. Francis Schaffer, Vladimir Bukovsky, and James Hitchcock , Who Is For...p ’*~~ - - ~ -------- - - - - - - - - CONTINUED_ ____ 15. Jonathan Schell, The Fate of the Earth, (New York: Alfred A. Knopf, 1982), pp. 56, 57. 16

  17. Reengineering the Department of Defense: the Corporate Information Management initiative


    Ott, Michael F.


    Approved for public release, distribution unlimited In order to operate effectively in the 1990s and beyond. the DoD must improve its management and business processes. To accomplish this. the DoD has just released its "Corporate Information Management (CIM) Strategic Plan for the 21st Century." A number of independent studies, relating to CIM, have also recently been completed. This paper compares and evaluates the CIM Strategic Plan, the independent studies, and recognized methodologies ...

  18. NATO and EU/European Defense Initiatives: Competitive or Complementary (United States)


    Française et Sa Majesté le Roi de Grande- Bretagne , d’Irlande et des Territoires britanniques au-delà des mers, Empereur des Indes, …Résolus à se prêter... Bretagne , signé le 4 mars 1947 à Dunkerque,” available from ; Internet; accessed 11 October 2005. 3 The Benelux States

  19. The Navy Biofuel Initiative Under the Defense Production Act (United States)


    the end of 2012, and “Great Green Fleet” by 2016 fueled in part with a 50/50 blend of hydrotreated renewable jet fuel (biofuel). The Navy proposes to...Osprey, and the MH-60S Seahawk to operate on HRJ-5, a 50/50 blend of hydrotreated renewable fuel (HRJ) and conventional JP-5.5 Hydrotreated refers...propellant ranged from $1.55 to $2.87 per gallon.14 In 2009, DLA awarded small contracts for hydrotreated renewable fuel (HRJ-5 jet fuel) that ranged in

  20. The Department of Defense and Climate Change: Initiating the Dialogue (United States)


    newsletters . The RECs facilitate partnerships and collaboration efforts within and among these groups. An example of the relevance of climate change to the...shoreline/barrier island dynamics under wave/current forcings; vegetated wetland morphology under sea level rise and extreme event storm activity

  1. An initial model of the computation viewpoint for a spatial data infrastructure

    CSIR Research Space (South Africa)

    Cooper, Antony K


    Full Text Available , the Actors and the Use Cases; and B. Identify the core components of an SDI and their relations. Six SDI-Actors have been defined: Policy Maker; Producer (of data or services); Provider (of data or services); Broker; Value Added Reseller (VAR) and End... required interface). 5. UML Component Diagram of SDI The proposed Component Diagram for modelling an SDI from a Computation Viewpoint is shown in Figure 3. The Commission proposes that an SDI is composed of six service components based largely...

  2. Origins of the Strategic Defense Initiative: Ballistic Missile Defense, 1944-1983 (United States)


    stories about various inventors who claimed to have developed "death rays" that could kill animals and people. One of the most famous was Nikola Testla...1 " Tesla , at 78, Bares New ’Death-Beam’," New York Times, 11 July 1934, p. 18. For other stories about death rays, see "Says He Sold ’Death Ray’: H

  3. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan


    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  4. 76 FR 22878 - Defense Transportation Regulation, Part IV (United States)


    ... Command (USTRANSCOM), DoD. ACTION: Notice. SUMMARY: DOD has issued draft business rules for the electronic... electronic payments for NTS at all Military Services and Coast Guard installations is the goal of the Defense Personal Property Program (DP3). The initial rollout of the TPPS and the electronic payment process for...

  5. Pattern Recognition Receptors in Innate Immunity, Host Defense, and Immunopathology (United States)

    Suresh, Rahul; Mosser, David M.


    Infection by pathogenic microbes initiates a set of complex interactions between the pathogen and the host mediated by pattern recognition receptors. Innate immune responses play direct roles in host defense during the early stages of infection, and they also exert a profound influence on the generation of the adaptive immune responses that ensue.…

  6. Quadrennial Defense Review and Ballistic Missile Defense Review (United States)


    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  7. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)



    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  8. Defense Meteorological Satellite Program (DMSP) (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  9. Defense Spending and the Economy (United States)


    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  10. Theater Missile Defense Integration Issues (United States)


    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  11. Ballistic Missile Defense: Let's Look Again before We Leap into Star Wars. (United States)

    Morrison, David C.


    Americans must look beyond the superficial allure of President Reagan's Strategic Defense Initiative; they must search out the facts. Five pernicious myths on which this ill-considered proposal is founded are discussed. (RM)

  12. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  13. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  14. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel


    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  15. β{sup -} transitions of {sub 7}{sup 16}N{sub 9} → {sub 8}{sup 16}O{sub 8} with optimized SDI residual interaction using pnTDA and TDA approximations

    Energy Technology Data Exchange (ETDEWEB)

    Pahlavani, M.R.; Firoozi, B. [University of Mazandaran, Department of Nuclear Physics, Faculty of Basic Science, P.O. Box 47415-416, Babolsar (Iran, Islamic Republic of)


    Within a developed particle-hole approach, a systematic study of the β{sup -} transition from the ground state of the {sup 16}N nucleus to the ground and some exited states of the {sup 16}O nucleus has been carried out. The energy spectrum and the wave functions of pure configuration of the {sup 16}N and {sup 16}O nuclei are numerically obtained using the mean-field shell model with respect to the Woods-Saxon nuclear potential accompanying spin-orbit and Coulomb interaction. Considering SDI residual interaction, mixed configuration of ground and excited pnTDA and TDA states are extracted for the aforementioned nucleus. These energy spectra and corresponding eigenstates are highly correspondent to the experimental energy spectrum and eigenstates after adjusting the residual potential parameters using the Nelder-Mead (NM) algorithm. In this approach, the endpoint energy, log ft and the partial half-lives of some possible transitions are calculated. The obtained results using the optimized SDI approach are reasonably close to the available experimental data. (orig.)

  16. 22 CFR 103.7 - Initiation of administrative enforcement proceedings. (United States)


    ... REGULATIONS FOR IMPLEMENTATION OF THE CHEMICAL WEAPONS CONVENTION AND THE CHEMICAL WEAPONS CONVENTION... Commerce, the respondent (or respondent's agent for service of process or attorney) of the initiation of... new matter the respondent believes supports a defense or claim of mitigation. Any defense or...

  17. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein


    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  18. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.


    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  19. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen


    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  20. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry (United States)


    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  1. Defense Acquisition Performance Assessment Report (United States)


    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  2. Defense Financial and Investment Review (United States)


    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  3. In Defense of Darwin's Theory. (United States)

    Naylor, Bruce G.; Handford, Paul


    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  4. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou


    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  5. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit


    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  6. Multidimensional Perfectionism and Ego Defenses (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.


    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  7. Multidimensional Perfectionism and Ego Defenses (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.


    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  8. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)


    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  9. Inflation Adjustments for Defense Acquisition (United States)


    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  10. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense. (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  11. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What? (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  12. Predicting Schedule Duration for Defense Acquisition Programs: Program Initiation to Initial Operational Capability (United States)


    65  x Figure 22: Pie Chart of Standard Betas ... Corporation found that increases in schedule effort tend to be the reason for increases in the cost of acquiring a new weapons system due to, at a finance and schedule data for selected programs (Brown et al., 2015). We also give extra focus on Research Development Test & Evaluation

  13. Department of Defense PERSEREC (DOD PERSEREC) (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  14. 22 CFR 120.6 - Defense article. (United States)


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  15. 22 CFR 120.9 - Defense service. (United States)


    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  16. Defense Procurement Strategy for a Globalized Industry (United States)


    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  17. Defense Acquisition Research Journal. Volume 21, Number 2, Issue 69 (United States)


    Competition, sponsored by our partner organization, the Defense Acquisition University Alumni Association (DAUAA) at For 2014...initiation to satisfaction . Organizations Involved in Resolution of Urgent Needs The organizations examined in this article that support, develop...sef c c = > Where: ef = measure of effectiveness on interval (0, 1) os = level of satisfaction of the objective (rated on a scale of 0 to 1) oc = cost

  18. Open Architecture as an Enabler for FORCEnet Cruise Missile Defense (United States)


    battlespace via the FORCEnet information network. Current capability gaps include a lack of common configuration and Fire Control Quality ( FCQ ...connectivity among platforms that is needed to achieve and maintain a robust cruise missile defense. FCQ is defined as data obtained with the sufficient...platform, or a combination of the two. With Fire Control Quality ( FCQ ) threat data from a remote sensor, the remote unit can initiate a launch

  19. Review and Implementation Status of Prior Defense Business Board Recommendations (United States)


    Executive Service (SES) Corps • Performance-Based Management • Leadership Orientation Course • SES and Flag Officer Diversity • Outplacement ...localized initiatives to support BRAC outplacement /re-alignment for personnel – USD (P&R) will re-look at DBB recommendations • Recommendations – None OUTPLACEMENT ASSISTANCE (in connection with Base Realignment and Closure (BRAC)) December 2006 Defense Business Board Quarterly Meeting 18

  20. Defense Science Board Task Force Report on Cyber Defense Management (United States)


    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  1. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance (United States)


    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  2. Austere Defense: Challenges and Opportunities (United States)


    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  3. Western Hemisphere Defense Policy Statement (United States)


    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  4. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2


    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  5. Defense Acquisition Workforce: Actions Needed to Guide Planning Efforts and Improve Workforce Capability (United States)


    past, some hiring decisions made by DOD components using the Defense Acquisition Workforce Development Fund exceeded initial 2010 career field...contracting and engineering career fields are largely the result of high attrition rates and difficulty in hiring qualified personnel. Despite these...revised career field goals or issued guidance on the use of the Defense Acquisition Workforce Development Fund to guide future hiring decisions . In

  6. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP) (United States)


    FUE - First Unit Equipped IOT &E - Initial Operational Test and Evaluation Missile Milestones SAR Baseline Dev Est Current APB Development...Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense Switched Network Econ...Milestone c FUE IOT &E Start Complete Full Rate Production Deci... AcQuisition Increment 2 Milestone C Lightweight Launcher FUE IOT &E Start

  7. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade


    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  8. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn


    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  9. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton


    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  10. Electronic Commerce: A National Performance Review Initiative. (United States)


    Copy 33 of 38 copies i f i I 1 3 IDA DOCUMENT D-1729 ELECTRONIC COMMERCE : A NATIONAL PERFORMANCE REVIEW INITIATIVE ID^I ^ reflecting the official position of any Government Agency. IDA DOCUMENT D-1729 ELECTRONIC COMMERCE : A NATIONAL PERFORMANCE REVIEW INITIATIVE...implementation of electronic commerce , as part of the Nil, so that IDA will be well prepared to support the work of the Defense Information Systems Agency

  11. Defensive weapons and defense signals in plants: some metabolites serve both roles. (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan


    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  12. Just in time: circadian defense patterns and the optimal defense hypothesis. (United States)

    Baldwin, Ian T; Meldau, Stefan


    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  13. Cyber Defense: An International View (United States)


    Protection), available from html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  14. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo


    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  15. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F


    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  16. Department of Defense Expenditure Plans (United States)


    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  17. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin


    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  18. Secure and defensive high self-esteem. (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua


    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  19. The methodological defense of realism scrutinized. (United States)

    Wray, K Brad


    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  20. Initial Study

    DEFF Research Database (Denmark)

    Torp, Kristian


    Congestion is a major problem in most cities and the problem is growing (Quiroga, 2000) (Faghri & Hamad, 2002). When the congestion level is increased the drivers notice this as delays in the traffic (Taylor, Woolley, & Zito, 2000), i.e., the travel time for the individual driver is simply...... increased. In the initial study presented here, the time it takes to pass an intersection is studied in details. Two major signal-controlled four-way intersections in the center of the city Aalborg are studied in details to estimate the congestion levels in these intersections, based on the time it takes...

  1. Korean Defense Industry: Threat or Ally? (United States)


    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  2. Implementing an Integrated Network Defense Construct (United States)


    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary


    Directory of Open Access Journals (Sweden)

    Laszlo STICZ


    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  4. Integrated Air and Missile Defense (IAMD) (United States)


    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  5. Offset implementations for Turkey's International Defense Acquisitions



    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...


    Directory of Open Access Journals (Sweden)

    Saeed Bagheri


    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  7. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy. (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin


    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  8. Defense mutualisms enhance plant diversification. (United States)

    Weber, Marjorie G; Agrawal, Anurag A


    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  9. The insanity defense: Related issues (United States)

    Asokan, T. V.


    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  10. Defensive anality and anal narcissism. (United States)

    Shengold, L


    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  11. Nrf2 and cardiovascular defense. (United States)

    Howden, Reuben


    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  12. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden


    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  13. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats (United States)


    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  14. An Assessment of Artificial Intelligence and Expert Systems Technology for Application to Management of Cockpit Systems. (United States)


    terrain aids (e.g. SITAN - Sandia Inertial Terrain - Aided Navigation). Expert Navigator consists of two parts, a "Resource Manager" and a "Mission...pulse code modulation RENEX - Rendezvous Expert System SDI - Stragetic Defense Initiative SITAN - Sandia Inertial Terrain TAC - Tactical Air Command TI

  15. Arabidopsis phospholipase Dδ is involved in basal defense and nonhost resistance to powdery mildew fungi

    DEFF Research Database (Denmark)

    Pinosa, Francesco; Buhot, Nathalie; Kwaaitaal, Mark Adrianus Cornelis J


    Plants have evolved a complex array of defensive responses against pathogenic microorganisms. Recognition of microbes initiates signaling cascades that activate plant defenses. The membrane lipid phosphatidic acid, produced by phospholipase D (PLD), has been shown to take part in both abiotic...... and biotic stress signaling. In this study, the involvement of PLD in the interaction between Arabidopsis (Arabidopsis thaliana) and the barley powdery mildew fungus Blumeria graminis f. sp. hordei (Bgh) was investigated. This nonadapted pathogen is normally resisted by a cell wall-based defense, which stops....... In conclusion, we propose that PLD is involved in defense signaling in nonhost resistance against powdery mildew fungi and put PLDδ forward as the main isoform participating in this process....

  16. Serine/threonine protein phosphatases: multi-purpose enzymes in control of defense mechanisms. (United States)

    Bajsa, Joanna; Pan, Zhiqiang; Duke, Stephen O


    Depending on the threat to a plant, different pattern recognition receptors, such as receptor-like kinases, identify the stress and trigger action by appropriate defense response development. The plant immunity system primary response to these challenges is rapid accumulation of phytohormones, such as ethylene (ET), salicylic acid (SA), and jasmonic acid (JA) and its derivatives. These phytohormones induce further signal transduction and appropriate defenses against biotic threats. Phytohormones play crucial roles not only in the initiation of diverse downstream signaling events in plant defense but also in the activation of effective defenses through an essential process called signaling pathway crosstalk, a mechanism involved in transduction signals between two or more distinct, "linear signal transduction pathways simultaneously activated in the same cell."

  17. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military... (United States)


    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  18. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board (United States)


    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  19. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense... (United States)


    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  20. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board... (United States)


    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  1. Risk Management Programs for Defense Acquisition Systems (United States)


    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  2. Protecting the Self: Defense Mechanisms in Action (United States)

    Cramer, Phebe


    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  3. U.S. Cybersecurity Defense Assessment (United States)


    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  4. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours


    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  5. Openness initiative

    Energy Technology Data Exchange (ETDEWEB)

    Duncan, S.S. [Los Alamos National Lab., NM (United States)


    Although antinuclear campaigns seem to be effective, public communication and education efforts on low-level radioactive waste have mixed results. Attempts at public information programs on low-level radioactive waste still focus on influencing public opinion. A question then is: {open_quotes}Is it preferable to have a program focus on public education that will empower individuals to make informed decisions rather than trying to influence them in their decisions?{close_quotes} To address this question, a case study with both quantitative and qualitative data will be used. The Ohio Low-Level Radioactive Waste Education Program has a goal to provide people with information they want/need to make their own decisions. The program initiated its efforts by conducting a statewide survey to determine information needed by people and where they turned for that information. This presentation reports data from the survey and then explores the program development process in which programs were designed and presented using the information. Pre and post data from the programs reveal attitude and knowledge shifts.

  6. Physics of a ballistic missile defense - The chemical laser boost-phase defense (United States)

    Grabbe, Crockett L.


    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  7. Defensive externality and blame projection following failure. (United States)

    Hochreich, D J


    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  8. Primitive defenses: cognitive aspects and therapeutic handling. (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  9. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández


    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  10. Defense Science Board Summer Study on Autonomy (United States)


    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  11. The Application of Box–Cox Transformation to Determine the Standardised Precipitation Index (SPI, the Standardised Discharge Index (SDI and to Identify Drought Events: Case Study in Eastern Kujawy (Central Poland

    Directory of Open Access Journals (Sweden)

    Bartczak Arkadiusz


    Full Text Available The article presents the results of research into the transformation of series of hydro-meteorological data for determining dry periods with the Standardised Precipitation Index (SPI and the Standardised Discharge Index (SDI. Time series from eight precipitation stations and five series of river discharge data in Eastern Kujawy (central Poland were analysed for 1951–2010. The frequency distribution of the series for their convergence with the normal distribution was tested with the Shapiro–Wilk test and homogeneity with the Bartlett's test. The transformation of the series was done with the Box–Cox technique, which made it possible to homogenise the series in terms of variance. In Poland, the technique has never been used to determine the SPI. After the transformation the distributions of virtually all series complied with the normal distribution and were homogeneous. Moreover, a statistically significant correlation between the δ transformation parameter and the skewness of the series of monthly precipitation was observed. It was similar for the series of mean monthly discharges in the winter half-year and the hydrological year. The analysis indicates an alternate occurrence of dry and wet periods both in case of precipitation and run-offs. Drought periods coincided with low flow periods. Thus, the fluctuations tend to affect the development of agriculture more than long-term ones.

  12. Optimal defense strategy: storage vs. new production. (United States)

    Shudo, Emi; Iwasa, Yoh


    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  13. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli


    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  14. Physcomitrella patens Activates Defense Responses against the Pathogen Colletotrichum gloeosporioides

    Directory of Open Access Journals (Sweden)

    Guillermo Reboledo


    Full Text Available The moss Physcomitrella patens is a suitable model plant to analyze the activation of defense mechanisms after pathogen assault. In this study, we show that Colletotrichum gloeosporioides isolated from symptomatic citrus fruit infects P. patens and cause disease symptoms evidenced by browning and maceration of tissues. After C. gloeosporioides infection, P. patens reinforces the cell wall by the incorporation of phenolic compounds and induces the expression of a Dirigent-protein-like encoding gene that could lead to the formation of lignin-like polymers. C. gloeosporioides-inoculated protonemal cells show cytoplasmic collapse, browning of chloroplasts and modifications of the cell wall. Chloroplasts relocate in cells of infected tissues toward the initially infected C. gloeosporioides cells. P. patens also induces the expression of the defense genes PAL and CHS after fungal colonization. P. patens reporter lines harboring the auxin-inducible promoter from soybean (GmGH3 fused to β-glucuronidase revealed an auxin response in protonemal tissues, cauloids and leaves of C. gloeosporioides-infected moss tissues, indicating the activation of auxin signaling. Thus, P. patens is an interesting plant to gain insight into defense mechanisms that have evolved in primitive land plants to cope with microbial pathogens.

  15. Advanced power sources for space missions (United States)

    Gavin, Joseph G., Jr.; Burkes, Tommy R.; English, Robert E.; Grant, Nicholas J.; Kulcinski, Gerald L.; Mullin, Jerome P.; Peddicord, K. Lee; Purvis, Carolyn K.; Sarjeant, W. James; Vandevender, J. Pace


    Approaches to satisfying the power requirements of space-based Strategic Defense Initiative (SDI) missions are studied. The power requirements for non-SDI military space missions and for civil space missions of the National Aeronautics and Space Administration (NASA) are also considered. The more demanding SDI power requirements appear to encompass many, if not all, of the power requirements for those missions. Study results indicate that practical fulfillment of SDI requirements will necessitate substantial advances in the state of the art of power technology. SDI goals include the capability to operate space-based beam weapons, sometimes referred to as directed-energy weapons. Such weapons pose unprecedented power requirements, both during preparation for battle and during battle conditions. The power regimes for these two sets of applications are referred to as alert mode and burst mode, respectively. Alert-mode power requirements are presently stated to range from about 100 kW to a few megawatts for cumulative durations of about a year or more. Burst-mode power requirements are roughly estimated to range from tens to hundreds of megawatts for durations of a few hundred to a few thousand seconds. There are two likely energy sources, chemical and nuclear, for powering SDI directed-energy weapons during the alert and burst modes. The choice between chemical and nuclear space power systems depends in large part on the total duration during which power must be provided. Complete study findings, conclusions, and eight recommendations are reported.

  16. Defense Innovation and Industrialization in South Korea


    Moon, Chung-in; Paek, Jae-Ok


    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  17. Strategies for Dealing with the Defense Budget (United States)


    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  18. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)


    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  19. Whiteflies interfere with indirect plant defense against spider mites in Lima bean

    NARCIS (Netherlands)

    Zhang, P.J.; Zheng, S.J.; Loon, van J.J.A.; Boland, W.; David, A.; Mumm, R.; Dicke, M.


    Plants under herbivore attack are able to initiate indirect defense by synthesizing and releasing complex blends of volatiles that attract natural enemies of the herbivore. However, little is known about how plants respond to infestation by multiple herbivores, particularly if these belong to differ

  20. Reducing Defensive Responses to Thoughts of Death: Meditation, Mindfulness, and Buddhism. (United States)

    Park, Young Chin; Pyszczynski, Tom


    Three studies investigated the effects of meditation on responses to reminders of death. Study 1 took a quasi-experimental approach, comparing defensive responses to mortality salience (MS) of South Korean participants with varying levels of experience with Buddhism and meditation. Whereas non-Buddhists without meditation showed the typical increase in worldview defense after mortality salience (MS), this effect was not found among non-Buddhists immediately after an initial meditation experience, nor among lay Buddhists who meditated regularly or Buddhist monks with intensive meditation experience. Study 2, a fully randomized experiment, showed that MS increased worldview defense among South Koreans at a meditation training who were assessed before meditating but not among participants assessed after their first meditation experience. Study 3 showed that whereas American students without prior meditation experience showed increased worldview defense and suppression of death-related thoughts after MS, these effects were eliminated immediately after an initial meditation experience. Death thought accessibility mediated the effect of MS on worldview defense without meditation, but meditation eliminated this mediation. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. [Study of defense styles, defenses and coping strategies in alcohol-dependent population]. (United States)

    Ribadier, A; Varescon, I


    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  2. Security Assistance and Cooperation: Shared Responsibility of the Departments of State and Defense (United States)


    MODA Section 1081, P.L. 112-81 (3)) Provides management, training, and other support Yes Wales (formerly Warsaw) Initiative Fund (Activities...Initially designed for Afghanistan, the Ministry of Defense Advisors Program ( MODA ) was established as a global authority by the FY2012 NDAA (P.L...112-81, Section 1081, as amended). MODA enables senior DOD civilian experts to advise their counterparts abroad on matters such as personnel and

  3. Defense Meteorological Satellite Program (DMSP) Film (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  4. Happiness and Defense Styles in Psychiatrists. (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury


    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  5. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai


    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  6. Formerly Used Defense Sites (FUDS) Public Properties (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  7. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force (United States)


    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  8. Defense Downsizing and Blacks in the Military (United States)


    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  9. Guam: U.S. Defense Deployments (United States)


    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  10. [Medical Service of the Estonian Defense Forces]. (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A


    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  11. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)


    Following the start of its first test run on August 20, 2009, the website of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  12. Carp erythrodermatitis: host defense-pathogen interaction.


    Pourreau, C.N.


    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  13. The Future of Theater Missile Defense (United States)


    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  14. Department of Defense Recovering Warrior Task Force (United States)


    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  15. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO


    Overhaus, Marco


    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  16. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri


    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  17. Interchromosomal huddle kickstarts antiviral defense. (United States)

    Schoenfelder, Stefan; Fraser, Peter


    Long-distance chromosomal interactions are emerging as a potential mechanism of gene expression control. In this issue, Apostolou and Thanos (2008) describe how viral infection elicits interchromosomal associations between the interferon-beta (IFN-beta) gene enhancer and DNA binding sites of the transcription factor NF-kappaB, resulting in the initiation of transcription and an antiviral response.

  18. Department of Defense Healthcare Management System Modernization (DHMSM) (United States)


    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  19. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory (United States)


    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  20. 78 FR 25853 - Defense Logistics Agency Privacy Program (United States)


    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  1. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act (United States)


    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  2. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV... (United States)


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  3. Evaluating the European Defense Force (United States)


    and Haitian Armed Forces ( FADH ) had initiated joint patrolling operations. This caused no small amount of angst among a populace who expected removal...sincerity of US intentions and contributed to demobilizing the FRAPH elements. In one instance a firefight broke out among Marine forces and FADH elements...that helped convince the local populace and 50 later, the rest of the country, that it was not in the US plan to retain and bolster FADH forces.26

  4. A Laboratory for Characterizing the Efficacy of Moving Target Defense (United States)


    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  5. The future of planetary defense (United States)

    Mainzer, A.


    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  6. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims (United States)


    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  7. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case... (United States)


    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  8. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois


    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  9. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.


    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  10. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.


    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  11. Coordinating the Global Information Grid Initiative with the NG9-1-1 Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Michael Schmitt


    As the Department of Defense develops the Global Information Grid, the Department of Transportation develops the Next Generation 9-1-1 system. Close examinations of these initiatives show that the two are similar in architectures, applications, and communications interoperability. These similarities are extracted from the lowest user level to the highest commander rank that will be involved in each network. Once the similarities are brought into perspective, efforts should be made to collaborate between the two departments.

  12. DCT-based cyber defense techniques (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer


    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  13. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco


    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  14. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study. (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich


    The aim of this exploratory study was to assess the impact of clinicians' defense mechanisms-defined as self-protective psychological mechanisms triggered by the affective load of the encounter with the patient-on adherence to a communication skills training (CST). The population consisted of oncology clinicians (N=31) who participated in a CST. An interview with simulated cancer patients was recorded prior and 6 months after CST. Defenses were measured before and after CST and correlated with a prototype of an ideally conducted interview based on the criteria of CST-teachers. Clinicians who used more adaptive defense mechanisms showed better adherence to communication skills after CST than clinicians with less adaptive defenses (F(1, 29) =5.26, p=0.03, d=0.42). Improvement in communication skills after CST seems to depend on the initial levels of defenses of the clinician prior to CST. Implications for practice and training are discussed. Communication has been recognized as a central element of cancer care [1]. Ineffective communication may contribute to patients' confusion, uncertainty, and increased difficulty in asking questions, expressing feelings, and understanding information [2, 3], and may also contribute to clinicians' lack of job satisfaction and emotional burnout [4]. Therefore, communication skills trainings (CST) for oncology clinicians have been widely developed over the last decade. These trainings should increase the skills of clinicians to respond to the patient's needs, and enhance an adequate encounter with the patient with efficient exchange of information [5]. While CSTs show a great diversity with regard to their pedagogic approaches [6, 7], the main elements of CST consist of (1) role play between participants, (2) analysis of videotaped interviews with simulated patients, and (3) interactive case discussion provided by participants. As recently stated in a consensus paper [8], CSTs need to be taught in small groups (up to 10

  15. Antiviral Defense Mechanisms in Honey Bees (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.


    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  16. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)


    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  17. Salt, chloride, bleach, and innate host defense. (United States)

    Wang, Guoshun; Nauseef, William M


    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  18. Salt, chloride, bleach, and innate host defense (United States)

    Wang, Guoshun; Nauseef, William M.


    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  19. American Bar Association Supplementary Guidelines for the Mitigation Function of Defense Teams in Death Penalty Cases: implications for social work. (United States)

    Andrews, Arlene Bowers


    When a client faces a penalty of death, defense attorneys may call on social workers in many capacities: mitigation specialist, expert witness, consulting specialist, direct witness, or defense-initiated victim outreach worker. The American Bar Association set forth standards for capital defense attorneys, which led an interdisciplinary team to produce the "Supplementary Guidelines for the Mitigation Function of Defense Teams in Death Penalty Cases" to promote the exceptional competence and diligence required when the consequence is life or death. This article summarizes the "Supplementary Guidelines," with implications for social work practice--that is, professional responsibility, competence, interviewing skill, knowledge of behavioral and mental impairment, records review, life history compilation, data interpretation, witness support, law-related knowledge, and testimony. The social work, which is scrutinized in a court of law, requires cultural competence, diverse oral and written communication skills, diligence, and the highest ethical standards.

  20. Active infrared systems: possible roles in ballistic missile defense? (United States)

    Paleologue, A.


    Active Infra-Red (IR) systems developed in the past ten years are now available for missile defense applications. The main purpose of this paper is to describe the advantages an active IR system could offer to a ballistic missile defense (BMD). The active IR system considered in this paper is a LIDAR (LIght Detection And Ranging) system. Historically, the Lincoln Laboratory in the USA began using lasers in the early 1960's. The initial applications included the development of a LIDAR system enabling the measurement of the distance between the earth and the moon in 1962. Satellite tracking using LIDAR began early in 1973. Today, technological developments, with the miniaturization of systems and increased performance levels, have enabled new ambitious projects such as the Discrimination Interceptor Technology Program (DITP) program started in 1998 and the use of LIDAR to help in the discrimination of future exo-atmospheric interceptors within the framework of BMD. The first part of this paper presents the possible contribution of LIDAR to BMD: the main roles, objectives, and strategic advantages. The second part gives a brief overview of the technological features of a generic LIDAR instrument, rapidly addressing laser sources, detectors, optics and electronics. Finally, a modeling of an IR LIDAR system, limited solely to direct detection, and an estimation of performance levels will be presented. A list of possible IR active discriminators will be then presented on the basis of the previous analysis and proposed as new constraints in the design of discrete objects.

  1. Towards a European Defense Identity Compatible with NATO

    Directory of Open Access Journals (Sweden)

    Rafael Estrella


    Full Text Available The European Security and Defense Identity (ESDI is a common but not defined goal, due to disagreements among Europeans on its political content. Reasons to explain this are related to the resistance to the idea of a European defense authority, fears of German hegemony, and the conviction that Europe is uncapable of defending herselfwithout the assistance of the United States. Estrella states that, with the end of the Cold War, some arguments opposing ESDI lost weight. However, the evolution and restructuring of NATO is not the product of European initiative, but rather an element of the U.S.strategy in Europe. Moreover, while the U.S. has a global strategy, Europe has not yet defined its security interests neither globally nor regionally. The author reviews the steps undertaken by NATO and the WEU towards further collaboration and the development of a European identity. He wonders whether there is enough political will either in Europe or the U.S. to overcome archaic views on trans-atlantic relations and narrow concepts about the future of Europe.

  2. Directed Energy Missions for Planetary Defense


    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M


    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  3. SERDP-ESTCP Depot Cd/Chromate Replacement Initiative (United States)


    ESTCP SERDP Environmental Technology Development Process Office of the Deputy Under Secretary of Defense - Installations and Environment 4...SERDP-ESTCP Depot Cd/ Chromate Replacement Initiative Robin Nissan Weapons Systems and Platforms Program Manager ASETSDefense 18 November 2014...NOV 2014 2. REPORT TYPE 3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE SERDP-ESTCP Depot Cd/ Chromate Replacement Initiative 5a

  4. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses. (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y


    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  5. Function of ABA in Stomatal Defense against Biotic and Drought Stresses

    Directory of Open Access Journals (Sweden)

    Chae Woo Lim


    Full Text Available The plant hormone abscisic acid (ABA regulates many key processes involved in plant development and adaptation to biotic and abiotic stresses. Under stress conditions, plants synthesize ABA in various organs and initiate defense mechanisms, such as the regulation of stomatal aperture and expression of defense-related genes conferring resistance to environmental stresses. The regulation of stomatal opening and closure is important to pathogen defense and control of transpirational water loss. Recent studies using a combination of approaches, including genetics, physiology, and molecular biology, have contributed considerably to our understanding of ABA signal transduction. A number of proteins associated with ABA signaling and responses—especially ABA receptors—have been identified. ABA signal transduction initiates signal perception by ABA receptors and transfer via downstream proteins, including protein kinases and phosphatases. In the present review, we focus on the function of ABA in stomatal defense against biotic and abiotic stresses, through analysis of each ABA signal component and the relationships of these components in the complex network of interactions. In particular, two ABA signal pathway models in response to biotic and abiotic stress were proposed, from stress signaling to stomatal closure, involving the pyrabactin resistance (PYR/PYR-like (PYL or regulatory component of ABA receptor (RCAR family proteins, 2C-type protein phosphatases, and SnRK2-type protein kinases.

  6. RNA in defense: CRISPRs protect prokaryotes against mobile genetic elements. (United States)

    Jore, Matthijs M; Brouns, Stan J J; van der Oost, John


    The CRISPR/Cas system in prokaryotes provides resistance against invading viruses and plasmids. Three distinct stages in the mechanism can be recognized. Initially, fragments of invader DNA are integrated as new spacers into the repetitive CRISPR locus. Subsequently, the CRISPR is transcribed and the transcript is cleaved by a Cas protein within the repeats, generating short RNAs (crRNAs) that contain the spacer sequence. Finally, crRNAs guide the Cas protein machinery to a complementary invader target, either DNA or RNA, resulting in inhibition of virus or plasmid proliferation. In this article, we discuss our current understanding of this fascinating adaptive and heritable defense system, and describe functional similarities and differences with RNAi in eukaryotes.

  7. Peripheral and central mediators of lipopolysaccharide induced suppression of defensive rage behavior in the cat. (United States)

    Bhatt, S; Bhatt, R S; Zalcman, S S; Siegel, A


    Based upon recent findings in our laboratory that cytokines microinjected into the medial hypothalamus or periaqueductal gray (PAG) powerfully modulate defensive rage behavior in cat, the present study determined the effects of peripherally released cytokines following lipopolysaccharide (LPS) challenge upon defensive rage. The study involved initial identification of the effects of peripheral administration of LPS upon defensive rage by electrical stimulation from PAG and subsequent determination of the peripheral and central mechanisms governing this process. The results revealed significant elevation in response latencies for defensive rage from 60 to 300 min, post LPS injection, with no detectable signs of sickness behavior present at 60 min. In contrast, head turning behavior elicited by stimulation of adjoining midbrain sites was not affected by LPS administration, suggesting a specificity of the effects of LPS upon defensive rage. Direct administration of LPS into the medial hypothalamus had no effect on defensive rage, suggesting that the effects of LPS were mediated by peripheral cytokines rather than by any direct actions upon hypothalamic neurons. Complete blockade of the suppressive effects of LPS by peripheral pretreatment with an Anti-tumor necrosis factor-alpha (TNFalpha) antibody but not with an anti- interleukin-1 (IL-1) antibody demonstrated that the effects of LPS were mediated through TNF-alpha rather than through an IL-1 mechanism. A determination of the central mechanisms governing LPS suppression revealed that pretreatment of the medial hypothalamus with PGE(2) or 5-HT(1A) receptor antagonists each completely blocked the suppressive effects of LPS, while microinjections of a TNF-alpha antibody into the medial hypothalamus were ineffective. Microinjections of -Iodo-N-[2-[4-(methoxyphenyl)-1-piperazinyl]ethyl]-N-(2-pyridinyl) benzamide monohydrochloride (p-MPPI) into lateral hypothalamus (to test for anatomical specificity) had no effect upon

  8. The Full Costs of Ballistic Missile Defense (United States)


    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  9. Defense Acquisitions: Assessments of Selected Weapon Programs (United States)


    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  10. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha


    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  11. Techniques for Combined Arms for Air Defense (United States)


    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  12. Enhancing Air Base Defense Through Joint Doctrine (United States)


    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  13. Preemptive strikes: Fear, hope, and defensive aggression. (United States)

    Halevy, Nir


    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  14. 75 FR 32416 - Defense Science Board (United States)


    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  15. Defense Advanced Research Projects Agency Strategic Plan (United States)


    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  16. Cost Effective Regional Ballistic Missile Defense (United States)


    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  17. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.


    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  18. Defense Science and Technology Success Stories (United States)


    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  19. Rigorous Cyberspace Defense Expert Training Moves Forward (United States)


    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  20. Schools Enlisting Defense Industry to Boost STEM (United States)

    Trotter, Andrew


    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  1. Host Defense against Opportunist Microorganisms Following Trauma. (United States)


    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  2. Defense Acquisition Transformation: Report to Congress (United States)


    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  3. Non-Traditional Commercial Defense Contractors (United States)


    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  4. The DDN (Defense Data Network) Course, (United States)


    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  5. The equal effectiveness of different defensive strategies (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming


    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  6. Short guide to SDI profiling at ORNL

    Energy Technology Data Exchange (ETDEWEB)

    Pomerance, H.S.


    ORNL has machine-searchable data bases that correspond to printed indexes and abstracts. This guide describes the peculiarities of those several data bases and the conventions of the ORNL search system so that users can write their own queries or search profiles and can interpret the part of the output that is encoded.

  7. SDI Large-Scale System Technology Study. (United States)


    actions of an opponent, by the world (random, entropic changes, and projections of fully and partially specified trajectories), by one’s own forces...due to the normal distribution of functions and capabilities among individuals. Distributed AI work represents a shift in paradigm from a focus upon...problem, to a view of a distributed collection of assets that cooperatively accomplish a given function [13]. Such a paradigm shift often leads to

  8. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata


    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  9. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan (United States)


    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  10. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore


    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  11. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  12. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan. (United States)


    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  13. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis (United States)


    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  14. Defense programs occurrence analysis report for third quarter CY-1991

    Energy Technology Data Exchange (ETDEWEB)


    The quarterly Defense Programs Occurrence Analysis Report (DPOAR) is compiled by the Office of Self-Assessment and Emergency Management (DP-9). It utilizes the Occurrence Reporting and Processing System (ORPS) data to assess the quality and effectiveness of the reporting process and the significance of the occurrences. In addition, areas where further improvement and corrective actions are necessary is fully demonstrated by an analysis of the data. The results of the assessment may also be used as the basis for conducting other evaluations such as the diagnostic and augmented evaluations. This quarterly report provides feedback to DOE/DP and contractor management to improve the control of operations and achieve a higher standard of excellence. The report analyzes one year of ORPS data at the end of each calendar quarter, therefore, the performance of DP Field Offices and facilities will be continuously compared to their past quarter and yearly performances. During this assessment from 1 October 1990 through 30 September 1991, there were a number of initiatives that were undertaken by Field Office management to improve the overall performance and the quality of the Occurrence Reporting and Processing System. These initiatives include the training of their staff for self-assessment activities. These intiatives can be found in the programs implemented according to the DOE Conduct of Operations and Occurrence Reporting and Processing of Operations Information Orders. These initiatives were found to be, based on the ORPS data, stronger at Albuquerque, Nevada, Oak Ridge Field Offices and Richland DP facilities.

  15. The US-Japan Alliance: Sharing the Burden of Defense (United States)


    expenditures to GNP. Japan Is also far down the list in defense spending per capita, behind nations such as Sweden, Australia, and Canada. Table 1.2 compares...TABLES Figures 1.1 Trends in Japanese Defense Spending ................. 14 Tables 1.1 Defense Expenditures of Major Countries ............... 12 1.2...Percentage Breakdown of Japanese Defense Expenditures by Category, FY 1977-1981 ............ 40 3.3 Disposition of US Forces in Japan

  16. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting (United States)


    ... Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that the Defense Intelligence Agency Advisory Board, will meet on March 22 and 23, 2010....

  17. 76 FR 20336 - Defense Audit Advisory Committee (DAAC) (United States)


    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Defense Audit Advisory Committee (DAAC) AGENCY: Under Secretary of Defense... (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as...

  18. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain (United States)


    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  19. Urban Youth, Fear of Crime, and Resulting Defensive Actions. (United States)

    Williams, J. Sherwood; And Others


    Used data from 1,775 urban youth collected in 1986 to examine fear of crime and defensive actions taken by youth. Results revealed that only 11% reported having taken no defensive actions as result of fear of crime. Nearly three-fifths took precaution of having escort at night. Learning self-defense techniques was reported by 19%; 10% indicated…

  20. Department of Defense DOD Freedom of Information Act Program (United States)


    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  1. 76 FR 5729 - Department of Defense Personnel Security Program (PSP) (United States)


    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  2. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP (United States)


    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  3. 77 FR 46653 - Defense Logistics Agency Privacy Program (United States)


    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  4. Children's Use of Defenses and Self-Esteem Management. (United States)

    Hay, Deborah

    Children's use of defenses to maintain or enhance self-esteem was investigated. Attention was given to four questions: Do children with different levels of self-esteem differ in (1) the frequency with which they employ defenses? (2) kinds of emotions they defend against? (3) the kinds of social situations which elicit their defensive responses?…

  5. 32 CFR 644.333 - Screening for defense needs. (United States)


    ... 32 National Defense 4 2010-07-01 2010-07-01 true Screening for defense needs. 644.333 Section 644... Screening for defense needs. Real property which becomes excess to the needs of any element of the Army or... the property is excess to the needs of the using command, without screening for other requirements....

  6. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.


    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  7. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    P.G.J. Roosenboom (Peter); T. van der Goot


    textabstractThe central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO

  8. Defense Management: Comprehensive Cost Information and Analysis of Alternatives Needed to Assess Military Posture in Asia (United States)


    dependents, and/or military forces located in Misawa, Yokota, Camp Zama, Yokusuka, Atsugi, Iwakuni , Kadena, and Futenma (see fig. 6). For example...Japan Air Defense Command headquarters to Yokota Air Base, relocating a carrier air wing from Atsugi to Iwakuni , consolidating several Marine Corps...Dollars) Estimated costse Posture initiative United States Japan Total Japan Carrier air wing ,moving from Atsugi to Iwakuni Not yet estimateda

  9. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting (United States)


    ... of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence... a closed meeting of the Defense Intelligence Agency National Intelligence University Board...

  10. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1 (United States)


    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  11. Intelligent systems for strategic power infrastructure defense (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  12. The Plus 50 Initiative Evaluation: Initiative Impact (United States)

    American Association of Community Colleges (NJ1), 2012


    The American Association of Community Colleges (AACC), with funding from The Atlantic Philanthropies, created the Plus 50 Initiative (2008-2012). This initiative was designed to build the capacity of community colleges nationwide to develop programming that engages the plus 50 learner. This report contains: (1) An overview of the Plus 50…

  13. Digital Array Radar for Ballistic Missile Defense and Counter-Stealth Systems Analysis and Parameter Tradeoff Study (United States)


    Missile BMD Ballistic Missile Defense CAS Computer Algebra System CDD Capability Development Document CONOPS Concept of Operations CONUS Continental...this section. Analysis and calculations described in this section were conducted using Waterloo Maple® 7 Computer Algebra System (CAS). Initially...When two or more electromagnetic waves combine, their electric fields are integrated vectorially at each point in space for any

  14. Mixed-Initiative Cyber Security: Putting humans in the right loop

    Energy Technology Data Exchange (ETDEWEB)

    Haack, Jereme N.; Fink, Glenn A.; Maiden, Wendy M.; McKinnon, Archibald D.; Fulp, Errin W.


    In recent years, organizations and their computer infrastructures have grown intertwined in complex relationships through mergers, acquisitions, reorganizations, and cooperative service delivery. Defensive actions and policy changes by one organization may have far-reaching negative consequences on its partner organizations. Human-only or machine-only approaches are insufficient. The former are slow but highly adaptable, while the latter are fast but highly specialized. In either case, humans retain the ultimate responsibility for the actions of their automated systems. Deploying automated defenses does not absolve humans of their inherent responsibility. We believe the solution lies in mixed-initiative defense unifying the complementary qualities of both human- and machine-based approaches. We describe the Cooperative Infrastructure Defense (CID), a new cyber-defense paradigm employing complex-adaptive swarm intelligence, logical rational agents, and human insight to enable collaborative cyber defense among cooperating organizations in an infrastructure setting. CID takes a mixed-initiative approach to infrastructure defense where teams of humans and software agents defend cooperating organizations in tandem, sharing insights and solutions without violating proprietary boundaries. CID will help create security policy via dialogue between humans and agents, foster a collaborative problem-solving environment, and increase human situational awareness and influence through visualization and shared control. CID will provide a foundation for building trust between humans and agents within and between organizations.

  15. Validity of Self-Report Measures of Defense Mechanisms (United States)

    Mehlman; Slane


    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  16. Insect response to plant defensive protease inhibitors. (United States)

    Zhu-Salzman, Keyan; Zeng, Rensen


    Plant protease inhibitors (PIs) are natural plant defense proteins that inhibit proteases of invading insect herbivores. However, their anti-insect efficacy is determined not only by their potency toward a vulnerable insect system but also by the response of the insect to such a challenge. Through the long history of coevolution with their host plants, insects have developed sophisticated mechanisms to circumvent antinutritional effects of dietary challenges. Their response takes the form of changes in gene expression and the protein repertoire in cells lining the alimentary tract, the first line of defense. Research in insect digestive proteases has revealed the crucial roles they play in insect adaptation to plant PIs and has brought about a new appreciation of how phytophagous insects employ this group of molecules in both protein digestion and counterdefense. This review provides researchers in related fields an up-to-date summary of recent advances.

  17. National Defense Budget Estimates for FY 2012 (United States)


    Military Construction, Navy Reserve 21,708 26,299 26,299 26,299 Military Construction, Air Force Reserve 25,986 33,620 33,620 33,620 Chemical Demil ...Air Force Reserve 7,634 Chemical Demil Construction, Defense 75,312 13,071,701 Appropriation 13,071,701 Budget Authority 13,071,701 TOA...7.00 3.00 Defense Prod Act 59.00 25.00 16.00 Chemical Demil 53.00 30.00 15.00 2.00 RDT&E Army 34.28 48.72 11.33 3.17 1.70 0.80 Navy 36.87 50.51 9.82

  18. Northwest Manufacturing Initiative (United States)


    warehouse. If the batch of lenses is faulty, the manufacturer wants to know ASAP in order to send Visionary Lenses a new batch of lenses. The manufacturer ...increased. • A few years ago, Nike started using pre-consumer Nike Grind – (scrap material from their manufacturing facilities) – in new ...Northwest ( in particular with firms in the manufacturing eco-system of defense supply chains). Special emphasis was placed to increase the

  19. Initialized Fractional Calculus (United States)

    Lorenzo, Carl F.; Hartley, Tom T.


    This paper demonstrates the need for a nonconstant initialization for the fractional calculus and establishes a basic definition set for the initialized fractional differintegral. This definition set allows the formalization of an initialized fractional calculus. Two basis calculi are considered; the Riemann-Liouville and the Grunwald fractional calculi. Two forms of initialization, terminal and side are developed.

  20. Is European Defense a Bridge too Far? (United States)


    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  1. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José


    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  2. Information on Japanese Defensive Installations and Tactics (United States)


    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  3. Research on Nonlinear Dynamics with Defense Applications (United States)


    numerical verifications, we have experimentally realized the scheme by using a Duffing -type of nonlinear electronic oscillator (originally developed by C...circuits In defense applications it may be desirable to induce chaos in nonlinear oscillators operating in a stable regime. Examples of such oscillators ...evolutions of the target Duffing circuit and deliver resonant perturbations to generate robust chaotic attractors. A brief account of the work has been

  4. Defense Trade Data: Sources and Recommendations (United States)


    detailed trade information on such products may be difficult. Recent U.S. concerns have ranged from dependency on rare earths and first level products...BHUTAN BR INDIAN OCEAN TERR EGYPT INDIA IRAN IRAQ ISRAEL JORDAN KOWAIT LEBANON LIBYA MALDIVES MOROCCO NEPAL OMAN PAKISTAN QATAR SAODI...specifically designed or developed for military application and any computer specifically modified for use with any defense article in any category of

  5. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux


    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  6. Russian Ballistic Missile Defense: Rhetoric and Reality (United States)


    2012/06/08/russia_installs_new_radars_as_a_ deterrent_15834.html. 130. “Direct Line with Vladimir Putin ,” President of Russia , April 17, 2014...and increases the danger of war. In his 2012 pre-election treatise on defense policy and national security, Rus- sian President Vladimir Putin ...Kontsern PVO Almaz-Antey) was established by President Vladimir Putin in 2002 uniting no fewer than 46 enterprises, including factories, research and

  7. Implications of Germany's declining defense spending


    Merrath, Jurgen


    With its reunification on 3 October 1990, Germany regained its full sovereignty and stands now in a position of greater global responsibility. Faced with dramatically increased demands on and expectations for Germany's armed forces, it must answer the question of how much it is willing to invest for safety and stability in Europe and for protection of peace in the world. In determining the level of commitment behind Germany's foreign and security policy, defense spending is an important indic...

  8. The Defense of Henderson Field, Guadalcanal (United States)


    of US airpower an4 know disruption ofsuch power is critical to achieving their goals. Most US airpower operates from airbases, which can be...Vandegrift remained in his defensive positions because he did not know the size, strength, location, or intentions of the Japanese main body.67 Ichiki...Parachute/Raider Battalion. 75 Edson deployed his 830 men South of Henderson Field in a series of mut ~ally supporting strongnolds. He was flanked to

  9. A Content Analysis of Defense Budget Rhetoric (United States)


    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  10. Affordability Constraints in Major Defense Acquisitions (United States)


    price , this is actually an inverse supply curve. In competitive markets, the inverse supply curve is the firm’s marginal cost curve. When firms have features and functions. The vertical axis represents the unit sale price , inclusive of all life-cycle or total ownership costs as appropriate...Three Defense Programs 3 We can easily extend the example to incorporate cost - plus payment schemes

  11. Defense Horizons. Number 78, March 2015 (United States)


    databases , National Defense University researchers have identified 124 examples of effective P4s across a wide spectrum of industries and...environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000 examples of public-public and public...Partnering,” SONRI, Inc., 2010. 8 Farming First, “Innovation and Incentives for Farmers Needed to Protect World’s Biodiversity ,” press release, May 21

  12. United States Civil Military Relations: Defense Reform (United States)


    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  13. Department of Defense Energy Management Plan, 1980 (United States)


    Energy Usage in Existing Buildings . .......... .111-29 111-11 Timetable for Developing Utility Efficiency Standards ................. .......... the Defense Energy Emergency Planning System (DEEMS) document (Appendix A). The purpose of the DEEMS is to assure the availabilty of fuels to the...unleaded gasoline usage , y 1985. It is anticipated that sufficient supplies of ’alcohol and non-petroleum derived fuel will be available. DoD’s

  14. Defense Primer: A Guide for New Members (United States)


    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  15. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense (United States)


    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral...

  16. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders. (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R


    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  17. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.


    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  18. Inducible defenses in prey intensify predator cannibalism. (United States)

    Kishida, Osamu; Trussell, Geoffrey C; Nishimura, Kinya; Ohgushi, Takayuki


    Trophic cascades are often a potent force in ecological communities, but abiotic and biotic heterogeneity can diffuse their influence. For example, inducible defenses in many species create variation in prey edibility, and size-structured interactions, such as cannibalism, can shift predator diets away from heterospecific prey. Although both factors diffuse cascade strength by adding heterogeneity to trophic interactions, the consequences of their interactioh remain poorly understood. We show that inducible defenses in tadpole prey greatly intensify cannibalism in predatory larval salamanders. The likelihood of cannibalism was also strongly influenced by asymmetries in salamander size that appear to be most important in the presence of defended prey. Hence, variation in prey edibility and the size structure of the predator may synergistically affect predator-prey population dynamics by reducing prey mortality and increasing predator mortality via cannibalism. We also suggest that the indirect effects of prey defenses may shape the evolution of predator traits that determine diet breadth and how trophic dynamics unfold in natural systems.

  19. Tsunami Defense Efforts at Samcheok Port, Korea (United States)

    Cho, Y. S.


    Tsunamis mainly triggered by impulsive undersea motions are long waves and can propagate a long distance. Thus, they can cause huge casualties not only neighboring countries but also distant countries. Recently, several devastating tsunamis have been occurred around the Pacific Ocean rim. Among them, the Great East Japan tsunami occurred on March 11, 2011 is probably recorded as one of the most destructive tsunamis during last several decades. The Tsunami killed more than 20,000 people (including missing people) and deprived of property damage of approximately 300 billion USD. The eastern coast of the Korean Peninsula has been attacked historically by unexpected tsunami events. These tsunamis were generated by undersea earthquakes occurred off the west coast of Japan. For example, the Central East Sea Tsunami occurred on May 26, 1983 killed 3 people and caused serious property damage at Samcheok Port located at the eastern coast of Korea. Thus, a defense plan against unexpected tsunami strikes is an essential task for the port authority to protect lives of human beings and port facilities. In this study, a master plan of tsunami defense is introduced at Samcheok Port. A tsunami hazard map is also made by employing both propagation and inundation models. Detailed defense efforts are described including the procedure of development of a tsunami hazard map. Keywords: tsunami, hazard map, run-up height, emergency action plan

  20. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel


    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  1. Antiviral Defenses in Plants through Genome Editing (United States)

    Romay, Gustavo; Bragard, Claude


    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  2. Extracellular DNA: the tip of root defenses? (United States)

    Hawes, Martha C; Curlango-Rivera, Gilberto; Wen, Fushi; White, Gerard J; Vanetten, Hans D; Xiong, Zhongguo


    This review discusses how extracellular DNA (exDNA) might function in plant defense, and at what level(s) of innate immunity this process might operate. A new role for extracellular factors in mammalian defense has been described in a series of studies. These studies reveal that cells including neutrophils, eosinophils, and mast cells produce 'extracellular traps' (ETs) consisting of histone-linked exDNA. When pathogens are attracted to such ETs, they are trapped and killed. When the exDNA component of ETs is degraded, trapping is impaired and resistance against invasion is reduced. Conversely, mutation of microbial genes encoding exDNases that degrade exDNA results in loss of virulence. This discovery that exDNases are virulence factors opens new avenues for disease control. In plants, exDNA is required for defense of the root tip. Innate immunity-related proteins are among a group of >100 proteins secreted from the root cap and root border cell populations. Direct tests revealed that exDNA also is rapidly synthesized and exported from the root tip. When this exDNA is degraded by the endonuclease DNase 1, root tip resistance to fungal infection is lost; when the polymeric structure is degraded more slowly, by the exonuclease BAL31, loss of resistance to fungal infection is delayed accordingly. The results suggest that root border cells may function in a manner analogous to that which occurs in mammalian cells.

  3. Electroconvulsive Therapy Malpractice: Verdict for the Defense. (United States)

    Goodman, Theodore; McCall, W Vaughn


    Malpractice cases involving electroconvulsive therapy (ECT) are rare. Even rarer are those malpractice cases alleging ECT-related brain damage. The few cases of ECT malpractice lawsuits are not described in the medical literature in detail. We provide a detailed account of a case of a patient and subsequent alleged ECT-related malpractice. The details of the case were collated using the handwritten notes of one of the authors who was present at the trial and the pretrial documents of discovery that were entered into evidence. The plaintiff alleged complete autobiographical amnesia after ECT, supposedly as a result of ECT-related brain damage. The defense was aided by the presence of extensive neurological examination and brain imaging both before and after ECT. The defense team also offered to the jury the concept of "dissociative amnesia" as an alternative explanation for the plaintiff's memory complaints. The case went to trial and was successfully defended. Electroconvulsive therapy malpractice cases alleging brain damage can be successfully defended, and the successful defense is aided by adequate documentation before, during, and after ECT. Malpractice cases, especially if they are baseless, can occur unpredictably, but they can be defended if the medical documentation is thorough.


    Directory of Open Access Journals (Sweden)

    Marian NEDELCU


    Full Text Available Game theory provides a number of analytical tools designed to assist in developing a more comprehensive understanding of phenomena emerging when decision makers interact. A game describes the strategic interactions between players who act guided by their interests and with the consciousness that their actions affect each other. The basic entity in all game theory models is the player. A player may be understood as an individual, group of individuals or any kind of organization, even countries or alliances facing decisions-making challenges and opportunities. In this respect, the concept providing the dimensions and variables informing on the planning “game” elements required for an optimal defense resource allocation is that of ‘capabilities’. The model developed in this paper is focused on allocations of the available defense resources over the assumed capabilities in order to achieve the best response to national security. I consider as a game the competition between strategic decision-makers involved in defense resource management and the threats to the national security.

  5. PTSD as a criminal defense: a review of case law. (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L


    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  6. An analysis of socio/cultural impact of CIM on the Department of Defense and possible implementation strategy


    Hantjis, William M.; Kelley, Donald A.


    Approved for public release; distribution is unlimited The Corporate Information Management (CIM) initiave in the Department of Defense (DoD) is an attempt to eliminate duplicate Automatic Data Processing ( ADP) systems through the standardization of functional area requirements across all DoD agencies. CIM initiative management recognized that the DoD organizational culture might impact or be impacted by such an all-encompassing initiative. The purpose of this thesis is to estima...

  7. Inducible defenses against herbivory and fouling in seaweeds (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez


    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  8. Summary and Evaluation of the Strategic Defense Initiative Space Power Architecture Study (United States)


    lithium thionyl chloride battery is a state-of=the-art device which has been used in the Minuteman Extended Survival Power Program. However, at...Not included in this band is GE’s lithium - thionyl chloride battery system which is not closed because it exhausts hydrogen which cools the battery . It...fuel cell, TRW’s lithium -metal sulfide battery , and GE’s lithium - thionyl chloride battery ) are rechargeable

  9. An Investigation of Expert Systems Usage for Software Requirements Development in the Strategic Defense Initiative Environment. (United States)


    called Program Design Language (PDL). PDL is designed for the production of structured designs in a top-down manner. It is a " pidgin " language in that it...thought of as "structured English" [281. Although the use of pidgin languages is also advocated by others, further steps have been taken of imposing

  10. Final Environmental Assessment for the Defensive Training Initiative, Cannon Air Force Base, New Mexico (United States)


    Zwank, and M. Cardenas . 1997. Breeding Biology of Aplomado Falcons in Desert Grasslands of Chihuahua, Mexico. Journal of Field Ornithology 68:135...Management Deputy Stat Director P.O. Box 27115 Santa Fe, NM 87502 Nancy Skinner, Chief USDI, National Park Service P.O. Box 728 Santa Fe, NM 87504

  11. National Automotive Center (NAC) Overview & Green Technology Initiatives: Visit by Agency for Defense Development, South Korea (United States)


    lard wood waste & by-products agri-wastenon-food crops algae Biomass Feedstock (renewables) Petroleum Crude Oil (increasingly difficult discovery and...83133: JP-8, also blends of synthetic kerosene with JP-8 Diesel Fuel • ASTM D975: up to 5% v. FAME biodiesel (B100) allowed in diesel fuel • ASTM...D6751: B100 spec • ASTM D7467: blends of 6%-20% v. FAME biodiesel (B100) with diesel Alternatively Sourced Liquid Hydrocarbons

  12. Defense Logistics: Improved Performance Measures and Information Needed for Assessing Asset Visibility Initiatives (United States)


    the questionnaire was unbiased, and (4) the questionnaire did not place an undue burden on the officials completing it. We noted any potential...respond can influence the accuracy of the survey results. We took steps, as described above, in the development of the survey, the data collection

  13. Defense Technology and Trade Initiative: Ashton Carter’s Strategy in India (United States)


    product assembly in India : Rather, it aims at joint development of new technologies through design, engineering, manufacturing, testing, production...Technology Development and Transfer Steps Technology Transferred Transfer Media Research Product Design Documentation & Hardware Laboratory...staunchly advocates treating India like some of the closest U.S. partners in terms of the extent and level of technology transfer, co- develop - ment

  14. SDIO (Strategic Defense Initiative Office) Technical Information Management Center Bibliography of Unclassified Reports: January - December 1986. (United States)


    Corp., El Segundo, CA 90245 Index Terms: Integrated Diode Array Semiconductor Coupled Monolithic DBR Laser Photoresist Characterization Pgs: 204...Array Imaging Bulk-Wave Pgsu 126 Classification: U Security Marks: Accession *:U0227 AD 0: ADA097899 TITLE: Progress Toward a Monolithically Integrated ...Rios, Thousand Oaks, CA 9136 Index Terms: Monolithic Microwave Integrated Circuit Gallium Arsenide Reciever Front End Field Effect Transistor Pgs: 36

  15. The Strategic Defense Initiative and the End of the Cold War (United States)


    Evangelista, Turning Points in Arms Control, ed. Richard K. Herrmann and Richard Ned Lebow, Ending the Cold War (New York: Palgrave Macmillan, 2004), p. 83...Evangelista, Matthew. Turning Points in Arms Control. Edited by Richard K. Herrmann and Richard Ned Lebow, Ending the Cold War. New York: Palgrave

  16. The Department of Defense’s Flexible, Computer-Integrated Manufacturing Initiatives. (United States)


    called Feature-Based Manufacturing Center ( FBMC ) helps engineers create NC programs for the machining of bushings. FBMC is a microcomputer- based...application that is designed to overcome programming difficulties associated with older, proprietary-language machines. Using FBMC to create programs...for Mazak, Cincinnati Milicron, and Warner Swasey machines has cut programming time from 3 to 4 hours to 10 to 15 minutes. The FBMC system cost

  17. FY 1990/FY 1991 Biennial Budget Descriptive Summaries for the Strategic Defense Initiative Organization (United States)


    superconducting accelerator facility by TRW in suport of the SBFEL o (U) A grazing interfercmeter for monocle figure control for relay mirrors was demonstrated 2...Activity: Advanced Technology Development (02) o (U) Select either the induction or radio frequency F=- for GBFM TIE o (U) Ccmzleta the monocle single

  18. Strategic Defense Initiative Architecture Dataflow Modeling Technique Version 1.5. (United States)


    interprocess corn - munication, a reasonable set of operations is provided for ports to facilitate developing 23 UNCLASSIFIED . N j. 7 UNCLASSIFIED...Module Technolog mraode r h nypoessta a ntraedrcl ihteevrn men. Tusa patfrconsistin: cof tehgnoogymues n MC rcsescnan hr coeaato beweThe

  19. Initiating an Entrepreneurial Mindset in the Department of Defense (DoD): Testing a Comprehensive Model (United States)


    Jaworski, B. J., & Kohli , A. K. (1993). Market orientation : Antecedents and consequences. Journal of Marketing , 57(3), 53. John, O. P...innovativeness, market orientation , and organizational learning (Hult, Snow & Kandemir, 2003). All four elements interact within an organization to define the...1998). Innovation, market orientation , and organizational learning: An integration and empirical examination. Journal of Marketing , (62), 53-70

  20. Strategic Defense Initiative Demonstration/Validation Program Environmental Assessment. Exoatmospheric Reentry Vehicle Interception System (ERIS), (United States)


    2; - 4; C i O Ga. ; . ft* .4 .4 ~I A la 4. a d .4 . - aa .3 r U. AM 0SP0 o~~0 0.ei. ’U4 Is .~ -4 -- I r ’M .0. ~ aDa id .40 *l - 3~.4 144 0.U .4z- z... Lovelace , Norm, Environmental Protection Agency, Permit Programs, Micronesia, Region IX, San Francisco, California. 27 May 1987. Tele- phone

  1. Energy Security Requires Diversity: An Argument for The Defense Production Act Title III Biofuel Initiative (United States)


    visited 15 July, 2013). 55 Production of alcohol from biomass by way of fermentation of plant sugars creates ethanol. Ethanol can be used in...synthetic fuel demonstration plants . 110 The act authorized the Secretary of the Interior to construct and operate plants which would convert coal...unanticipated operating problems and the construction of plants large enough to operate at a commercial scale. Setting national goals for synthetic fuel

  2. Second Line of Defense, Megaports Initiative, Operational Testing and Evaluation Plan, Port of Lazaro Cardenas, Mexico

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Jamie D.


    The purpose of the Operational Testing and Evaluation (OT&E) phases of the project is to prepare for turnover of the Megaports System supplied by U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA)—located at the Export Lanes of the Port of Lazaro Cardenas, Mexico—to the Government of Mexico (GOM).

  3. Defense Infrastructure: In-Kind Construction and Renovation Projects Initiated by DOD during Fiscal Year 2013 (United States)


    with an Ethylene Propylene Diene Monomer roof system with rigid insulation Service review and approval letter of contractor cost estimate...air conditioning, fire protection, utility connections, pavement , and information systems. Agreement between Army and Air Force Exchange Services...existing roof systems of buildings 373 and 167 with a synthetic rubber roof system with rigid insulation Alliant Techsystems Lease Agreement

  4. Dioxin Exposure Initiative (United States)

    The Dioxin Exposure Initiative (DEI) is no longer active. This page contains a summary of the dioxin exposure initiative with illustrations, contact and background information.Originally supported by scientist Matthew Lorber, who retired in Mar 2017.

  5. White House announces “big data” initiative (United States)

    Showstack, Randy


    The world is now generating zetabytes—which is 10 to the 21st power, or a billion trillion bytess—of information every year, according to John Holdren, director of the White House Office of Science and Technology Policy. With data volumes growing exponentially from a variety of sources such as computers running large-scale models, scientific instruments including telescopes and particle accelerators, and even online retail transactions, a key challenge is to better manage and utilize the data. The Big Data Research and Development Initiative, launched by the White House at a 29 March briefing, initially includes six federal departments and agencies providing more than $200 million in new commitments to improve tools and techniques for better accessing, organizing, and using data for scientific advances. The agencies and departments include the National Science Foundation (NSF), Department of Energy, U.S. Geological Survey (USGS), National Institutes of Health (NIH), Department of Defense, and Defense Advanced Research Projects Agency.

  6. When "Other" Initiate Repair. (United States)

    Schegloff, Emanuel A.


    Elaborates on the locus of other-initiated repair, and reports on a number of environments in which others initiate repair turns later than the one directly following the trouble-source turn. Describes several ways that other initiation of repair, which occurs in next-turn position, may be delayed within that position. (Author/VWL)

  7. Report of the Defense Science Board Subcommittee on Department of Defense Research Policy. Part 1. Policy on Support of Basic Research (United States)


    f. .. AD-A955 482 Report of the Defen e Science Board Subcomtnittee on Depart•eat of Defense RESEARCH POLICY OTIC SELECTED NOV 2 91J88 0(/H...ACCESSION NO NA 11 TITLE (inc/ud* Stcunty Oassificat/on) Report of the Defense Science Board Subcomittee on Department of Defense Research Policy , Part...Defense Research Policy Office of the Director of Defense Research and Engineering Washington, D. C. 31 December 1963 OFFICE OF THE DIRECTOR OF DEFENSE

  8. Toward a defense-dominated world

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.


    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  9. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele


    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  10. Stop or move: Defensive strategies in humans. (United States)

    Bastos, Aline F; Vieira, Andre S; Oliveira, Jose M; Oliveira, Leticia; Pereira, Mirtes G; Figueira, Ivan; Erthal, Fatima S; Volchan, Eliane


    Threatening cues and surrounding contexts trigger specific defensive response patterns. Potential threat evokes attentive immobility; attack evokes flight when escape is available and immobility when escape is blocked. Tonic immobility installs when threat is overwhelming and life-risky. In humans, reduced body sway characterizes attentive and tonic immobility, the former with bradycardia, and the later with expressive tachycardia. Here, we investigate human defensive strategies in the presence or absence of an escape route. We employed pictures depicting a man carrying a gun and worked with participants exposed to urban violence. In pictures simulating more possibility of escape, the gun was directed away from the observer; in those simulating higher risk and less chance of escape, the gun was directed toward the observer. Matched control pictures depicted similar layouts, but a non-lethal object substituted the gun. Posturographic and electrocardiographic recordings were collected. Amplitude of sway and heart rate were higher for gun directed-away and lower for gun direct-toward. Compared to their respective matched controls, there was a general increase in the amplitude of sway for the gun directed-away pictures; and a reduction in back-and-forth sway and in heart rate for gun directed-toward pictures. Taken together, those measures suggest that, when exposed to threat invading their margin of safety in a context indicating possible escape route, humans, as non-human species, engage in active escape, resembling the flight stage of the defensive cascade. When facing threat indicating less possibility of escape, humans present an immobile response with bradycardia.

  11. Directed energy missions for planetary defense (United States)

    Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis


    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.

  12. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense. (United States)

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede


    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  13. The Reagan Defense Budget: Prospects and Pressures, (United States)


    policy and to stimulate U.S. economic growth; and ( ii ) the urgent requirement to build up America’s defense capabilities. The former theme is a traditional...Paris in the Fall of 1981: a ver- sion of it will appear in the Ramses conference proceedings. -2- Unfortunately, it now seems as though these two...Proposed OMB Cut Alternatives (August) Level I 221.9 183.6 247.3 219.2 278.4 246.9 Level II 221.4 183.4 238.5 217.4 276.9 243.5 Level III 216.0 182.0

  14. The Relationship between Inflation and Defense Expenditures. (United States)


    resources they would be bid up in the expanding sector. See Robert Solow , "Evaluation," in After the Phillips Curve: Persistence of High Inflation and...can be explained by the respective rates of growth of money supply per unit of national product. ’𔃼 IF’risch, op. cit., p. 1311. Robert J. Gordon...Statistical Approach for Forecasting Defense Expenditures in the Short-run," in William F. Butler, Robert A. Kavesh, and Robert B. Platt, eds., "Methods and

  15. Bacterial gasotransmitters: an innate defense against antibiotics. (United States)

    Luhachack, Lyly; Nudler, Evgeny


    In recent decades, there has been growing interest in the field of gasotransmitters, endogenous gaseous signaling molecules (NO, H2S, and CO), as regulators of a multitude of biochemical pathways and physiological processes. Most of the concerted effort has been on eukaryotic gasotransmitters until the subsequent discovery of bacterial counterparts. While the fundamental aspects of bacterial gasotransmitters remain undefined and necessitate further research, we will discuss a known specific role they play in defense against antibiotics. Considering the current dilemma of multidrug-resistant bacteria we consider it particularly prudent to exploring novel targets and approaches, of which the bacterial gasotransmitters, nitric oxide and hydrogen sulfide represent.

  16. Status of Efforts to Initiate an Amphibious Combat Vehicle Program (United States)


    the ACV program until 2018. the Department of Defense (DOD) canceled the Marine Corps’ Expeditionary Fighting Vehicle acquisition program due to...concerns regarding its affordability. The Amphibious Combat Vehicle ( ACV ) is a potential, but not yet initiated, successor program to the Expeditionary...findings and conclusions based on our audit objectives. This is the first of the mandated GAO reports. It discusses (1) the current status of the ACV

  17. Larval cannibalism and pupal defense against cannibalism in two species of tenebrionid beetles. (United States)

    Ichikawa, Toshio; Kurauchi, Toshiaki


    Cannibalism of pupae by larvae has been documented In many species of Insects, but the features of larval cannibalism and pupal defensive mechanisms against larval cannibalism have been largely Ignored. Pupae of tenebrionld beetles rotate their abdominal segments in a circular motion in response to the tactile stimulation of appendages, including legs, antennae, maxillary pulps, and wings. When the pupal abdominal rotation responses of Tenebrio molitor and Zophobas atratus were completely blocked by transecting the ventral nerve cord (VNC) of the pupae, the appendages of the paralytic pupae became initial, major targets for attack by larval cannibals. The majority of 20 paralytic pupae was cannibalized by 100 larvae within 6 h, and almost all the pupae were killed within 2-3 days. In contrast, only a few pupae of Z. atratus and several pupae of T. molitor were cannibalized when the VNC was Intact. The abdominal rotation response of the pupae thus functions as an effective defense against larval cannibalism.

  18. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007 (United States)

    Heo, Uk; Bohte, John


    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  19. Defense Intelligence Agency: 50 Years Committed to Excellence in Defense of the Nation (United States)


    to the September 11th terrorist attacks on the Pentagon. Rosa Chapa , Sandra Foster, Robert Hymel, Shelley Marshall, Patricia Mickley, Charles...the Nation MASTER SERGEANT WILLIAM W. BULTMEIER, USA, (RET) Defense Attaché Offi ce, Niamey 23 December 2000 ROSA M. CHAPA Offi ce of the Comptroller

  20. The silent defense: Micro-RNA directed defense against HIV-1 replication

    Directory of Open Access Journals (Sweden)

    Kumar Ajit


    Full Text Available Abstract MicroRNAs play critical role in regulating gene expression. MicroRNA profile of particular cell type bears the signature of cell type specific gene expression. Given that viral pathogens replicate by evading host defenses, research is now focused on the miRNA-regulated genes that critically regulate HIV-1 propagation in human host cells.

  1. Plant chemical defense against herbivores and pathogens: generalized defense or trade-offs?

    NARCIS (Netherlands)

    Biere, A.; Marak, H.B.; Van Damme, J.M.M.


    Plants are often attacked by multiple enemies, including pathogens and herbivores. While many plant secondary metabolites show specific effects toward either pathogens or herbivores, some can affect the performance of both these groups of natural enemies and are considered to be generalized defense

  2. Making Department of Defense Basic Research Purple (Joint), but NOT the Department of Defense Laboratories (United States)


    outside of government, where they report to the chief executive officer (CEO) or to the CEO through a chief technology officer ( CTO ). The panel...Technology ASDR&E Assistant Secretary of Defense for Research and Engineering CEO chief executive officer COE Center of Excellence CTO chief

  3. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only... (United States)


    ... presented by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated... offered price. These provisions must also be used in acquisitions of commercial items conducted using part...--ACQUISITION OF COMMERCIAL ITEMS 4. Add new section 212.205 to read as follows: 212.205 Offers. (c) When...

  4. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes (United States)


    should be done by using the IAS for a modeling situation (for instance, JWARS—Joint Warfare System) or IAS which can carry out a SWOT analysis (IAS...43  C.  MISTAKE ANALYSIS OF CONDUCTED DEFENSE REVIEW IN MDU...PROGRAMS ...................................................64  B.  ANALYSIS OF PLANNING AND EXECUTING FINANCIAL RESOURCES OF MDU


    Directory of Open Access Journals (Sweden)

    Alejandro \\u00C1lvarez


    Full Text Available The purpose of the present study was to analyze the different defensive performance indicators in basketball, analyzing the difference in relation to success (efficacious or non-efficacious defenses and the game result (win or loss. All halfcourt offenses (n=1045 from the quarterfinal, semifinal, consolation game, and final of the 2008 Olympics Games were analyzed. In each defense phase, the following variables were analyzed with regard to the team on defense: (1 Type of defense used, (2 Pressure in offense transition, (3 Defensive switches, (4 Helping on defense, (5 Inside passes, (6 Degree of opposition when shooting, (7 Points allowed, (8 Final result of the game, and (9 Defensive efficacy. The most significant results show that: : a the type of defense that was most used was quarter-court an-on-man (man-on-man at 6.25m, but the one that was most efficacious was the half-court zone defense; b transition pressure was used in 23.83% of the game phases; c defensive switches were done in 7.85% of the game phases; d helping on defense was used in 60% of the game phases; e inside passes were taken in 30.9% of the game phases; f 38.9% of the shots were done with high opposition; and g points were scored in 42.28% of the game phases, such that winning teams allowed the opponent to score in 38.81% of the game phases, and losing teams in 45.77%.

  6. Extracellular Alkalinization as a Defense Response in Potato Cells


    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu


    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-de...

  7. Deming's Management Philosophy and the defense industrial base.


    Graff, David Jacques


    Approved for public release: distribution is unlimited The purpose of this thesis is to analyze why firms are leaving the defense industrial base and to determine if Dr. Edwards Deming's Management Philosophy can offer a more constructive way of doing business in the Defense Acquisition System. A comparative analysis was conducted between industry's reasons for wanting to leave the defense sector and Deming's Management Philosophy. This analysis determined if adoption of Deming's Managemen...

  8. Assessing Future Trends in the Defense Burdens of Western Nations (United States)


    Summary Table 1). A weighted average for the four allies that spend most heavily on defense -- Japan , France, Germany, and the United Kingdom--is projected...military was dismantled. Among the largest allies, Japan represents the other extreme. Japanese defense spending as a percentage of GDP is projected to...January 1993. d. Weighted average for Japan , France, Germany, and the United Kingdom--countries that spend the greatest amounts on defense . e The 1990

  9. Defense: FY2012 Budget Request, Authorization and Appropriations (United States)


    Senate versions of the bill would have done). The ships for which most of the total cost is authorized in FY2012 include two Virginia -class submarines, a...New START Treaty: Central Limits and Key Provisions, by Amy F. Woolf . Defense: FY2012 Budget Request, Authorization and Appropriations...Missile Defense and Offensive Arms Reductions: A Review of the Historical Record, by Steven A. Hildreth and Amy F. Woolf . Defense: FY2012 Budget

  10. Department of Defense Laboratories: Finding a Future in Technology Transfer (United States)


    investment. There is no mention of DoD even trying. This, then, presents a problem for Defense technology transfer management. The President expects both...effort, but nonetheless felt unable to express their effort quantitatively. The potential size and demand for Defense technology transfer calls for some... Defense technology transfer is taking place, it is doing so on the enthusiasm and drive of a few key individuals. Political demand and legislation

  11. Total Quality Management in the Department of Defense (United States)



  12. Defense strategies used by two sympatric vineyard moth pests. (United States)

    Vogelweith, Fanny; Thiéry, Denis; Moret, Yannick; Colin, Eloïse; Motreuil, Sébastien; Moreau, Jérôme


    Natural enemies including parasitoids are the major biological cause of mortality among phytophagous insects. In response to parasitism, these insects have evolved a set of defenses to protect themselves, including behavioral, morphological, physiological and immunological barriers. According to life history theory, resources are partitioned to various functions including defense, implying trade-offs among defense mechanisms. In this study we characterized the relative investment in behavioral, physical and immunological defense systems in two sympatric species of Tortricidae (Eupoecilia ambiguella, Lobesia botrana) which are important grapevine moth pests. We also estimated the parasitism by parasitoids in natural populations of both species, to infer the relative success of the investment strategies used by each moth. We demonstrated that larvae invest differently in defense systems according to the species. Relative to L. botrana, E. ambiguella larvae invested more into morphological defenses and less into behavioral defenses, and exhibited lower basal levels of immune defense but strongly responded to immune challenge. L. botrana larvae in a natural population were more heavily parasitized by various parasitoid species than E. ambiguella, suggesting that the efficacy of defense strategies against parasitoids is not equal among species. These results have implications for understanding of regulation in communities, and in the development of biological control strategies for these two grapevine pests.

  13. Law & psychiatry: Does the constitution require an insanity defense? (United States)

    Appelbaum, Paul S


    Idaho is one of four states that have abolished the insanity defense. Hence, John Delling, on trial for two murders in Idaho, was unable to plead insanity or to argue that he lacked intent to kill, the only available option under Idaho law. After being sentenced to life in prison without parole, Delling challenged the constitutionality of Idaho's law. The state's supreme court rejected his appeal, holding that--despite the long history of the insanity defense and its widespread acceptance--there was no constitutional right to an insanity defense. Delling's petition to the U.S. Supreme Court was turned away, leaving the constitutional status of the insanity defense uncertain.

  14. Plant antiherbivore defenses in Fabaceae species of the Chaco

    Directory of Open Access Journals (Sweden)

    T. E. Lima

    Full Text Available Abstract The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defensedefense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species, leaves (67%, and reproductive organs (56%. The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  15. 75 FR 5289 - Defense Health Board (DHB) Meeting (United States)


    ... Defense Health Board Subcommittees will present updates to the Board: National Capital Region Base... Forces, Military/ Occupational Health and Medical Surveillance, and the Psychological Health...

  16. Does self-defense training prevent sexual violence against women? (United States)

    Hollander, Jocelyn A


    Self-defense classes are offered across the nation as a strategy for reducing women's vulnerability to sexual assault. Yet there has been little systematic research assessing the effectiveness of these classes. In this article, I use data from a mixed methods study of a 10-week, university-based, feminist self-defense class to examine the effectiveness of self-defense training over a 1-year follow-up period. My analyses indicate that women who participate in self-defense training are less likely to experience sexual assault and are more confident in their ability to effectively resist assault than similar women who have not taken such a class.

  17. Integrating nitric oxide into salicylic acid and jasmonic acid/ ethylene plant defense pathways. (United States)

    Mur, Luis A J; Prats, Elena; Pierre, Sandra; Hall, Michael A; Hebelstrup, Kim H


    Plant defense against pests and pathogens is known to be conferred by either salicylic acid (SA) or jasmonic acid (JA)/ethylene (ET) pathways, depending on infection or herbivore-grazing strategy. It is well attested that SA and JA/ET pathways are mutually antagonistic allowing defense responses to be tailored to particular biotic stresses. Nitric oxide (NO) has emerged as a major signal influencing resistance mediated by both signaling pathways but no attempt has been made to integrate NO into established SA/JA/ET interactions. NO has been shown to act as an inducer or suppressor of signaling along each pathway. NO will initiate SA biosynthesis and nitrosylate key cysteines on TGA-class transcription factors to aid in the initiation of SA-dependent gene expression. Against this, S-nitrosylation of NONEXPRESSOR OF PATHOGENESIS-RELATED PROTEINS1 (NPR1) will promote the NPR1 oligomerization within the cytoplasm to reduce TGA activation. In JA biosynthesis, NO will initiate the expression of JA biosynthetic enzymes, presumably to over-come any antagonistic effects of SA on JA-mediated transcription. NO will also initiate the expression of ET biosynthetic genes but a suppressive role is also observed in the S-nitrosylation and inhibition of S-adenosylmethionine transferases which provides methyl groups for ET production. Based on these data a model for NO action is proposed but we have also highlighted the need to understand when and how inductive and suppressive steps are used.

  18. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars


    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  19. Antioxidative defense mechanisms in the aging brain

    Directory of Open Access Journals (Sweden)

    Jovanović Zorica


    Full Text Available Aging is an extremely complex, multifactorial process that is characterized by a gradual and continuous loss of physiological functions and responses, particularly marked in the brain. A common hallmark in aging and age-related diseases is an increase in oxidative stress and the failure of antioxidant defense systems. Current knowledge indicates that the level of glutathione progressively declines during aging. Because nerve cells are the longest-living cells that exhibit a high consumption rate of oxygen throughout an individual’s lifetime, the brain may be especially vulnerable to oxidative damage and this vulnerability increases during aging. In addition, the brain contains high concentrations of polyunsaturated fatty acids and transition metals and low antioxidative defense mechanisms. Although aging is an inevitable event, a growing volume of data confirms that antioxidant supplementation in combination with symptomatic drug treatments reduces oxidative stress and improves cognitive function in aging and age-related diseases. The present review discusses the neuroprotective effects of antioxidants in the aging brain.

  20. Directed Energy Missions for Planetary Defense

    CERN Document Server

    Lubin, Philip; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathon; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis


    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional prop...

  1. Beryllium--important for national defense (United States)

    Boland, M.A.


    Beryllium is one of the lightest and stiffest metals, but there was little industrial demand for it until the 1930s and 1940s when the aerospace, defense, and nuclear sectors began using beryllium and its compounds. Beryllium is now classified by the U.S. Department of Defense as a strategic and critical material because it is used in products that are vital to national security. The oxide form of beryllium was identified in 1797, and scientists first isolated metallic beryllium in 1828. The United States is the world's leading source of beryllium. A single mine at Spor Mountain, Utah, produced more than 85 percent of the beryllium mined worldwide in 2010. China produced most of the remainder, and less than 2 percent came from Mozambique and other countries. National stockpiles also provide significant amounts of beryllium for processing. To help predict where future beryllium supplies might be located, U.S.Geological Survey (USGS) scientists study how and where beryllium resources are concentrated in Earth's crust and use that knowledge to assess the likelihood that undiscovered beryllium resources may exist. Techniques to assess mineral resources have been developed by the USGS to support the stewardship of Federal lands and to better evaluate mineral resource availability in a global context. The USGS also compiles statistics and information on the worldwide supply of, demand for, and flow of beryllium. These data are used to inform U.S. national policymaking.

  2. Biomechanical Analysis of Defensive Cutting Actions During Game Situations: Six Cases in Collegiate Soccer Competitions

    Directory of Open Access Journals (Sweden)

    Sasaki Shogo


    Full Text Available The strengths of interpersonal dyads formed by the attacker and defender in one-on-one situations are crucial for performance in team ball sports such as soccer. The purpose of this study was to analyze the kinematics of one-on-one defensive movements in soccer competitions, and determine the relationships between lower limb kinematics and the center of mass translation during cutting actions. Six defensive scenes in which a player was responding to an offender’s dribble attack were selected for analysis. To reconstruct the three-dimensional kinematics of the players, we used a photogrammetric model-based image-matching technique. The hip and knee kinematics were calculated from the matched skeleton model. In addition, the center of mass height was expressed as a ratio of each participant’s body height. The relationships between the center of mass height and the kinematics were determined by the Pearson’s product-moment correlation coefficient. The normalized center of mass height at initial contact was correlated with the vertical center of mass displacement (r = 0.832, p = 0.040 and hip flexion angle at initial contact (r = −0.823, p = 0.044. This suggests that the lower center of mass at initial contact is an important factor to reduce the downwards vertical center of mass translation during defensive cutting actions, and that this is executed primarily through hip flexion. It is therefore recommended that players land with an adequately flexed hip at initial contact during one-on-one cutting actions to minimize the vertical center of mass excursion.

  3. The lipopolysaccharide of Sinorhizobium meliloti suppresses defense-associated gene expression in cell cultures of the host plant Medicago truncatula. (United States)

    Tellström, Verena; Usadel, Björn; Thimm, Oliver; Stitt, Mark; Küster, Helge; Niehaus, Karsten


    In the establishment of symbiosis between Medicago truncatula and the nitrogen-fixing bacterium Sinorhizobium meliloti, the lipopolysaccharide (LPS) of the microsymbiont plays an important role as a signal molecule. It has been shown in cell cultures that the LPS is able to suppress an elicitor-induced oxidative burst. To investigate the effect of S. meliloti LPS on defense-associated gene expression, a microarray experiment was performed. For evaluation of the M. truncatula microarray datasets, the software tool MapMan, which was initially developed for the visualization of Arabidopsis (Arabidopsis thaliana) datasets, was adapted by assigning Medicago genes to the ontology originally created for Arabidopsis. This allowed functional visualization of gene expression of M. truncatula suspension-cultured cells treated with invertase as an elicitor. A gene expression pattern characteristic of a defense response was observed. Concomitant treatment of M. truncatula suspension-cultured cells with invertase and S. meliloti LPS leads to a lower level of induction of defense-associated genes compared to induction rates in cells treated with invertase alone. This suppression of defense-associated transcriptional rearrangement affects genes induced as well as repressed by elicitation and acts on transcripts connected to virtually all kinds of cellular processes. This indicates that LPS of the symbiont not only suppresses fast defense responses as the oxidative burst, but also exerts long-term influences, including transcriptional adjustment to pathogen attack. These data indicate a role for LPS during infection of the plant by its symbiotic partner.

  4. Using SDI, SDI+ and MFI to evaluate fouling in a UR/RO desalination pilot plant

    NARCIS (Netherlands)

    Al-Hadidi, A.M.M.; Kemperman, A.J.B.; Schurer, H.; Schippers, J.C.; Wessling, M.; Meer, van der W.G.J.


    This paper assesses the performance of a UF/RO demonstration plant located in the Oosterschelde estuary in the south-western part of the Netherlands. Spring blooms in the seawater pose a challenge to the plant because of the resulting increased fouling potential of the water. Determinations of the f

  5. Sustainable Agricultural Marketing Initiatives


    Hakan Adanacıoğlu


    Sustainable marketing is a holistic approach that puts equal emphasis on environmental, social equity, and economic concerns in the development of marketing strategies. The purpose of the study is to examine and discuss the sustainable agricultural marketing initiatives practiced throughout the World and Turkey, and to put forth suggestions to further improve the performance of agricultural marketing initiatives in Turkey. Some of the sustainable agricultural marketing initiatives practiced a...

  6. Freshwater Mussel Initial Survey Instructions (United States)

    US Fish and Wildlife Service, Department of the Interior — In order to effectively implement endangered species recovery and mussel restoration actions in the Ohio River, we need statistically valid and defensible data to...

  7. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function (United States)


    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting Service • Defense Health Agency • Defense Human Resource Activity • Defense

  8. 32 CFR 37.1030 - What information must I report to the Defense Technical Information Center? (United States)


    ... 32 National Defense 1 2010-07-01 2010-07-01 false What information must I report to the Defense Technical Information Center? 37.1030 Section 37.1030 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing...

  9. 77 FR 29443 - 60-Day Notice of Two Proposed Directorate of Defense Trade Controls Information Collections... (United States)


    ... collection: The export, temporary import, temporary export and brokering of defense articles, defense... Export Control Act. Those of the public who manufacture or export defense articles, defense services, and... personal delivery. Dated: May 14, 2012. Robert S. Kovac, Managing Director of Defense Trade...

  10. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program (United States)


    Defense Technology Transfer Working Group AGENCY...Director, Defense Research and Engineering. ACTION: solicitation in inputs for defense technology transfer . The Defense Technology Transfer Working...DAILY, 2.3 July 1993 Detense Nuclear Agency, 6801 Telegraph Road, Alexandria,, VA 22310D-3398 A - SOURCES SOUGHT FOR INPUTS FOR DEFENSE TECHNOLOGY TRANSFER

  11. Defense Acquisition Research Journal. Volume 23, Number 3, Issue 78, July 2016 (United States)


    for National Security and Resource Strategy Dr. J. Ronald Fox Harvard Business School Mr. David Gallop Defense Acquisition University Dr. Jacques...Predator: The Secret Origins of the Drone Revolution Written by Richard Whittle Reviewed by Julien Demotes-Mainard Mr. Patrick Fitzgerald Defense...Defense Acquisition Research Journal, formerly the Defense Acquisition Review Journal, is published quarterly by the Defense Acquisition University (DAU

  12. Emerging Pathogens Initiative (EPI) (United States)

    Department of Veterans Affairs — The Emerging Pathogens Initiative (EPI) database contains emerging pathogens information from the local Veterans Affairs Medical Centers (VAMCs). The EPI software...

  13. Defense of breast cancer malpractice claims. (United States)

    Zylstra, S; D'Orsi, C J; Ricci, B A; Halloran, E E; Resseguie, L J; Greenwald, L; Mondor, M C


    The goal of this study was to determine whether factors associated with the successful defense and cost of malpractice cases involving the failure to diagnose breast cancer could be identified in medical and legal records. Secondary goals were to develop a multidisciplinary clinical algorithm utilizing National Comprehensive Cancer Network (NCCN) practice guidelines with practitioner risk management strategies. Physician deviations from these guidelines were tracked to identify high-risk areas in the diagnosis of breast cancer. A multidisciplinary clinical algorithm was introduced and practitioner risk management issues were addressed. In this study specific medical, legal, and cost factors were retrospectively abstracted and analyzed to identify associations between medical and legal factors and medicolegal outcome. ProMutual handled 156 malpractice cases involving breast cancer between January 22, 1986, and November 20, 1997. Of the total, 124 cases involving 212 defendants were closed. The closed cases were analyzed, using multivariable stepwise logistic and linear regression, to identify associations between clinical factors and case outcome. Women's health practitioners (WHPs), including obstetrician-gynecologists (OB-GYNs), family medicine, and internal medicine clinicians, were the largest group of defendants (97). Others included radiologists (43), surgeons (33), and pathologists (3). OB-GYNs accounted for 31% of these defendants, with a cost of more than $16 million. The greatest number of specialists represented in the open cases were radiologists, with 38% of the total. The defense model predicts that the probability of successful defense is lessened with inadequate record keeping, a patient that has metastasis and is alive, and a delay in diagnosis of 12 months or more. The overall indemnity model predicts a higher indemnity with the spread of disease at the time of evaluation, a patient who has metastasis and is alive, and a date of occurrence closer

  14. Accident Fault Trees for Defense Waste Processing Facility

    Energy Technology Data Exchange (ETDEWEB)

    Sarrack, A.G.


    The purpose of this report is to document fault tree analyses which have been completed for the Defense Waste Processing Facility (DWPF) safety analysis. Logic models for equipment failures and human error combinations that could lead to flammable gas explosions in various process tanks, or failure of critical support systems were developed for internal initiating events and for earthquakes. These fault trees provide frequency estimates for support systems failures and accidents that could lead to radioactive and hazardous chemical releases both on-site and off-site. Top event frequency results from these fault trees will be used in further APET analyses to calculate accident risk associated with DWPF facility operations. This report lists and explains important underlying assumptions, provides references for failure data sources, and briefly describes the fault tree method used. Specific commitments from DWPF to provide new procedural/administrative controls or system design changes are listed in the ''Facility Commitments'' section. The purpose of the ''Assumptions'' section is to clarify the basis for fault tree modeling, and is not necessarily a list of items required to be protected by Technical Safety Requirements (TSRs).

  15. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin


    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.


    Directory of Open Access Journals (Sweden)



    Full Text Available War causes and conduct have fascinated war planners, war executors and scholars for a long time because little attention has been given to how wars are ended. This oversight is apparent not only in historical accounts of warfare but, more importantly, in contemporary analyses and doctrinal formulations of deterrence and overall defense policies. Just as historians have focused on how wars begin and are fought, military analysts and planners have concentrated on influencing the initiation and conduct of warfare rather than on analyzing the process and requirements for terminating warfare on acceptable terms and at acceptable costs. Conflict termination is the formal end of fighting, not the end of conflict. Despite the volumes of research and literature on the subject, belligerents mismanage war termination. The major objective of wartime strategy is defeating enemy arms as quickly as possible with the least cost in friendly casualties. As long as hostilities endure, diplomacy is subordinated to military requirements. War termination planning, as it is currently accomplished, takes the form of civil affair planning on the details of how the vanquished will be managed following the capitulation of the enemy and cessation of hostilities. We argue that Kenya Defence Forces (KDF prudently terminated its war with the terrorists group Al-Shabaab that merged with Al-Qaeda when they agreed to be integrated into the African Union Mission for Somalia (AMISOM which is backed up by the United Nations.

  17. Role of the inflammasome in defense against venoms (United States)

    Palm, Noah W.; Medzhitov, Ruslan


    Venoms consist of a complex mixture of toxic components that are used by a variety of animal species for defense and predation. Envenomation of mammalian species leads to an acute inflammatory response and can lead to the development of IgE-dependent venom allergy. However, the mechanisms by which the innate immune system detects envenomation and initiates inflammatory and allergic responses to venoms remain largely unknown. Here we show that bee venom is detected by the NOD-like receptor family, pyrin domain-containing 3 inflammasome and can trigger activation of caspase-1 and the subsequent processing and unconventional secretion of the leaderless proinflammatory cytokine IL-1β in macrophages. Whereas activation of the inflammasome by bee venom induces a caspase-1–dependent inflammatory response, characterized by recruitment of neutrophils to the site or envenomation, the inflammasome is dispensable for the allergic response to bee venom. Finally, we find that caspase-1–deficient mice are more susceptible to the noxious effects of bee and snake venoms, suggesting that a caspase-1–dependent immune response can protect against the damaging effects of envenomation. PMID:23297192

  18. Demo III: Department of Defense testbed for unmanned ground mobility (United States)

    Shoemaker, Chuck M.; Bornstein, Jonathan A.; Myers, Scott D.; Brendle, Bruce E., Jr.


    Robotics has been identified by numerous recent Department of Defense (DOD) studies as a key enabling technology for future military operational concepts. The Demo III Program is a multiyear effort encompassing technology development and demonstration on testbed platforms, together with modeling simulation and experimentation directed toward optimization of operational concepts to employ this technology. Primary program focus is the advancement of capabilities for autonomous mobility through unstructured environments, concentrating on both perception and intelligent control technology. The scout mission will provide the military operational context for demonstration of this technology, although a significant emphasis is being placed upon both hardware and software modularity to permit rapid extension to other military missions. The Experimental Unmanned Vehicle (XUV) is a small (approximately 1150 kg, V-22 transportable) technology testbed vehicle designed for experimentation with multiple military operational concepts. Currently under development, the XUV is scheduled for roll-out in Summer 1999, with an initial troop experimentation to be conducted in September 1999. Though small, and relatively lightweight, modeling has shown the chassis capable of automotive mobility comparable to the current Army lightweight high-mobility, multipurpose, wheeled vehicle (HMMWV). The XUV design couples multisensor perception with intelligent control to permit autonomous cross-country navigation at speeds of up to 32 kph during daylight and 16 kph during hours of darkness. A small, lightweight, highly capable user interface will permit intuitive control of the XUV by troops from current-generation tactical vehicles. When it concludes in 2002, Demo III will provide the military with both the technology and the initial experience required to develop and field the first generation of semi-autonomous tactical ground vehicles for combat, combat support, and logistics applications.

  19. PACS: implementation in the U.S. Department of Defense (United States)

    Chacko, Anna K.; Wider, Ronald; Romlein, John R.; Cawthon, Michael A.; Richardson, Ronald R., Jr.; Lollar, H. William; Cook, Jay F.; Timboe, Harold L.; Johnson, Thomas G.; Fellows, Douglas W.


    The Department of Defense has been a leader in Radiology re- engineering for the past decade. Efforts have included the development of two landmark PACS specifications (MDIS and DIN- PACS), respective vendor selection and implementation programs. A Tri-Service (Army, Navy and Air Force) Radiology re-engineering program was initiated which identified transitioning to digital imaging, PACS and teleradiology as key enabling technologies in a changing business scenario. Subsequently, the systematic adjustment of procurement process for radiological imaging equipment included a focus on specifying PACS-capable-digital imaging modalities and mini- PACS as stepping stones to make the hospitals and health clinics PACS-ready. The success of the PACS and teleradiology program in the DOD is evidenced by the near filmless operation of most Army and Air Force Medical Centers, several community hospitals and several operational teleradiology constellations. Additionally, the MDIS PACSystem has become the commercial PACS product for General Electric Medical Systems. The DOD continues to forge ahead in the PACS arena by implementing advanced configurations and operational concepts such as the VRE (Virtual Radiology Environment), the negotiation of Regional Archiving and Regional PACS Maintenance Programs. Newer regulations (HIPAA, the FDA approval of digital mammography) have been promulgated impacting the culture and conduct of our business. Incorporating their requirements at the very outset will enable us to streamline the delivery of radiology. The DOD community has embraced the information age at multiple levels. The Healthcare portion of this community with these initiatives is integrating itself into DOD's future. The future holds great possibilities, promises and challenges for the DOD PACS programs.

  20. 29 CFR 790.13 - General nature of defense. (United States)


    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... recognition by Congress of the remedial nature of the Fair Labor Standards Act and of the need...

  1. Applications of spatially offset Raman spectroscopy to defense and security (United States)

    Guicheteau, Jason; Hopkins, Rebecca


    Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.

  2. Common loon nest defense against an American mink (United States)

    McCarthy, Kyle P.; Destefano, Stephen


    We describe a successful nest defense strategy of an adult Gavia immer (Common Loon) during an attempted predation event by a Nevison vison (American Mink) at Umbagog National Wildlife Refuge, NH. It is suspected that mink occasionally depredate loon nests, but defense strategies have not been described previously.

  3. Influence of Organisational Defensive Patterns on Learning ICT (United States)

    Yau, Hon Keung; Cheng, Alison Lai Fong


    Purpose: The purpose of this paper is to investigate whether the IT professionals in a Hong Kong public transport company have a general perception of influence of the organisational defensive patterns on learning of ICT; and whether skilled incompetence, organisational defensive routines and fancy footwork are positively associated with each…

  4. 76 FR 2246 - Defense Support of Civil Authorities (DSCA) (United States)


    ... made the existing guidance outdated and inconsistent with current law and the current organizational structure of the Department of Defense. This final rule will facilitate civil authorities' access to the... Activities, and all other organizational entities within the Department of Defense (hereafter referred to...

  5. Defense Acquisition Research Journal. Volume 21, Number 1, Issue 68 (United States)


    exclusivity and the egos of A Publication of the Defense Acquisition University 477 Defense ARJ, January 2014, Vol. 21 No. 1: 466–484...the decreasing strength of their fleet relative to Japan’s. As Professor John Kuehn emphasizes, this multidimensional threat drasti- cally altered

  6. 75 FR 9399 - Defense Health Board (DHB) Meeting (United States)


    ...: Notice of meeting. SUMMARY: Pursuant to the Federal Advisory Committee Act of 1972 (5 U.S.C., Appendix as... Prevention of Suicide by Members of the Armed Forces, a subcommittee of the Defense Health Board (DHB), will..., Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One Skyline...

  7. Climate Change Impacts at Department of Defense Installations (United States)


    ANL/EVS-17/9 Climate Change Impacts at Department of Defense Installations Environmental Science Division About...LLC. June 16, 2017 ANL/EVS-17/9 Climate Change Impacts at Department of Defense Installations prepared by Rao Kotamarthi...7 3.2 Use of Weather Data and Views on Climate Change among the DoD Site Contacts

  8. Molecular sabotage of host plant defenses by spider mites

    NARCIS (Netherlands)

    Villarroel Figueroa, C.A.


    Plants constitute an ample source of nutrients for a diversity of organisms that include viruses, microbes, nematodes, insects, and mites. To protect their resources, plants possess a robust immune system that establishes structural and biochemical defenses to fight invaders. Some of these defenses

  9. 78 FR 21826 - Defense Support of Civilian Law Enforcement Agencies (United States)


    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 182 Defense Support of Civilian Law Enforcement Agencies AGENCY... piracy operations conducted pursuant to title 10, U.S.C. Sec. 182.3 Definitions. The...

  10. Defense Spending and the Economy - An Econometric View (United States)


    spend the peace dividend. Most people expect that dividend to be generated by improvements in the economy fueled by reductions in defense expenditure...There have been a myriad of articles written regarding the effects defense spending has on the economy . Many of the authors of these articles disagree

  11. The Personality Assessment Inventory (PAI) and the Detection of Defensiveness. (United States)

    Cashel, Mary Louise; And Others


    The use of scales on the Personality Assessment Inventory (PAI) to detect defensiveness in criminal and nonclinical samples was evaluated with 45 male inmates and 38 male undergraduates under standard conditions or under instructions to feign a positive role. Results indicate that the PAI is susceptible to defensive dissimulation. (SLD)

  12. Defensive Operations in a Decisive Action Training Environment (United States)


    Operations in a Decisive Action Training Environment Christopher L. Vowels W. Anthony Scroggins U.S. Army Research Institute Captain Kyle T...7260 Alabama Avenue Fort Polk, LA 71459 ii Research Report 2003 Defensive Operations in a Decisive Action Training Environment...the entirety of the project and his guidance ensured the research was successful. iv DEFENSIVE OPERATIONS IN A DECISIVE ACTION TRAINING

  13. Defense Infrastructure: Actions Needed to Strengthen Utility Resilience Planning (United States)


    DEFENSE INFRASTRUCTURE Actions Needed to Strengthen Utility Resilience Planning Report to the Committee on Strengthen Utility Resilience Planning What GAO Found Based on GAO’s survey of Department of Defense (DOD) owned utility systems, there were...Evaluation 40 Appendix I Scope and Methodology 42 Appendix II Survey on DOD-Owned Utility Resilience 48 Appendix III Comments from the

  14. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli


    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources o...

  15. Willingness to pay for defense against weapons of mass destruction. (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M


    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  16. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst


    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  17. Department of Defense Homeland Security Joint Operating Concept (United States)


    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  18. Department of Defense Management of Unobligated Funds for Acquisition Programs (United States)


    CGFM, MBA, Senior Staff Accountant, Office of the Under Secretary of Defense (Comptroller), Financial Improvement and Audit Readiness (FIAR), 703...This research analyzes financial obligation rates for acquisition programs and acquisition program contract awards made in the last quarter of the...Postgraduate School since September 2010. Prior to that, he taught acquisition and business, cost estimating, and financial management courses at the Defense

  19. Defense Reform: An Out of the Box Approach. (United States)


    O’Hanlon, Michael, Defense Planning for the Late 1990s, Beyond the Desert Storm Framework, Brookings, 1995, page 34 Ibid., page 31 Muradian, Vago ...Closure Rounds", GAO/NSIAD-97-151. May 1997 Muradian, Vago , "Bumpers Questions Navy of F/A-18E/F, Overall Shipbuilding Plan", Defense Daily. 12

  20. Silicon-inducible defenses of Zinnia elegans against Myzus persicae (United States)

    Several examples exist of silicon (Si) amendment inducing plant chemical defenses against plant pathogens, but few studies have focused on Si-induced defenses against phloem-feeding herbivores. The current study examined Si treatment of Zinnia elegans Jacq. cv. Oklahoma White (Compositae) on the pe...

  1. Globalization and Its Implications for the Defense Industrial Base (United States)


    pursued three strategies: buying relatively small defense units from diversified U.S. conglomerates (like General Motors and TRW); acquiring defense...13.9 percent).121 European companies have been very successful in China: Volkswagen makes the country’s most popular brand of cars, and Siemens is the

  2. 41 CFR 60-300.22 - Direct threat defense. (United States)


    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  3. 41 CFR 60-250.22 - Direct threat defense. (United States)


    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  4. A Forensic Psychology Exercise: Role Playing and the Insanity Defense. (United States)

    Fass, Michael E.


    Presents a role playing exercise that provides students with an introduction to forensic psychology and the insanity defense. Reports that 87% of the students found this exercise to be an enjoyable teaching technique and useful in providing an understanding of the insanity defense. Concludes that the exercise increases student interest and…

  5. Department of Defense Dictionary of Military and Associated Terms (United States)


    distribution and deployment. f. level VI - personnel: detail expressed by name, Service , military occupational specialty and unique identification...of one or more weapons with all related equipment, materials, services , personnel, and means of delivery and deployment (if applicable) required for...2016 A-46 JP 1-02 DCRF defense chemical, biological, radiological, and nuclear response force DCS Defense Courier Service ; deputy chief

  6. 77 FR 46425 - Federal Advisory Committee; Defense Health Board Meeting (United States)


    ... of the Secretary Federal Advisory Committee; Defense Health Board Meeting AGENCY: Department of Defense (DoD). ACTION: Notice of meeting. SUMMARY: Pursuant to the Federal Advisory Committee Act of 1972... amended), and 41 CFR 102-3.150, and in accordance with section 10(a)(2) of Public Law, a meeting of...

  7. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz


    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  8. Issues in defense training systems immersive displays (United States)

    Gaylord, Philip


    Display technology for DOD immersive projector-based flight training systems are at a crossroads as CRT technology slowly disappears from the market place. From the DOD perspective, emerging technologies arrive poorly matched to satisfy training needs. The DOD represents a minority voice in the marketplace. Current issues include: Satisfying requirements for black level, brightness and contrast ratio, Establishing standard metrics for resolution, system performance and reliability, Obtaining maintainability and self-calibration in multi-channel arrays, Reducing screen cross-reflection in wrap-around immersive display arrays. Laser, DLP, and LCOS projector systems are compared for their current acceptance and problems in defense flight training systems. General requirements of visual display systems are discussed and contrasted for flight trainers for low flyers (helicopters) high flyers (tactical aircraft) in real-time immersive, networked systems. FLIR and NVG simulation techniques are described.

  9. Animal defense strategies and anxiety disorders

    Directory of Open Access Journals (Sweden)

    Rosana Shuhama


    Full Text Available Anxiety disorders are classified according to symptoms, time course and therapeutic response. Concurrently, the experimental analysis of defensive behavior has identified three strategies of defense that are shared by different animal species, triggered by situations of potential, distal and proximal predatory threat, respectively. The first one consists of cautious exploration of the environment for risk assessment. The associated emotion is supposed to be anxiety and its pathology, Generalized Anxiety Disorder. The second is manifested by oriented escape or by behavioral inhibition, being related to normal fear and to Specific Phobias, as disorders. The third consists of disorganized flight or complete immobility, associated to dread and Panic Disorder. Among conspecific interactions lies a forth defense strategy, submission, that has been related to normal social anxiety (shyness and to Social Anxiety Disorder. In turn, Posttraumatic Stress Disorder and Obsessive-Compulsive Disorder do not seem to be directly related to innate defense reactions. Such evolutionary approach offers a reliable theoretical framework for the study of the biological determinants of anxiety disorders, and a sound basis for psychiatric classification.Os transtornos de ansiedade são classificados conforme a sintomatologia, decurso temporal e resposta terapêutica. Paralelamente, a análise experimental dos comportamentos de defesa identificou três estratégias comuns a diferentes espécies de animais, desencadeadas por situações de perigo predatório potencial, distal ou proximal, respectivamente. A primeira consiste na investigação cautelosa do ambiente, avaliando o risco. Supõe-se que a emoção que a acompanha seja a ansiedade e sua patologia, o Transtorno de Ansiedade Generalizada. A segunda é expressa pela fuga orientada ou pela inibição comportamental, sendo a emoção correlata o medo, e a patologia representada pelas Fobias Específicas. Finalmente, a

  10. 3D laptop for defense applications (United States)

    Edmondson, Richard; Chenault, David


    Polaris Sensor Technologies has developed numerous 3D display systems using a US Army patented approach. These displays have been developed as prototypes for handheld controllers for robotic systems and closed hatch driving, and as part of a TALON robot upgrade for 3D vision, providing depth perception for the operator for improved manipulation and hazard avoidance. In this paper we discuss the prototype rugged 3D laptop computer and its applications to defense missions. The prototype 3D laptop combines full temporal and spatial resolution display with the rugged Amrel laptop computer. The display is viewed through protective passive polarized eyewear, and allows combined 2D and 3D content. Uses include robot tele-operation with live 3D video or synthetically rendered scenery, mission planning and rehearsal, enhanced 3D data interpretation, and simulation.

  11. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina


    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  12. Free radicals, antioxidant defense systems, and schizophrenia. (United States)

    Wu, Jing Qin; Kosten, Thomas R; Zhang, Xiang Yang


    The etiopathogenic mechanisms of schizophrenia are to date unknown, although several hypotheses have been suggested. Accumulating evidence suggests that excessive free radical production or oxidative stress may be involved in the pathophysiology of schizophrenia as evidenced by increased production of reactive oxygen or decreased antioxidant protection in schizophrenic patients. This review aims to summarize the basic molecular mechanisms of free radical metabolism, the impaired antioxidant defense system and membrane pathology in schizophrenia, their interrelationships with the characteristic clinical symptoms and the implications for antipsychotic treatments. In schizophrenia, there is accumulating evidence of altered antioxidant enzyme activities and increased levels of lipid peroxidation, as well as altered levels of plasma antioxidants. Moreover, free radical-mediated abnormalities may contribute to specific aspects of schizophrenic symptomatology and complications of its treatment with antipsychotic drugs, as well as the development of tardive dyskinesia (TD). Finally, the potential therapeutic strategies implicated by the accumulating data on oxidative stress mechanisms for the treatment of schizophrenia are discussed.

  13. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)


    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  14. Defensive Diterpene from the Aeolidoidean Phyllodesmium longicirrum. (United States)

    Bogdanov, Alexander; Hertzer, Cora; Kehraus, Stefan; Nietzer, Samuel; Rohde, Sven; Schupp, Peter J; Wägele, Heike; König, Gabriele M


    Phyllodesmium is a tropical marine slug genus with about 30 described species. None of them have a protective shell, and all of them feed on octocorals that are generally known to provide defensive compounds and thus help to defend the naked slugs against sympatric predators, such as fish, crabs, cephalopods, and echinoderms. Phyllodesmium longicirrum is the species that grows the biggest and that is least protected by camouflage on its respective food, usually a soft coral of the genus Sarcophyton. Investigation of the lipophilic extract of a single specimen of P. longicirrum from the Great Barrier Reef (Australia) led to the isolation of four new polycyclic diterpenes. Compound 1 showed significant deterrent activity in a fish feeding assay.

  15. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.


    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  16. Computer network defense through radial wave functions (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  17. Contaminants at Arctic formerly used defense sites

    Directory of Open Access Journals (Sweden)

    DO Carpenter


    Full Text Available This study was conducted in order to determine if the source of contaminants at formerly used defense sites (FUDS in Alaska were deposited as a result of military occupancy or from long-­-distance transport. This determination largely influences whether remediation will occur, and, if so, to what extent. For this reason, plant samples (rinsed and unrinsed and sediment cores were collected at military and remote sites on St. Lawrence Island (SLI and Norton Sound, Alaska during the summers of 2002, 2006, and 2007 and analyzed for persistent organic pollutants. On St. Lawrence Island sediment core samples were collected at the Northeast Cape FUDS, also a traditional fishing/hunting camp, and were sectioned and analyzed for concentrations of Polychlorinated biphenyl (PCB congeners, Mirex, Dichlorodiphenyldichloroethylene (DDE, Hexachlorobenzene (HCB, Mercury and Cesium-­-137 (137Cs. Differences in the total concentrations and distributions of PCB congeners, Mirex, DDE and Mercury in sediment cores and in plants collected from the two SLI and three Norton Sound mainland formerly used defense sites indicate the majority of the contaminants found can be temporally related to releases during military occupancy and subsequent redistribution of contaminants. Contaminants in plant samples at the SLI sites are elevated relative to the two remote sites located on St. Lawrence Island and the three mainland Norton Sound FUDS at Elim, Unalakleet, and Wales. The concentrations, lateral and vertical distribution of the total PCBs, and congener-­-specific differences in sediments and plants readily differentiate locally derived from globally transported contaminants. The relative contaminant concentrations in sediment cores and between rinsed and unrinsed plants collected from the NEC FUDS indicate contaminants were remobilized and redistributed during recent site remediation activities.

  18. Flexible resource allocation during plant defense responses

    Directory of Open Access Journals (Sweden)

    Jack C. Schultz


    Full Text Available Plants are organisms composed of modules connected by xylem and phloem transport streams. Attack by both insects and pathogens elicits sometimes rapid defense responses in the attacked module. We have also known for some time that proteins are often reallocated away from pathogen-infected tissues, while the same infection sites may draw carbohydrates to them. This has been interpreted as a tug of war in which the plant withdraws critical resources to block microbial growth while the microbes attempt to acquire more resources. Sink-source regulated transport among modules of critical resources, particularly carbon and nitrogen, is also altered in response to attack. Insects and jasmonate can increase local sink strength, drawing carbohydrates that support defense production. Shortly after attack, carbohydrates may also be drawn to the root. The rate and direction of movement of photosynthate or signals in phloem in response to attack is subject to constraints that include branching, degree of connection among tissues, distance between sources and sinks, proximity, strength, and number of competing sinks, and phloem loading/unloading regulators. Movement of materials (e.g., amino acids, signals to or from attack sites in xylem is less well understood but is partly driven by transpiration. The root is an influential sink and may regulate sink-source interactions and transport above and below ground as well as between the plant and the rhizosphere and nearby, connected plants. Research on resource translocation in response to pathogens or herbivores has focused on biochemical mechanisms; whole-plant research is needed to determine which, if any, of these plant behaviors actually influence plant fitness.

  19. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)


    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  20. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns


    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.