WorldWideScience

Sample records for defense instruction dodi

  1. Going Beyond the Norm: The Case for Incorporating Evaluative Mediation into Department of Defense Employment Discrimination Complaints

    Science.gov (United States)

    2017-03-01

    9 See Department of Defense Instruction (DODI) 1400.25, Volume 1614, DoD Civilian Personnel Management ...the government in personnel as well as investigative and litigation expenses. 1 Thomas McNab...office 3 This paper focuses solely on complaints by civilian employees. Military personnel have

  2. Symposium by NATO Defense Research Group Panel VIII on Computer-Based Instruction in Military Environments

    CERN Document Server

    Weddle, Peter

    1987-01-01

    This collection of papers is the result of a symposium sponsored by NATO's Defense Research Group Panel VIII in the Spring of 1985. The symposium came into being when it became obvious to the NATO countries that research, development and utilization of advanced technologies for training was the best means of increasing both training effectiveness and efficiency. This symposium was the second in a series of three devoted to training. The series was structured to cover all aspects of training. The first series addressed the value of training, the second one dealt with the application of training technologies and the third and last of the series focused on academic issues concerned with the effect of prior learning on subsequent learning. The fact that a major American publisher has determined that computer based instruction is the technology of greatest interest to the NATO community is not surprising. Advances in microprocessor technology have revolutionized both how and where we train. During this symposium t...

  3. 77 FR 4637 - Defense Federal Acquisition Regulation Supplement: Shipping Instructions (DFARS Case 2011-D052)

    Science.gov (United States)

    2012-01-30

    ... prescription for DFARS 252.247-70XX in DFARS 212.301, as this clause is applicable under commercial contracts... request shipping instructions and the associated contract clause and clause prescription to cover both commercial and Government bills of lading, and to relocate the coverage within the DFARS. DATES: Comment...

  4. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  5. Effectiveness and Cost of Interactive Videodisc Instruction in Defense Training and Education

    Science.gov (United States)

    1990-07-01

    An improvement of 0.59 was observed across I1 studies in higher education (roughly an increase from 50th to 75th percentile achievement). Interact...improvement of 0.69 was observed across 14 studies in higher education (roughly an increase from 50th to 75th percentile achievement). Interactive...Wagner, 1988). None of the 11 studies in higher education settings concerned electronics maintenance. Their instructional content ranged from equipment

  6. Evaluation of the Defense Criminal Investigative Organizations’ Compliance with the Lautenberg Amendment Requirements and Implementing Guidance

    Science.gov (United States)

    2015-02-06

    Forces Armory. Introduction DODIG-2015-078│ 3 DoDI 6400.06 further requires commanders to ensure that military criminal investigative and law ...investigations are so thorough. The USACIDC suitability investigation includes national-level law enforcement records checks to identify criminal involvement... law . Defense Criminal Investigative Service Comments The Deputy Inspector General for Investigations, DoD Office of Inspector General, agreed and

  7. Effects of Department of Defense Instruction 5000.02 on Joint Program Executive Office Chemical Biological Defense (JPEO-CBD) Effectiveness

    Science.gov (United States)

    2016-09-01

    Table 6 (continued) LRIP Quantity 2015 X X 2008 X Market Research 2015 X X X 2008 X X OTA Report of OT&E Results...JOINT PROGRAM EXECUTIVE OFFICE – CHEMICAL BIOLOGICAL DEFENSE (JPEO-CBD) EFFECTIVENESS September 2016 By: Emily C. Whaley Advisors...Michael Boudreau Kate Ong Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE

  8. Accounting for and Managing Contractors in Contingency Operations

    Science.gov (United States)

    2007-03-26

    11 Ex-patriot ( EXPAT ...Regulation / Supplement DoD Department of Defense DoDD Department of Defense Directive DoDI Department of Defense Instruction EXPAT Ex-patriot FAR...Example definitions provided by KBR: 1 EXPAT — Direct Hire US National 2 Foreign National — Direct Hire Non-US National 3 Strategic Subcontractor

  9. 生命在最后奉献中延续--复旦大学遗体捐献接收站巡礼%Life Goes on after the Last Dedication--Pilgrimage to Dody Donation Receiving Station of Fudan University

    Institute of Scientific and Technical Information of China (English)

    周建莹

    2014-01-01

    Dody Donation Receiving Station of Fudan University (formerly Dody Donation Receiving Station of Shanghai Medical University, Receiving station for short) is part of Red Cross Society of Fudan University. Receiving station had existed before it was officially established in 1982, where the total enrollment rate and the donation rate have been the level in Shanghai leading position, even in the whole country. About 70%of voluntary donation bodies are used for medical teaching, which is an important support for medical education; and about 30% are for medical research, focusing on training pathology professionals. In addition to the receiving station, there are about 5,000 specimens in the pathological specimen museum and the human body Science museum, donated altruistically by the countless unknown deceased. Although the specimens are stationary, their lives are not over, always making dedications to health undertaking. It is the donors who made choice at the end of their lives to dedicate bodies for medical research or medical students’ anatomy practice, and who are hornored as “General Anatomy Teachers”. For 32 years, the hardware facilities and software services of receiving station continue to improve, and the station has been awarded“Shanghai Red Cross advanced collective”, “Shanghai Red Cross advanced individual”, and “China Red Cross advanced collective”; the station has been reported by media for many times.%复旦大学遗体接收站(原上海医科大学遗体接收站,简称接收站)隶属于复旦大学红十字会。接收站在1982年正式成立前已存在,遗体的总登记率和实现率一直处于上海市乃至全国领先水平。志愿捐献的遗体约70%用于医学教学,是医学教学的重要支撑,约30%用于医学科研,着重于病理专业人才的培养。除了遗体接收站,在病理标本博物馆和人体科学馆,约5000件标本是无数不知名的逝者无偿捐献,虽然标本是

  10. 32 CFR 636.32 - Miscellaneous instructions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Miscellaneous instructions. 636.32 Section 636.32 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND... towed with a chain or rope (vehicles may be towed by another privately owned vehicle by use of a...

  11. Progressive Return to Activity Following Acute Concussion/Mild Traumatic Brain Injury: Guidance for the Primary Care Manager in Deployed and Non-deployed Settings (BRIEFING SLIDES)

    Science.gov (United States)

    2014-01-01

    percent) in the DoD are mild TBIs (mTBI), also known as concussions DCoE photo Learning Objectives 4 Source: Assistant Secretary of Defense for...mandatory recovery • 24 hours for first or second concussion within 12 months 2. For three or more concussions within 12 months refer to higher...activity process All concussions should be evaluated in accordance with Department of Defense Instruction (DoDI) 6490.11; or the VA/DoD Clinical

  12. The Personality Assessment Inventory (PAI) and the Detection of Defensiveness.

    Science.gov (United States)

    Cashel, Mary Louise; And Others

    1995-01-01

    The use of scales on the Personality Assessment Inventory (PAI) to detect defensiveness in criminal and nonclinical samples was evaluated with 45 male inmates and 38 male undergraduates under standard conditions or under instructions to feign a positive role. Results indicate that the PAI is susceptible to defensive dissimulation. (SLD)

  13. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  14. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  15. 32 CFR Appendix A to Part 47 - Instructions for Submitting Group Applications Under Public Law 95-202

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Instructions for Submitting Group Applications Under Public Law 95-202 A Appendix A to Part 47 National Defense Department of Defense OFFICE OF THE... Pt. 47, App. A Appendix A to Part 47—Instructions for Submitting Group Applications Under Public...

  16. DoD Identity Matching Engine for Security and Analysis (IMESA) Access to Criminal Justice Information (CJI) and Terrorist Screening Databases (TSDB)

    Science.gov (United States)

    2016-05-04

    drug trafficking , firearms trafficking , or serious violent crimes and on foreign-born individuals who have violated some section of the Immigration...Defense DoDD DoD Directive DoDHRA DoD Human Resources Activity DoDI DoD Instruction DTM Directive-type memorandum FBI Federal Bureau of...by another person ( human readable and verifiable) or a computer system (readable and verifiable). This card is conformant with the standards

  17. Army Hearing Program Status Report Quarter 2 Fiscal Year 2017

    Science.gov (United States)

    2017-07-01

    U.S. Army Publ ic Heal th Center Army Hearing Program Status Report Q2 FY17 Clinical Public Health and Epidemiology Directorate Army...56               INTRODUCTION The Army Hearing Program Status Report (AHPSR) is a component of the Public Health ... required by Department of Defense Instruction (DoDI) 6055.12, Department of the Army Pamphlet (DA Pam) 40-501, and the Chief of Staff of the Army’s

  18. Army Hearing Program Status Report Quarter 3 Fiscal Year 2017

    Science.gov (United States)

    2017-09-14

    Health Administration (OSHA) 29 CFR 1904 and Department of Defense Instruction (DODI) 6055.12 require reporting of occupational hearing illness and...U.S. Army Publ ic Heal th Center Army Hearing Program Status Report Q3 FY17 Clinical Public Health and Epidemiology Directorate Army...Program Status Report (AHPSR) is a component of the Public Health Management System and provides a means for the installation Hearing Program Managers

  19. 48 CFR 245.606-5 - Instructions for preparing and submitting schedules of contractor inventory.

    Science.gov (United States)

    2010-10-01

    ... Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE CONTRACT MANAGEMENT...—Property that has no value except for its basic material content. (e) Instructions for completing specific... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Instructions for...

  20. 32 CFR 644.142 - Lease forms and instructions.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Lease forms and instructions. 644.142 Section 644... PROPERTY REAL ESTATE HANDBOOK Acquisition Acquisition by Leasing § 644.142 Lease forms and instructions. ENG Form 856 will be used for Corps of Engineers leases in the United States and possessions,...

  1. 32 CFR Attachment 3 to Part 855 - Landing Permit Application Instructions

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Landing Permit Application Instructions 3 Attachment 3 to Part 855 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE AIRCRAFT CIVIL AIRCRAFT USE OF UNITED STATES AIR FORCE AIRFIELDS Pt. 855, Att. 3 Attachment 3 to Part...

  2. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  3. Safety Instructions

    CERN Multimedia

    2003-01-01

    Please note that the Safety Instructions N0 37 rev. 3 (IS 37 rev. 3) entitled ""LEVEL-3" SAFETY ALARMS AND ALARM SYSTEMS" Is available on the web at the following URL: http://edms.cern.ch/document/335802 Paper copies can also be obtained from the TIS divisional secretariat, e-mail: tis.secretariat@cern.ch TIS Secretariat

  4. Instructional Coaching

    Science.gov (United States)

    Knight, Jim

    2006-01-01

    The number of school districts using instructional coaches is growing at a staggering rate. Coaching is becoming popular, in part, because many educational leaders recognize the old form of professional development, built around traditional in-service sessions for teachers, simply does not affect student achievement. By offering support, feedback,…

  5. Forum: Interpersonal Communication in Instructional Settings: Interpersonal Communication Research in Instructional Contexts: A Dyadic Approach

    Science.gov (United States)

    Goodboy, Alan K.; Kashy, Deborah A.

    2017-01-01

    Do we study too much interpersonal communication and not enough of other topics in the instructional communication literature? This forum provides a mixed bag of both affirmative and negative responses to this question. On one hand, answering "yes" is quite defensible because there are many recent studies examining interpersonal…

  6. Forum: Interpersonal Communication in Instructional Settings: Interpersonal Communication Research in Instructional Contexts: A Dyadic Approach

    Science.gov (United States)

    Goodboy, Alan K.; Kashy, Deborah A.

    2017-01-01

    Do we study too much interpersonal communication and not enough of other topics in the instructional communication literature? This forum provides a mixed bag of both affirmative and negative responses to this question. On one hand, answering "yes" is quite defensible because there are many recent studies examining interpersonal…

  7. 75 FR 75444 - Defense Federal Acquisition Regulation Supplement; Government Property (DFARS Case 2009-D008)

    Science.gov (United States)

    2010-12-03

    ... Defense Logistics Agency Form 1822, End Use Certificate. Subpart 245.70--Plant Clearance Forms 245.7001... Defense Logistics Agency Form 1822, End Use Certificate. Use when directed by the plant clearance officer....cfm . Instructions for completing the form are provided on the reverse side of the form. (i) SF...

  8. 75 FR 65460 - Renewal of Department of Defense Federal Advisory Committee; United States Military Academy Board...

    Science.gov (United States)

    2010-10-25

    ... Academy Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense gives notice that it is renewing the charter for the United States Military Academy... Academy, including the following: morale and discipline, curriculum, instruction, physical equipment...

  9. Defense Infrastructure: DOD Needs Clearer Guidance on Notifying Congress of Privately Financed Construction Projects

    Science.gov (United States)

    2017-01-01

    DEFENSE INFRASTRUCTURE DOD Needs Clearer Guidance on Notifying Congress of Privately Financed Construction Projects...Guidance on Notifying Congress of Privately Financed Construction Projects What GAO Found The Department of Defense (DOD) has issued Instruction...have generally followed the reporting guidance for major commissary surcharge and nonappropriated fund construction projects (those with a

  10. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  11. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  12. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  13. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  14. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  15. 78 FR 69267 - Defense Federal Acquisition Regulation Supplement: Requirements Relating to Supply Chain Risk...

    Science.gov (United States)

    2013-11-18

    ... supply chain risk. This rule implements section 806's three supply-chain risk-management approaches as... to improve supply chain risk management (SCRM). In doing so, the DoDI requires, among other things... consider the impact of supply chain risk in specified types of procurements related to national...

  16. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  17. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  18. Security classification of information concerning high-energy lasers. Instruction

    Energy Technology Data Exchange (ETDEWEB)

    MacCallum, J.

    1981-09-18

    The Instruction reissues Department of Defense (DoD) Instruction 5210.61, April 7, 1977, to update policy and guidance, and establishes uniform criteria for the security classification of information concerning DoD programs and projects involving the research, development, test and evaluation (RDT E), application, production, and operational use of high-energy lasers (HEL), and their application for military purposes, whether as weapons or in other military systems.

  19. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  20. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  1. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  2. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  3. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  4. Designing the Instructional Interface.

    Science.gov (United States)

    Lohr, L. L.

    2000-01-01

    Designing the instructional interface is a challenging endeavor requiring knowledge and skills in instructional and visual design, psychology, human-factors, ergonomic research, computer science, and editorial design. This paper describes the instructional interface, the challenges of its development, and an instructional systems approach to its…

  5. 48 CFR 247.305-10 - Packing, marking, and consignment instructions.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Packing, marking, and consignment instructions. 247.305-10 Section 247.305-10 Federal Acquisition Regulations System DEFENSE... Supply Contracts 247.305-10 Packing, marking, and consignment instructions. Follow the procedures at...

  6. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  7. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  8. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  9. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  10. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  11. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  12. Speechreading Instruction for Children.

    Science.gov (United States)

    Yoshinaga-Itano, Christine

    1988-01-01

    This holistic approach to speechreading instruction proposes: enhancement of the child's self-motivation, strategy-based instruction, an interactive processing approach that focuses on meaning and psycholinguistic guessing, bisensory instruction, and a hierarchical continuum beginning with easy, successful activities that gradually increase in…

  13. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  14. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  15. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  16. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  17. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  18. Aversive picture processing: effects of a concurrent task on sustained defensive system engagement.

    Science.gov (United States)

    Wangelin, Bethany C; Löw, Andreas; McTeague, Lisa M; Bradley, Margaret M; Lang, Peter J

    2011-01-01

    Viewing a series of aversive pictures prompts emotional reactivity reflecting sustained defensive engagement. The present study examined the effects of a concurrent visual task on autonomic, somatic, electrocortical, and facial components of this defensive state. Results indicated that emotional activation was largely preserved despite continuous visual distraction, although evidence of attenuation was observed in startle reflex and electrocortical measures. Concurrent task-specific reactivity was also apparent, suggesting that motivational circuits can be simultaneously activated by stimuli with intrinsic survival significance and instructed task significance and that these processes interact differently across the separate components of defensive engagement.

  19. Department of Defense Annual Report on Sexual Assault in the Military: Fiscal Year 2015

    Science.gov (United States)

    2016-05-02

    and child abuse and neglect. Sexual abuse of spouses and intimate partners is a subset of domestic abuse . This year’s report is different from...investigators, judge advocates, paralegals, and victim witness assistance personnel to support victims of sexual assault, child abuse , and domestic violence...Appendix H: Summary of Changes to DoDI 6495.02 Appendix I: Domestic Abuse Related Sexual Assault Appendix J: Acronym List List of Enclosures Enclosure

  20. Adaptive Acquisition: An Evolving Framework for Tailoring Engineering and Procurement of Defense Systems

    Science.gov (United States)

    2017-01-31

    DoDI 5000.02, and recent Better Buying Power, Performance Based Logistics ( PBL ), and “Should Cost/Will Cost” policy guidance. This guidance clearly...business decision to proceed to the next phase…” Encl. 6: “… Employ effective performance-based logistics ( PBL ) planning, development...implementation, and management in developing a system’s product support arrangements. PBL is performance-based product support, where outcomes are acquired

  1. In Defense of Decoding

    OpenAIRE

    Stenson, Nancy; Hickey, Tina

    2014-01-01

    Literacy instruction in primary schools in Ireland has fallen on hard times of late. Although the 1999 Revised Curriculum for Irish (Government of Ireland, 1999) specifically states that the recommended communicative approach encompasses all four skills (listening, speaking, reading and writing), it is often interpreted as emphasizing oral at the expense of written language. Perhaps as a result, research of the last decade shows that pupils’ Irish reading ability is suffering. While research ...

  2. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  3. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  4. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  5. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  6. Designing Instructional Systems

    Science.gov (United States)

    Furtado, Lorraine T.

    1974-01-01

    The author presents an instructional design model for teachers that evolves around a teacher-manager concept which recognizes management functions of: planning, organizing, leading, and controlling. (EA)

  7. Designing Instructional Systems

    Science.gov (United States)

    Furtado, Lorraine T.

    1974-01-01

    The author presents an instructional design model for teachers that evolves around a teacher-manager concept which recognizes management functions of: planning, organizing, leading, and controlling. (EA)

  8. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  9. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  10. UDK tower defense

    CERN Document Server

    Doran, John

    2013-01-01

    This book is written by someone who is passionate about games for those who are equally passionate about games. The step-by-step instructions contained within this guide will make creating your first game simple.If you have ever had the urge to know more about how all those amazing games you played for countless hours are created, then this book is definitely for you! This step-by-step tutorial will teach you how to create a complete game within UDK.Even if you have no prior experience of UDK, you can still start building the games you want today.

  11. Foreign Language Instruction.

    Science.gov (United States)

    Birkmaier, Emma; Lange, Dale

    1967-01-01

    This review of research in foreign language instruction summarizes and interprets selected studies produced during the period 1963-66. Topics covered include the psychology of learning, comparisons o f methods, language skills, visual-auditory relationships, vocabulary, grammar, and FLES, as well as programed instruction, technological media,…

  12. Content-Based Instruction

    Science.gov (United States)

    DelliCarpini, M.; Alonso, O.

    2013-01-01

    DelliCarpini and Alonso's book "Content-Based Instruction" explores different approaches to teaching content-based instruction (CBI) in the English language classroom. They provide a comprehensive overview of how to teach CBI in an easy-to-follow guide that language teachers will find very practical for their own contexts. Topics…

  13. Presentation on Instructional Objectives

    Science.gov (United States)

    Naz, Bibi Asia

    2009-01-01

    "Learning can be defined as change in a student's capacity for performance as a result of experience" (Kenneth D. Moore). The intended changes should be specified in instructional objectives. Viewed in this context, an objective can be defined as a clear and unambiguous description of your instructional intent. An objective is not a…

  14. Content-Based Instruction

    Science.gov (United States)

    DelliCarpini, M.; Alonso, O.

    2013-01-01

    DelliCarpini and Alonso's book "Content-Based Instruction" explores different approaches to teaching content-based instruction (CBI) in the English language classroom. They provide a comprehensive overview of how to teach CBI in an easy-to-follow guide that language teachers will find very practical for their own contexts. Topics…

  15. Instructional Coaching. Issue Brief

    Science.gov (United States)

    Kowal, Julie; Steiner, Lucy

    2007-01-01

    Schools and districts invest a great deal of time and money in professional development for teachers through instructional coaching. With this effort comes the responsibility to design coaching programs that have the greatest potential to improve classroom instruction and, in turn, increase student learning. What research is available to help…

  16. Instructional Design Team

    Science.gov (United States)

    Bancroft, Judith A.; Collins, Keith

    1974-01-01

    An instructional design team, composed of experts in nursing, education, and media production, is used at the University of Wisconsin School of Nursing, Madison, to produce instructional units for a new curriculum. The authors summarize steps of team/faculty communications, team methodology, and factors influencing the team's effectiveness. (EA)

  17. Scientific Notation in Instructional Design.

    Science.gov (United States)

    Boutwell, Richard C.

    1978-01-01

    Discusses the adoption of a notation system that is generalizable to all instructional designers and will allow and encourage a common communication base. Ten instructional design models are discussed as systems approaches to instructional design. (JEG)

  18. Supplemental instruction in chemistry

    Science.gov (United States)

    Lundeberg, Mary A.

    This study was designed to measure some effects of supplemental instruction in chemistry. Supplemental instruction is a peer-led cooperative learning program that encourages students to develop conceptual understanding by articulating both understandings and misconceptions in a think-aloud fashion. Supplemental instruction was offered three hours weekly outside of class and lab time for students in four classes of General Organic and Biological Chemistry. Over a two-year period 108 students volunteered to participate in this program; 45 students did not participate. As measured by final grades in chemistry and responses to a questionnaire, supplemental instruction was effective in increasing students' achievement in chemistry. Further research is needed to determine the in-depth effects of supplemental instruction on students' learning, problem solving, and self-esteem.

  19. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  20. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  1. Using Principles of Programmed Instruction

    Science.gov (United States)

    Huffman, Harry

    1971-01-01

    Although programmed instruction in accounting is available, it is limited in scope and in acceptance. Teachers, however, may apply principles of programming to the individualizing of instruction. (Author)

  2. The New DOD Instruction 5000.02: An Analysis of the Efficiencies to be Gained

    Science.gov (United States)

    2015-06-01

    Secretary of Defense, 1971, p. 6) 6 • Minimal demands for non -recurring information and for responding to these requests informally (Deputy...Better Buying Power initiatives woven in. All interview participants had a strong grasp on the new instruction and did not see any roadblocks with...of the CDD is a requirements authority decision point prior to the Development RFP Release decision. • The new instruction clarifies that all non

  3. SDI (Strategic Defense Initiative) Technology, Survivability and Software.

    Science.gov (United States)

    2007-11-02

    deploy This section addresses strategic uefense genetically —i.e., goals for defense against all means of delivering nuclear weap- ons, not just...34 --■■v■""• o■ ’-j-:o-;.•:/:■ ’■,--i\\’’ •e.ry^vY.’.v’y-’ ftd » 6-1. Number of Space-Based Interceptors Launched Into Space .. ,y.V.,171 6-2. Number of...times." Each make and model of computer has a unique set of instructions in which it must be pro- grammed, genetically known as machine in- structions

  4. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  5. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  6. A Study on the Defensive Stance and Position of Handball Goalkeepers: Facing a Forward Jump Shot Made from 9 Meters.

    Science.gov (United States)

    Yang, Jong Hyun; Lee, Young Suk

    2016-10-01

    The purpose of this study was to find the defensive stance and calculate an optimal defense position for goalkeepers while blocking forward jump shots made from a distance of 9 m. Nine men's handball matches were recorded and 78 video clips were selected for analysis. These are the top class goalkeepers, which included players from the national team and reserve team of Korea. The goalkeeper's actual defensive position was significantly different from instructional suggestions; the width of both feet of the goalkeeper was approximately 2.5 times the width of the shoulders, and the hands were at waist height. The goalkeeper's actual defense position was about 1.10 (± 0.3) m from the goal line and also significantly different than instructional material (0.75 m). The optimal defense position, which was calculated from the goalkeeper's actual movement, was 1.44 m from the goal line, because the ratio of goalkeeper's defensive area in relation to the total area to be defended is highest at this point. In summary, we recommended that handball goalkeepers move forward, about a half step (0.34 m), when defending a forward jump shot made from 9 m, and instructional material should be modified according to the findings from this study.

  7. Instructing for Results

    Science.gov (United States)

    Peterson, Bob

    1978-01-01

    To illustrate the importance of clarity and precision in stating objectives for learning a particular job task, a training consultant provides answers to the previous issue's questionnaire on writing instructional objectives. (MF)

  8. Instructions for Authors

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    @@ GENERAL SUBMISSION INSTRUCTIONS These guidelines have been prepared in accordance with the Uniform Requirements for Manuscripts Submitted to Biomedical Journals.1 Authors should familiarize themselves with these requirements before submission.

  9. Reading Instruction Today.

    Science.gov (United States)

    Williams, Joanna

    1979-01-01

    Describes current achievement in the areas of reading theory and reading instruction. Reviews reading research in the fields of educational and cognitive psychology. Considers the overall role of formal education in the development of literacy. (GC)

  10. Designing Printed Instructional Materials.

    Science.gov (United States)

    Burbank, Lucille; Pett, Dennis

    1986-01-01

    Discusses the importance of identifying the audience and determining specific objectives when designing printed instructional materials that will communicate effectively and provides detailed guidelines for dealing with such design factors as content, writing style, typography, illustrations, and page organization. (MBR)

  11. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  12. Video Methods for Speechreading Instruction.

    Science.gov (United States)

    Sims, Donald G.

    1988-01-01

    Addressed are the history, methodology, and instructional benefits of self-instruction video as a component of speechreading instruction with adolescent and adult hearing-impaired individuals, focusing on: factors in video lesson design, advantages of various hardware alternatives and computer-assisted learning, instructional evaluation methods,…

  13. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  14. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  15. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  16. In the aftermath of State v. Becker: a review of state and federal jury instructions on insanity acquittal disposition.

    Science.gov (United States)

    Piel, Jennifer

    2012-01-01

    An important topic related to the insanity defense is what jurors should be told about the disposition of a defendant found not guilty by reason of insanity (NGRI). In the federal court system, jurors are not instructed about the consequences of an NGRI verdict. State courts, however, are divided on the question. The federal precedent, Shannon v. United States, and the most recent state case to rule on NGRI juror instructions, State v. Becker, are reviewed in detail. What follows is the author's critique of the principal arguments for and against a jury instruction on NGRI disposition. The author argues in favor of a jury instruction on the consequences of an NGRI verdict.

  17. Applying learning theories and instructional design models for effective instruction.

    Science.gov (United States)

    Khalil, Mohammed K; Elkhider, Ihsan A

    2016-06-01

    Faculty members in higher education are involved in many instructional design activities without formal training in learning theories and the science of instruction. Learning theories provide the foundation for the selection of instructional strategies and allow for reliable prediction of their effectiveness. To achieve effective learning outcomes, the science of instruction and instructional design models are used to guide the development of instructional design strategies that elicit appropriate cognitive processes. Here, the major learning theories are discussed and selected examples of instructional design models are explained. The main objective of this article is to present the science of learning and instruction as theoretical evidence for the design and delivery of instructional materials. In addition, this article provides a practical framework for implementing those theories in the classroom and laboratory. Copyright © 2016 The American Physiological Society.

  18. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  19. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  20. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  1. Cross Cultural Instruction: An Instructional Design Case

    Directory of Open Access Journals (Sweden)

    Monica W. Tracey

    2010-01-01

    Full Text Available In an authentic example of linking design and development with learning and performance, an international real estate development firm defined a problem; implementing a cleaning system in the largest mall in the world with a cross-cultural unskilled work force in Dubai, UAE. Partnering with a university instructional design team employing a rapid prototyping methodology and the constructivist ID approach, Layers of Negotiation Model, a comprehensive curriculum was designed. This article describes the project background, initial design, the ID team's work in Dubai, illustrates the product, and summarizes the design experience.

  2. 32 CFR 725.10 - Response to requests or demands in conflict with this instruction.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Response to requests or demands in conflict with... DEPARTMENT OF THE NAVY PERSONNEL § 725.10 Response to requests or demands in conflict with this instruction... any official DOD information in response to a litigation request or demand without prior...

  3. Building a Framework for Determining the Authenticity of Instructional Tasks within Teacher Education Programs

    Science.gov (United States)

    Iverson, Heidi L.; Lewis, Mark A.; Talbot, Robert M., III

    2008-01-01

    We propose a framework for evaluating the degree of authenticity of instructional tasks used within a teacher education program. First, we provide a defense for authenticity as an exemplary aspect of education. Second, we synthesize the theoretical literature on authenticity into conceptual codes. Using these codes, we build our authenticity…

  4. Computer Based Instruction in the U.S. Army’s Entry Level Enlisted Training.

    Science.gov (United States)

    1985-03-13

    1982, December). Canadian Library Journal , 39, 357-364. Kimberlin, D. (1983). The U.S. Army air defense school distributed instructional system project...School Library Journal , p. 39. - .. .’... 130 The Army needs to improve individual soldier training in its units. (1981). Report to Congress by the

  5. Instruct coders' manual

    Science.gov (United States)

    Friend, J.

    1971-01-01

    A manual designed both as an instructional manual for beginning coders and as a reference manual for the coding language INSTRUCT, is presented. The manual includes the major programs necessary to implement the teaching system and lists the limitation of current implementation. A detailed description is given of how to code a lesson, what buttons to push, and what utility programs to use. Suggestions for debugging coded lessons and the error messages that may be received during assembly or while running the lesson are given.

  6. Instructions for authors

    Directory of Open Access Journals (Sweden)

    Editors Editorial Board

    2012-11-01

    Full Text Available

    INSTRUCTIONS FOR AUTHORS
    Author Guidelines
    Authors must submit their papers via email to brain@edusoft.ro (please! or they can create an account and submit their papers online, at www.brain.edusoft.ro. Submited papers must be written in DOC format (Microsoft Word document, in as clear and as simple as possible English. Preferred maximum paper length for the papers is 20 pages, including figures.
    The template for the paper is at this address:
    http://www.edusoft.ro/Template_for_BRAIN.docRAIN vol. 3, issue 3, Instructions for authors

  7. A Comparison of Innovative Training Techniques at the Defense Language Institute Foreign Language Center. Research Report 1426.

    Science.gov (United States)

    Bush, Brian J.

    A study evaluated the comparative training effectiveness of three language instruction methods: (1) suggestopedia, (2) the standard methodology used at the Defense Language Institute Foreign Language Center, a functional skill-building approach, and (3) a flexible-scheduling version of the standard methodology, with pacing based on group…

  8. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  9. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  10. Secondary Dance Instructional Guide.

    Science.gov (United States)

    Montgomery County Public Schools, Rockville, MD. Dept. of Instructional Planning and Development.

    This manual provides guidelines for dance teachers in secondary schools. A brief statement is made on the purpose and philosophy of dance education, and activities and instructional suggestions are presented for various dance forms: (1) group dance--folk/ethnic, square dance, and social dance; (2) aerobic dance; (3) jazz dance; (4) modern dance;…

  11. Paratransit: An Instructional Module.

    Science.gov (United States)

    Scalici, Anthony

    A concept-based introduction to paratransit is provided in this instructional module for undergraduate and graduate transportation-related courses for disciplines such as engineering, business, marketing, and technology. The concept of paratransit generally refers to modes of transportation other than mass transit and solo-driven automobiles. The…

  12. Safety instruction no 50

    CERN Multimedia

    Secrétariat SC

    2004-01-01

    Please note that the safety instruction no 50 (IS 50) entitled 'Safety Coordination on CERN Worksites' is available on the web at the following url: https://edms.cern.ch/document/479454/LAST_RELEASED Paper copies can also be obtained from the SC unit Secretariat, email: sc.secretariat@cern.ch SC Secretariat

  13. Nuclear Energy. Instructional Materials.

    Science.gov (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy (see note) developed as part of a descriptive curriculum research project in Arkansas. The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  14. Orwell's Instructive Errors

    Science.gov (United States)

    Julian, Liam

    2009-01-01

    In this article, the author talks about George Orwell, his instructive errors, and the manner in which Orwell pierced worthless theory, faced facts and defended decency (with fluctuating success), and largely ignored the tradition of accumulated wisdom that has rendered him a timeless teacher--one whose inadvertent lessons, while infrequently…

  15. Instructional Guidelines. Welding.

    Science.gov (United States)

    Fordyce, H. L.; Doshier, Dale

    Using the standards of the American Welding Society and the American Society of Mechanical Engineers, this welding instructional guidelines manual presents a course of study in accordance with the current practices in industry. Intended for use in welding programs now practiced within the Federal Prison System, the phases of the program are…

  16. Wind Power. Instructional Materials.

    Science.gov (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy developed as part of a descriptive curriculum research project in Arkansas (see note). The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  17. Nuclear Energy. Instructional Materials.

    Science.gov (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy (see note) developed as part of a descriptive curriculum research project in Arkansas. The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  18. Computer-assisted instruction

    NARCIS (Netherlands)

    Voogt, J.; Fisser, P.; Wright, J.D.

    2015-01-01

    Since the early days of computer technology in education in the 1960s, it was claimed that computers can assist instructional practice and hence improve student learning. Since then computer technology has developed, and its potential for education has increased. In this article, we first discuss th

  19. Wind Power. Instructional Materials.

    Science.gov (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy developed as part of a descriptive curriculum research project in Arkansas (see note). The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  20. Instructional Guide for Cosmetology.

    Science.gov (United States)

    Virginia Polytechnic Inst. and State Univ., Blacksburg. Dept. of Education.

    Intended as a tool for cosmetology teachers in Virginia public and private schools, the document is an instructional guide which offers 12 units of study, arranged in a three year course. Materials covered help prepare students for licensure in the State of Virginia and the guide is designed to cover the 1,500 hours required to be spent in the…

  1. Gaze Interactive Building Instructions

    DEFF Research Database (Denmark)

    Hansen, John Paulin; Ahmed, Zaheer; Mardanbeigi, Diako

    We combine eye tracking technology and mobile tablets to support hands-free interaction with digital building instructions. As a proof-of-concept we have developed a small interactive 3D environment where one can interact with digital blocks by gaze, keystroke and head gestures. Blocks may be moved...

  2. Using Realia in Instruction.

    Science.gov (United States)

    Blanton, Lloyd H.; And Others

    1980-01-01

    Seven articles in this issue focus on the use of realia in instruction. Authors discuss reasons why realia effectively motivate students and enhance learning; the place of realia in supervised occupational experience programs; the importance of real-life experiences to vocational agriculture; and student teaching as a reality experience. (SK)

  3. Psychologism and Instructional Technology

    Science.gov (United States)

    Gur, Bekir S.; Wiley, David A.

    2009-01-01

    Little of the work in critical and hermeneutical psychology has been linked to instructional technology (IT). This article provides a discussion in order to fill the gap in this direction. The article presents a brief genealogy of American IT in relation to the influence of psychology. It also provides a critical and hermeneutical framework for…

  4. Sourcebook for Bibliographic Instruction.

    Science.gov (United States)

    Dusenbury, Carolyn, Ed.; And Others

    Direction and guidance are provided for establishing and maintaining bibliographic instruction (BI) programs. This document provides an overview of BI and BI programs and points readers to other sources of information. Five key topics were identified and the following papers are presented: (1) "An Introduction to Learning Theory" (Lori Arp); (2)…

  5. Grammar Instruction and Technology

    Science.gov (United States)

    Lacina, Jan

    2005-01-01

    Much of the research literature from the past 25 years has supported the importance of teaching grammar in the context of writing instruction (Calkins, 1980; DiStefano & Killion, 1984; Weaver, 1996,1998). Unlike other content areas, practice does not make perfect when learning grammar. While isolated drill and practice of grammatical concepts may…

  6. Job Instruction Training.

    Science.gov (United States)

    Pfau, Richard H.

    Job Instruction Training (JIT) is a step-by-step, relatively simple technique used to train employees on the job. It is especially suitable for teaching manual skills or procedures; the trainer is usually an employee's supervisor but can be a co-worker. The JIT technique consists of a series of steps that a supervisor or other instructor follows…

  7. Instructions for Sampling Particulates.

    Science.gov (United States)

    Ekman, Frank

    This technical report presents detailed instructions for sampling particulates. The table of contents includes sections on Introduction, Volume Determinations, Apparatus - Assembly and Operation, Sampling Techniques, and Acknowledgment. Six charts, 24 graphs, and one diagram are appended to facilitate sampling, as well as sections on Isokinetic…

  8. Characteristics of Instructional Technologists.

    Science.gov (United States)

    Gagne, Robert M.

    A thoroughly planned program for instructional technologists--one including selection, education, and on-the-job training--must take into consideration the competencies and characteristics desirable in such technologists. Such requirements fall into three categories: attitudes or values, specialized knowledge, and intellectual skills or…

  9. Safety Instruction No 43

    CERN Document Server

    2004-01-01

    Please note that the Safety Instruction No 43 (IS 43) entitled "ASBESTOS - DANGERS AND PRECAUTIONS" is available on the web at the following URL: https://edms.cern.ch/document/335809/LAST_RELEASED/ Paper copies can also be obtained from the SC secretariat, e-mail: tis.secretariat@cern.ch. SC Secretariat

  10. Scaffolding in Assisted Instruction

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available On-The-Job Training, developed as direct instruction, is one of the earliest forms of training. This method is still widely in use today because it requires only a person who knows how to do the task, and the tools the person uses to do the task. This paper is intended to be a study of the methods used in education in Knowledge Society, with more specific aspects in training the trainers; as a result of this approach, it promotes scaffolding in assisted instruction as a reflection of the digital age for the learning process. Training the trainers in old environment with default techniques and designing the learning process in assisted instruction, as an application of the Vygotskian concept of the zone of proximal development (ZPD to the area of computer literacy for the younger users, generate diversity in educational communities and requires standards for technology infrastructure, standards for the content, developed as a concepts map, and applications for personalized in-struction, based on ZPD theory.

  11. 77 FR 29616 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-18

    ..., Department of Defense. DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information... Critical Infrastructure Program (DCIP) Management; and DoDI 5205.13, Defense Industrial Base (DIB) Cyber...

  12. Individual Differences, Computers, and Instruction.

    Science.gov (United States)

    Ayersman, David J.; Minden, Avril von

    1995-01-01

    Provides a conceptual foundation for the development of hypermedia as an instructional tool for addressing individual differences in learning styles. Highlights include a literature review; computers and instruction; individual differences, computers, and instruction; cognitive controls; cognitive styles and learning; personality types; and future…

  13. Academic and Military Instructional Technology.

    Science.gov (United States)

    Branson, Robert K.

    This paper examines the practices and accomplishments of the military in the area of instructional technology. An examination of historical background is used to increase the precision of the definition of instructional technology. Specific contributions of the military are described and then uses of instructional technology in the military and…

  14. Interactive Instruction in Bayesian Inference

    DEFF Research Database (Denmark)

    Khan, Azam; Breslav, Simon; Hornbæk, Kasper

    2017-01-01

    An instructional approach is presented to improve human performance in solving Bayesian inference problems. Starting from the original text of the classic Mammography Problem, the textual expression is modified and visualizations are added according to Mayer’s principles of instruction...... that an instructional approach to improving human performance in Bayesian inference is a promising direction....

  15. Task-Based Writing Instruction

    Science.gov (United States)

    Bantis, Alexandros

    2010-01-01

    The purpose of this study was to investigate the impact of task-based writing instruction, a communicative language-teaching method, on second language acquisition and differentiation of instruction for English language learners during the independent work time instructional component of the Open Court Reading program. Through student-teacher…

  16. Student Models of Instructional Design

    Science.gov (United States)

    Magliaro, Susan G.; Shambaugh, Neal

    2006-01-01

    Mental models are one way that humans represent knowledge (Markman, 1999). Instructional design (ID) is a conceptual model for developing instruction and typically includes analysis, design, development, implementation, and evaluation (i.e., ADDIE model). ID, however, has been viewed differently by practicing teachers and instructional designers…

  17. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  18. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  19. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  20. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  1. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  2. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  3. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  4. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  5. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  6. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  7. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  8. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  9. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  10. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  11. Interactive radio instruction: developing instructional methods.

    Science.gov (United States)

    Friend, J

    1989-01-01

    The USAID has, since 1972, funded the development of a new methodology for educational radio for young children through 3 projects: the Radio Mathematics PRoject of Nicaragua, the Radio Language Arts Project of Kenya, and the Radio Science PRoject of Papua New Guinea. These projects developed math programs for grades 1-4 and English as a second language for grades 1-3; programs to teach science in grades 4-6 are now being developed. Appropriate techniques were developed to engage young children actively in the learning process. Lessons are planned as a "conversation" between the children and the radio; scripts are written as 1/2 of a dialogue, with pauses carefully timed so that written as 12 of a dialogue, with pauses carefully timed so that students can contribute their 1/2. Teaching techniques used in all 3 projects include choral responses, simultaneous individual seatwork, and activities using simple materials such as pebbles and rulers. Certain techniques were specific to the subject being taught, or to the circumstances in which the lessons were to be used. Patterned oral drill was used frequently in the English lessons, including sound-cued drills. "Deferred" oral responses were used often in the math lessons. In this method, the children are instructed to solve a problem silently, not giving the answer aloud until requested, thus allowing time for even the slower children to participate. "One-child" questions were used in both English and science: the radio asks a question to be answered by a single child, who is selected on the spot by the classroom teacher. This allows for open-ended questions, but also requires constant supervision of the classroom teacher. Songs and games were used in all programs, and extensively for didactic purposes in the teaching of English. Instructions for science activities are often more complex than in other courses, particularly when the children are using science apparatus, especially when they work in pairs to share scarce

  12. Groundwater hydrology instructional system

    Science.gov (United States)

    Schmidt, Ronald G.

    Wright State University, Dayton, Ohio, is preparing for its third cycle of the Interactive Remote Instructional System (IRIS) in groundwater hydrology, beginning January 15, 1986. The first cycle finished with an impressive completion ratio for registered participants, and the second cycle has currently been underway since July. This comprehensive hydrogeology program was originally developed for the Soil Conservation Service (of the U.S. Department of Agriculture) to prepare their personnel for professional practice work. Since its evolution into IRIS, an 80% participant completion rate has been recorded for the first cycle, which is a significant departure from success rates traditionally recorded by correspondence courses. This excellent rate of success is the result of 2 years of refinement and demonstrates the progressive nature of the program. IRIS has met the needs of participants by developing a curriculum that reflects current trends in the groundwater industry and has provided a unique educational approach that ensures maximum interaction between the instructional staff and participants.

  13. Instructional immediacy in elearning.

    Science.gov (United States)

    Walkem, Kerrie

    2014-01-01

    Instructor immediacy has been positively associated with many desirable academic outcomes including increased student learning. This study extends existing understanding of instructional immediacy behaviours in elearning by describing postgraduate nursing students' reflections on their own experience. An exploratory, descriptive survey design was used to collect qualitative data. Participants were asked what behaviours or activities help to create rapport or a positive interpersonal connection (immediacy) between students and their online teacher(s). Thematic analysis of the data revealed three main themes: acknowledging and affirming student's personal and professional responsibilities; providing clear and timely information; and utilising rich media. These findings give lecturers insight into instructional strategies they may adopt to increase immediacy in elearning and hence improve student learning outcomes.

  14. Safety instruction No. 36

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that a revised version of Safety Instruction No. 36 (IS 36), entitled "Safety rules for the use of static magnetic fields at CERN" is available on the Web at the following url: https://edms.cern.ch/document/335801/LAST_RELEASED Paper copies can also be obtained from the SC unit secretariat (e-mail : sc.secretariat@cern.ch) SC Secretariat

  15. Instructional Psychology 1976 - 1981,

    Science.gov (United States)

    1982-06-01

    phoneme analysis and blending is reviewed by Resnick (1981) and by Williams (1980), and is discussed in terms of an interactive theory of reading...academically oriented. In a study of student ratings of instruction, Williams & Ware (1976) show that college students who received the most substantive...Rosen et al, 1977; Rosen et al, 1978; Bargh & Schul, 1980). Peer tutoring has been employed as a component of many forms of Personalized Systems of

  16. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  17. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  18. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  19. Effective Multicultural Instruction

    Directory of Open Access Journals (Sweden)

    Franklin T. Thompson

    2014-02-01

    Full Text Available The reason why the Trayvon Martin murder trial and similar court cases create a philosophical rift in our nation is due in part to flaws in the delivery of multicultural education. Traditional multicultural instruction does not prepare citizens for the subtleties and complexities of race relations. This study investigates critical strategies and practices that address multicultural missing gaps. I also seek to fill a void in the literature created by a lack of student input regarding teaching strategies that encourage lifelong learning. Students (N = 337 enrolled at a Midwestern university were asked to rate the efficacy of selected instructional strategies. Utilizing a 9-point Likert-type scale, students gave themselves a personal growth rating of 7.15 (SD = 1.47. Variables important to predicting that growth (R2 = .56, p < .0005 were a six-factor variable known as a non-color-blind instructional approach (t = 10.509, p ≤ .0005, allowing students an opportunity to form their own opinions apart from the instructor (t = 4.797, p ≤ .0005, and a state law that mandated multicultural training (t = 3.234, p = .001. Results demonstrated that utilizing a 35% traditional and 65% critical pedagogy mixture when teaching multicultural education helped promote win/win scenarios for education candidates hoping to become difference makers.

  20. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  1. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  2. AXIOLOGICAL MODEL OF INSTRUCTIONAL DESIGN

    Directory of Open Access Journals (Sweden)

    Takushevich I. A.

    2015-10-01

    Full Text Available The article presents instructional design as a new approach to the issue of developing value-oriented worldview. Scientific research and analysis led the author to summarize instructional design theory, broaden the definition of instructional design and apply it to instruction and learning in a new manner. The goal to build a pattern of instruction aimed at developing learners’ value-oriented worldview required the author to study the existing instructional design model, to analyse and generalize a number of monographs and articles devoted to the problem of building value systems and value orientations, and finally to investigate and apply the new knowledge to real life in the form of experiment. The work conducted brought the author to axiological model of instructional design, which consists of three dimensions: a linear sequence of the events from designing the instructional material to independent learning activities, interaction between a teacher and a learner, pace of learning and design. The article touches upon every dimension, level and stage of the model, describes and defines the procedures that take place on each of them, as well as suggests a possible way to visualize the model in a form of a sketch. The author also points out the advantages of using instructional design as an efficient and smart tool to organize learning and justifies the use of the new instructional design model in XXI century

  3. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  4. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  5. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  6. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  7. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  8. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  9. USING GOOGLE+ FOR INSTRUCTION

    Directory of Open Access Journals (Sweden)

    Kevin YEE

    Full Text Available Introduced in July, 2011 in a beta test of invited users only, the new social media service Google+ (or G+ quickly spread by word of mouth, and Google leader Larry Page (2011 blogged that within sixteen days it had 10 million users. By August, it had 25 million users (Cashmore, 2011. Even with slower growth ahead (still with no marketing budget, the service looks likely to crest 100 million users perhaps as early as ten months, a feat that took Facebook three years. Other social networks, most notably Facebook and Twitter, have been used increasingly as instructional tools, since they are platforms with which students are already familiar (Maloney, 2007; McLoughlin & Lee, 2007. Selwyn (2009 found that students often eschew official channels for communication in favor of less formal community-based formats such as Facebook, implying a growing need for instructional communication tools that will be used willingly by students. The question is whether Google+ can be used like Twitter or Facebook to augment instruction, or even, perhaps, to improve upon those predecessors for academic purposes. Google+ is like Twitter in that anyone can follow a given user’s posts. There is no direct “friend” relationship required to read the posts written by others. However, it also approximates some features of Facebook. Rather than friends sorted into “lists” like in Facebook, Google+ allows users to place feeds into one or more “circles,” the better to monitor (or control the flow of information to and from different audiences. Circles are more intuitive, and more central to the experience, than the Facebook lists. They provide an explicit organizational structure, compared to the less-obvious listing functionality, which feels like an afterthought, found in Facebook.

  10. The Defense Systems Acquisition and Review Council

    Science.gov (United States)

    1976-09-15

    competition; and (i) Validity of contractor proposals. (3) For systems proposed for initial produccion : (a) Feasibility of production, Including "evaluation...Industrial Preparedness ASD(I&L) DoD Instruction Production Planning 4005.3 Procedures Industrial Preparedness ASD(I&L) DoD �.3M Planning Manual ...Guidance Manual ," July 1, 1971 authorized by DoD Instruction 7110-.1, August 23, 1968 I, PURPOSE This Instruction establishes policy and instruction

  11. Instructional Use of Weblogs

    Directory of Open Access Journals (Sweden)

    Yavuz AKBULUT

    2007-07-01

    Full Text Available Web 2.0 can provide learners with increased interaction and online collaboration. Among its applications, weblogs have gained an increasing popularity as they allow bloggers to voice their own perspectives which can be delivered to a large audience through the Web. Weblogs can be integrated into teaching-learning process as they encourage learners to collaborate and freely voice their ideas. However, innovative technologies might not always lead to innovative distance education practices if timely adaptation lags behind. This study presents a review on instructional use of weblogs along with implications for open and distance learning.

  12. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  13. Allocating instruction time: How language instruction can affect multiple skills

    NARCIS (Netherlands)

    Borghans, L.; Diris, R.E.M.

    2014-01-01

    There exists substantial variation in how schools allocate instruction time to school subjects. The effectiveness of that allocation depends on the immediate effect of instruction in one subject on achievement in the same subject, on how skills further develop over time, and on possible spillover

  14. Direct Instruction Revisited: A Key Model for Instructional Technology

    Science.gov (United States)

    Magliaro, Susan G.; Lockee, Barbara B.; Burton, John K.

    2005-01-01

    Rooted in behavioral theory, particularly the radical or selectivist behaviorism of B.F. Skinner (1953, 1954, 1966, 1968, 1974), the direct instruction (DI) approach to teaching is now well into its third decade of influencing curriculum, instruction, and research. It is also in its third decade of controversy. Our purpose is to present the DI…

  15. The Instructional Network: Using Facebook to Enhance Undergraduate Mathematics Instruction

    Science.gov (United States)

    Gregory, Peter; Gregory, Karen; Eddy, Erik

    2014-01-01

    Facebook is a website with over one billion users worldwide that is synonymous with social-networking. However, in this study, Facebook is used as an "instructional network". Two sections of an undergraduate calculus course were used to study the effects of participating in a Facebook group devoted solely to instruction. One section was…

  16. The Instructional Network: Using Facebook to Enhance Undergraduate Mathematics Instruction

    Science.gov (United States)

    Gregory, Peter; Gregory, Karen; Eddy, Erik

    2014-01-01

    Facebook is a website with over one billion users worldwide that is synonymous with social-networking. However, in this study, Facebook is used as an "instructional network". Two sections of an undergraduate calculus course were used to study the effects of participating in a Facebook group devoted solely to instruction. One section was…

  17. Allocating instruction time: How language instruction can affect multiple skills

    NARCIS (Netherlands)

    Borghans, L.; Diris, R.E.M.

    2014-01-01

    There exists substantial variation in how schools allocate instruction time to school subjects. The effectiveness of that allocation depends on the immediate effect of instruction in one subject on achievement in the same subject, on how skills further develop over time, and on possible spillover ef

  18. Effects of Instructional Events in Computer-Based Instruction

    Science.gov (United States)

    Martin, Florence; Klein, James; Sullivan, Howard

    2004-01-01

    Forty years ago, Robert Gagne published the first edition of his book The Conditions of Learning (1965) in which he proposed nine events of instruction that provide a sequence for organizing a lesson. These events remain the foundation of current instructional design practice (Reiser, 2002; Richey, 2000). They represent desirable conditions in an…

  19. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  20. Defense against the Black Arts How Hackers Do What They Do and How to Protect against It

    CERN Document Server

    Varsalone, Jesse

    2011-01-01

    As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It provides hands-on instruction to a host of techniques used to hack into a variety of systems. Exposing hacker methodology with concrete examples, Defense against the Black Arts shows you how to outwit computer predators at their own game.Among the m

  1. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  2. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  3. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  4. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  7. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  8. Analyzing Classroom Instruction in Reading.

    Science.gov (United States)

    Rutherford, William L.

    A method for analyzing instructional techniques employed during reading group instruction is reported, and the characteristics of the effective reading teacher are discussed. Teaching effectiveness is divided into two categories: (1) how the teacher acts and interacts with children on a personal level and (2) how the teacher performs his…

  9. Unpacking Corrections in Mobile Instruction

    DEFF Research Database (Denmark)

    Levin, Lene; Broth, Mathias; Cromdal, Jakob

    2017-01-01

    This article deals with the organisation of correction in mobile instructional settings. Five sets of video data (>250 h) documenting how learners were instructed to fly aeroplanes, drive cars and ride bicycles in real life traffic were examined to reveal some common features of correction exchan...

  10. Distance Education Instructional Model Applications.

    Science.gov (United States)

    Jackman, Diane H.; Swan, Michael K.

    1995-01-01

    A survey of graduate students involved in distance education on North Dakota State University's Interactive Video Network included 80 on campus and 13 off. The instructional models rated most effective were role playing, simulation, jurisprudential (Socratic method), memorization, synectics, and inquiry. Direct instruction was rated least…

  11. Instructional Strategies to Facilitate Learning

    Science.gov (United States)

    Lunenburg, Frederick C.; Irby, Beverly J.

    2011-01-01

    Teacher behavior research has shown that teacher behaviors, as well as specific teaching strategies, make a difference with regard to student achievement. Ten durable instructional strategies are discussed: set induction, stimulus variation, reinforcement, questioning, recognizing attending behavior, lecturing or direct instruction, planned…

  12. Instructional Analysis for Health Occupations.

    Science.gov (United States)

    East Texas State Univ., Commerce. Occupational Curriculum Lab.

    This instructional analysis centers on identifying the skills, related knowledge, teacher activities, and student activities that are central to teaching various topics included in the core curriculum for health occupations courses. Addressed in the volume are the following instructional areas: first aid; medical terminology; medical asepsis;…

  13. Adaptive instruction and pupil achievement

    NARCIS (Netherlands)

    Houtveen, A.A M; Booy, N; de Jong, Robert (Rob); van de Grift, W.J C M

    1999-01-01

    In this article the results are reported of a quasi-experiment on effects of adaptive instruction on reading results of children in the first year of reading instruction in Dutch primary schools. The research involved 456 pupils from 23 schools (12 experimental and 11 control group schools). Teacher

  14. Professional Cosmetology Practices. Instructional Units.

    Science.gov (United States)

    Hopcus, Sharron; Armstrong, Ivan J.

    This publication is designed to assist the instructor and students in understanding the latest concepts and techniques of the instructional phase of cosmetology programs. The instructional units are in five areas: (1) orientation, (2) professional practices: hair, (3) professional practices: skin and nails, (4) cosmetology science, and (5)…

  15. Overcoming Resistance to Instructional Technology.

    Science.gov (United States)

    Powers, William G.; Anderson, Susan; Love, Don

    2000-01-01

    Administrators must convince and motivate faculty to adopt instructional technology if departments are to remain on the cutting edge. Describes seven actions to promote the use of instructional technology: know your faculty; be aware of faculty concerns; use technology yourself; review potential barriers; explore and obtain resources; communicate…

  16. A Primer on Instructional Coaches

    Science.gov (United States)

    Knight, Jim

    2005-01-01

    The pressure to improve the quality of instruction in schools may be higher today than at any other time in the history of U.S. education. To respond to this urgent demand, schools across the nation are hiring instructional coaches (ICs), even though there is little published research that shows what works and what does not work when it comes to…

  17. Marketing Instructional Development Internally, Externally.

    Science.gov (United States)

    Lied, James

    This description of the marketing process as a practical way to manage the function of instruction development emphasizes the importance of the identification and evaluation of customer needs before developing objectives. To assist the instructional development agency in focusing on this aspect of planning, a check list of possible marketing…

  18. ROTI-OPERATIONAL INSTRUCTIONAL MODEL

    Directory of Open Access Journals (Sweden)

    H. Barker,

    2012-02-01

    Full Text Available The instructional model presented here is a combination of systems used by the United States Navy and R. F. Mager's Criteria Referenced Instruction Model for Analysis Design and Implementation. The author has taken what he believes is the best components from each system and established a working model.

  19. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  20. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  1. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  2. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  3. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  4. Academic Service Quality and Instructional Quality.

    Science.gov (United States)

    Greiner, Keith; Westbrook, Thomas S.

    2002-01-01

    Examined the relationship between academic service quality and instructional quality in higher education. Found a high correlation between academic service and instructional quality, with academic service overlapping instructional quality in three dimensions: enthusiasm, organization, and rapport. (EV)

  5. The Challenge of Individualized Instruction in Corrections.

    Science.gov (United States)

    Clements, Carl B.; McKee, John M.

    2000-01-01

    Discusses 14 challenges to the use of individualized instruction in corrections. Emphasizes a systems approach, motivational tools, programmed instructional materials, and approaches such as Direct Instruction and Precision Teaching. (SK)

  6. Intelligent Educational Systems for Anchored Instruction?

    Science.gov (United States)

    Kumar, David D.

    1995-01-01

    Explores the potential for using Intelligent Educational Systems (IES) for anchoring instruction in macro contexts in science education. Topics include anchored instruction; situated cognition; problem solving; cognitivism; interactive video environments; and examples of combining IES and anchored instruction. (LRW)

  7. Intelligent Educational Systems for Anchored Instruction?

    Science.gov (United States)

    Kumar, David D.

    1995-01-01

    Explores the potential for using Intelligent Educational Systems (IES) for anchoring instruction in macro contexts in science education. Topics include anchored instruction; situated cognition; problem solving; cognitivism; interactive video environments; and examples of combining IES and anchored instruction. (LRW)

  8. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  9. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  10. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  11. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  12. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  13. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  14. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  15. Instructional strategies to improve women's attitudes toward science

    Science.gov (United States)

    Newbill, Phyllis Leary

    Although negative attitudes toward science are common among women and men in undergraduate introductory science classes, women's attitudes toward science tend to be more negative than men's. The reasons for women's negative attitudes toward science include lack of self-confidence, fear of association with social outcasts, lack of women role models in science, and the fundamental differences between traditional scientific and feminist values. Attitudes are psychological constructs theorized to be composed of emotional, cognitive, and behavioral components. Attitudes serve functions, including social expressive, value expressive, utilitarian, and defensive functions, for the people who hold them. To change attitudes, the new attitudes must serve the same function as the old one, and all three components must be treated. Instructional designers can create instructional environments to effect attitude change. In designing instruction to improve women's attitudes toward science, instructional designers should (a) address the emotions that are associated with existing attitudes, (b) involve credible, attractive women role models, and (c) address the functions of the existing attitudes. Two experimental instructional modules were developed based on these recommendations, and two control modules were developed that were not based on these recommendations. The asynchronous, web-based modules were administered to 281 undergraduate geology and chemistry students at two universities. Attitude assessment revealed that attitudes toward scientists improved significantly more in the experimental group, although there was no significant difference in overall attitudes toward science. Women's attitudes improved significantly more than men's in both the experimental and control groups. Students whose attitudes changed wrote significantly more in journaling activities associated with the modules. Qualitative analysis of journals revealed that the guidelines worked exactly as predicted

  16. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  17. Freshwater Mussel Initial Survey Instructions

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — In order to effectively implement endangered species recovery and mussel restoration actions in the Ohio River, we need statistically valid and defensible data to...

  18. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  19. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  20. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  1. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  2. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  3. Tiered Instruction: An Effective Strategy to Differentiation of Instruction

    Directory of Open Access Journals (Sweden)

    Yahya BELER

    2011-08-01

    Full Text Available This study aimed to examine the effects of a tiered instructional design on classroom management, attitude and the learning level of students. The instructional program was prepared for an introductory science course for 3rd grade students. The case study research method was used. Observation form, teacher and student interview forms were used to collect data. The teaching program was planned using a tiered instruction method for nine subjects of the “Yesterday, Today, Tomorrow” curriculum theme. The teacher made a short presentation and then students were classified into ability groups. Finally, each group completed learning activity via individual and group tasks based on activities appropriate to their abilities. The results indicate that tiered instruction had positive effects on the learning outcomes of students. All groups completed the classroom activities easily, which increased their motivation. Students participated in activities voluntarily and enthusiastically.

  4. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  5. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  6. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  7. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours

    2012-07-01

    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  8. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  9. Motivational Measure of the Instruction Compared: Instruction Based on the ARCS Motivation Theory vs Traditional Instruction in Blended Courses

    Science.gov (United States)

    Colakoglu, Ozgur M.; Akdemir, Omur

    2012-01-01

    The ARCS Motivation Theory was proposed to guide instructional designers and teachers who develop their own instruction to integrate motivational design strategies into the instruction. There is a lack of literature supporting the idea that instruction for blended courses if designed based on the ARCS Motivation Theory provides different…

  10. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  11. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  12. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  13. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  14. Optimal defense strategy: storage vs. new production.

    Science.gov (United States)

    Shudo, Emi; Iwasa, Yoh

    2002-12-07

    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  15. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  16. Measurement Control Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Crawford, Cary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McGinnis, Brent [Pacific Northwest National Lab. (PNNL), Richland, WA (United States) and Insolves LLC

    2014-04-01

    A workshop to teach the essential elements of an effective nuclear materials control and accountability (MC&A) programs are outlined, along with the modes of Instruction, and the roles and responsibilities of participants in the workshop.

  17. Hypermedia Environments and Adaptive Instruction.

    Science.gov (United States)

    Federico, Pat-Anthony

    1999-01-01

    Reviews relevant professional literature concerning hypermedia environments and adaptive instruction for online learning for distance education and continuing education. Highlights include aptitude-treatment interaction; cognitive processes; navigational paths; log files; and intelligent tutors. Contains 125 references. (LRW)

  18. Unpacking Corrections in Mobile Instruction

    DEFF Research Database (Denmark)

    Levin, Lena; Cromdal, Jakob; Broth, Mathias

    2017-01-01

    This article deals with the organisation of correction in mobile instructional settings. Five sets of video data (>250 h) documenting how learners were instructed to fly aeroplanes, drive cars and ride bicycles in real life traffic were examined to reveal some common features of correction...... exchanges. Through detailed multimodal analysis of participants’ actions, it is shown how instructors systematically elaborate their corrective instructions to include relevant information about the trouble and remedial action – a practice we refer to as unpacking corrections. It is proposed...... that the practice of unpacking the local particulars of corrections (i) provides for the instructional character of the interaction, and (ii) is highly sensitive to the relevant physical and mobile contingencies. These findings contribute to the existing literature on the interactional organisation of correction...

  19. Measurement control workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Crawford, Cary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McGinnis, Brent [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Insolves LLC, Piketon, OH (United States)

    2014-04-01

    A workshop to teach the essential elements of an effective nuclear materials control and accountability (MC&A) programs are outlined, along with the modes of Instruction, and the roles and responsibilities of participants in the workshop.

  20. Zoology by Self-Instruction

    Science.gov (United States)

    Roach, Keith; Hammond, Roger

    1976-01-01

    A historical account is given of how a conventional university first-year undergraduate course in zoology has been replaced by a self-instructional one. Advantages and problems are weighed, and successful student achievement and interest are described. (LBH)

  1. A Fallibilistic Model for Instruction

    Science.gov (United States)

    Dawson, A. J.

    1971-01-01

    Discusses models in inquiry and of instruction based on critical Fallibilistic philosophy, developed by Karl R. Popper, which holds that all knowledge grows by conjecture and refutation. Classroom applications of strategies which result from the model are presented. (JP)

  2. Managing Motivation In Personalized Instruction

    Science.gov (United States)

    Wagner, G. R.; And Others

    1974-01-01

    addresses the topic of managing motivation in Keller's Personalized System of Instruction (PSI). Outlines the reinforcing features that are at the foundation of PSI theory, and examines methods used to ensure that these reinforcing properties are fu lly utilized. (JR)

  3. Expertise in Swiss mathematics instruction

    OpenAIRE

    2011-01-01

    This chapter draws on data and findings from several video studies to describe the quality of mathematics teaching in Switzerland. The focus is on features of instructional practice and quality as core components of classroom behavior that reflect the teacher’s expertise in creating optimal learning opportunities. The didactic triangle is used as the basis for describing the profile of expertise in Swiss mathematics instruction in terms of three interdependent dimensions of ins...

  4. Instructional Technology Must Contribute to Productivity

    Science.gov (United States)

    Molenda, Michael

    2009-01-01

    Those involved in instructional technology in higher education are urged to view instructional technology as a means of improving academic productivity. Instructional technology has been used for over forty years to analyze instructional problems and design solutions that reduce costs and improve learning outcomes. The Pew Program in Course…

  5. Colleague to Colleague: Deepening Instructional Practice

    Science.gov (United States)

    Gullen, Kristine; Chaffee, Martin

    2012-01-01

    Collaborative dialogue about instructional practices is essential to the growth of the education profession. To determine what effective instruction is and how to improve their own instructional practice, educators must clarify and publicly state their beliefs about instruction, teaching, and leadership. This is messy and complex work, and to…

  6. Professional Development: Identifying Effective Instructional Coaching Activities

    Science.gov (United States)

    Mannino, Gina

    2014-01-01

    The purpose of this study was to identify the instructional coaching activities most used by instructional coaches in southeast Texas school districts and to test if there was a relationship between the use of instructional coaching and perceived improvement in the instructional practices of teachers and student achievement. The participants for…

  7. Instructional Coaching: Leadership Styles and Practices

    Science.gov (United States)

    Pruett, Maurisa M.

    2013-01-01

    Principals are traditionally the instructional leaders of a school. However, instructional coaching moves the emphasis from principals to instructional coaches by charging instructional coaches with improving the effectiveness of teachers who are critical to ensuring the successful education of a student. This research analyzed the leadership…

  8. Key Instructional Design Elements for Distance Education.

    Science.gov (United States)

    Zheng, Lihua; Smaldino, Sharon

    2003-01-01

    Suggests that distance education instructors need to understand and apply important instructional design elements in order to successfully fulfill their role as instructional designers. Reviews the most recent literature pertaining to designing instruction in distance education. Identifies some key instructional design elements for teaching at a…

  9. Instructional video for teaching venepuncture.

    Science.gov (United States)

    Pan, Michael; Harcharik, Sara; Moskalenko, Marina; Luber, Adam; Bernardo, Sebastian; Levitt, Jacob

    2014-10-01

    Safe venepuncture technique is a critical skill for health care professionals, to avoid accidental occupational injury. This study investigates whether watching an instructional video improves medical students' ability to perform venepuncture safely. This was a randomised, controlled, assessor-blinded trial that evaluated the utility of an instructional video, with the primary outcome of the ability to perform venepuncture safely. Forty-two second-year medical students were recruited and randomised to receive either video instruction (group A, n = 20) or no intervention (group B, n = 22). Prior to the study, all students attended an instructor-led workshop on venepuncture. During the study, students were paired and instructed to perform venepuncture on a partner. Performance was assessed using a points-based checklist. Pre- and post-study surveys were conducted to assess confidence with technique. The mean total checklist score was higher in group A than in group B, with values of 14.15 and 9.18, respectively (p instructional video performed venepuncture more effectively and reported greater confidence with the technique. Medical students can benefit from having access to an instructional video on venepuncture as an adjunct to the standard curriculum. Safe venepuncture technique is a critical skill for health care professionals. © 2014 John Wiley & Sons Ltd.

  10. The eye movement desensitization and reprocessing procedure prevents defensive processing in health persuasion.

    Science.gov (United States)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a university sample (n = 124) listened to the persuasive message in a randomized laboratory experiment. In the EMDR condition, they were also instructed to follow with their eyes a dot on the computer screen. The dot constantly moved from one side of the screen to the other in 2 seconds. In addition, a self-affirmation procedure was applied in half of the participants. EMDR led to a significant increase in persuasion, only in recipients in whom the persuasive message could be expected to activate defensive self-regulation (in participants with a moderate health value and in participants with low self-esteem). In those with a moderate health value, EMDR increased persuasion, but only when recipients were not affirmed. In addition, EMDR increased persuasion only in recipients with low self-esteem, not in those with high self-esteem. These results showed that EMDR influenced persuasion and in some way lowered defensive reactions. The similarities and differences in effects of EMDR and self-affirmation further increased our insight into the psychology of defensiveness.

  11. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  12. Strategies for Dealing with the Defense Budget

    Science.gov (United States)

    1983-08-17

    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  13. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  14. Computer-Based Instruction in Military Environments: Defense Research Series. Volume 1

    Science.gov (United States)

    1987-01-01

    the four best 2) in the class are Mark, Alicia, Wands, and Julio . (1) (2) coach [dl athlete [b) coaches (el athletes coach’s athlete’s Ccl 133...Dorner, D. et al. (1983). "Lohhausen: Vom Umgang mit Unbestimmtheit und Komplexitat." Bern : Verlag Hans Huber. Ford, E. & Tisak, M. (1983). A further

  15. 77 FR 39140 - Defense Federal Acquisition Regulation Supplement: Shipping Instructions (DFARS Case 2011-D052)

    Science.gov (United States)

    2012-06-29

    ... substantive changes being made by this rule. The rule makes only two minor changes in terminology in the DD... (44 U.S.C. chapter 35). The impact, however, is negligible, because only minor changes in terminology.../agency systems (e.g., Navy's Global Freight Management- Electronic Transportation Acquisition...

  16. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  17. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  18. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  19. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  20. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force

    Science.gov (United States)

    2007-06-01

    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  1. 48 CFR 215.403-5 - Instructions for submission of cost or pricing data or information other than cost or pricing data.

    Science.gov (United States)

    2010-10-01

    ... submission of cost or pricing data or information other than cost or pricing data. 215.403-5 Section 215.403... DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 215.403-5 Instructions for submission of cost or pricing data or information other than cost or pricing data. When...

  2. Defense Downsizing and Blacks in the Military

    Science.gov (United States)

    1993-06-01

    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  3. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  4. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  5. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  6. Carp erythrodermatitis: host defense-pathogen interaction.

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  7. The Future of Theater Missile Defense

    Science.gov (United States)

    1994-06-01

    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  8. Department of Defense Recovering Warrior Task Force

    Science.gov (United States)

    2014-09-02

    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from http://www.armytimes.com/article...Coordination briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from http://www.defense.gov/news/newsarticle.aspx?id=121796.  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  9. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses.

    Science.gov (United States)

    Boyd, Robert S

    2012-10-01

    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  10. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  11. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  12. Parents Guide to "Prekindergarten" Instruction

    Science.gov (United States)

    Department of Defense Education Activity, 2012

    2012-01-01

    The Department of Defense Education Activity (DoDEA) is committed to providing the highest quality of education to its students. One way to provide a quality education is with an effective curriculum that reflects high standards and expectations. Thus, DoDEA has developed rigorous content standards aligned with national guidelines and standards.…

  13. Parents Guide to "Kindergarten" Instruction

    Science.gov (United States)

    Department of Defense Education Activity, 2012

    2012-01-01

    The Department of Defense Education Activity (DoDEA) is committed to providing the highest quality of education to its students. One way to provide a quality education is with an effective curriculum that reflects high standards and expectations. Thus, DoDEA has developed rigorous content standards aligned with national guidelines and standards.…

  14. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  15. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  16. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  17. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  18. Discussion on Form Focused Instruction

    Institute of Scientific and Technical Information of China (English)

    冯滢

    2007-01-01

    The pedagogy of language teaching has moved from one extreme-Grammar Translation Method to the other-Communicative Language Teaching.Today Form Focused Instruction(FFI) has emerged,intending to bring language forms instruction back to the communicative language classroom.Despite of the approval of this new approach,there is a hot dispute on its two types of application:Focus on Form or Focus on FormS.This article briefly analyzes FFI in recent research studies with focus on the choice between the two types ...

  19. Best practices in writing instruction

    CERN Document Server

    Fitzgerald, Jill; MacArthur, Charles A

    2014-01-01

    An indispensable teacher resource and course text, this book presents evidence-based practices for helping all K-12 students develop their skills as writers. Every chapter draws clear connections to the Common Core State Standards (CCSS). Leading authorities describe how to teach the skills and strategies that students need to plan, draft, evaluate, and revise multiple types of texts. Also addressed are ways for teachers to integrate technology into the writing program, use assessment to inform instruction, teach writing in the content areas, and tailor instruction for English language learner

  20. Individualized additional instruction for calculus

    Science.gov (United States)

    Takata, Ken

    2010-10-01

    College students enrolling in the calculus sequence have a wide variance in their preparation and abilities, yet they are usually taught from the same lecture. We describe another pedagogical model of Individualized Additional Instruction (IAI) that assesses each student frequently and prescribes further instruction and homework based on the student's performance. Our study compares two calculus classes, one taught with mandatory remedial IAI and the other without. The class with mandatory remedial IAI did significantly better on comprehensive multiple-choice exams, participated more frequently in classroom discussion and showed greater interest in theorem-proving and other advanced topics.

  1. Techno-Instruction or Primitivism: Blended Instruction in Algebra I

    Science.gov (United States)

    McNeely, Silvia Ann

    2014-01-01

    Integrated technology within a learning environment has become a common instructional expectation in public schools. Many school officials are embracing constructivist views that students learn best within a blended learning environment that promotes active learning by anchoring skills and concepts affiliated to real-world activities. This…

  2. Aligning Business Needs and Instructional Assets (Recycling Instructional Assets)

    Science.gov (United States)

    Gendelman, Joel

    2009-01-01

    High-performing organizations and performance improvement professionals frequently speak about the alignment of their instructional curricula with the needs of the business. However, they often lack a systematic methodology for performing that alignment. This article presents such a method. The process provides the ability to better support…

  3. Extending Library Instruction: Using Blogger to Collaborate, Connect, and Instruct

    Science.gov (United States)

    Goss, Harold, Jr.

    2010-01-01

    The expectations placed on library instruction programs by the Association of College and Research Libraries are high. Many universities also include information literacy competencies as learning objectives to be assessed at the institutional level. With those standards in mind, it is becoming increasingly difficult to adequately educate students…

  4. Evaluating Instructional Effectiveness with the Instructional Improvement Questionnaire.

    Science.gov (United States)

    Pohlmann, John T.

    The Instructional Improvement Questionnaire (IIQ) is a four-part questionnaire designed to collect evaluative feedback from students on their instructors and courses. The class characteristics section collects data from the student on variables such as grade point average, sex, class level, grade expected, time spent studying for the course, etc.…

  5. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  6. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  7. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  8. Educating Jurors about Forensic Evidence: Using an Expert Witness and Judicial Instructions to Mitigate the Impact of Invalid Forensic Science Testimony.

    Science.gov (United States)

    Eastwood, Joseph; Caldwell, Jiana

    2015-11-01

    Invalid expert witness testimony that overstated the precision and accuracy of forensic science procedures has been highlighted as a common factor in many wrongful conviction cases. This study assessed the ability of an opposing expert witness and judicial instructions to mitigate the impact of invalid forensic science testimony. Participants (N = 155) acted as mock jurors in a sexual assault trial that contained both invalid forensic testimony regarding hair comparison evidence, and countering testimony from either a defense expert witness or judicial instructions. Results showed that the defense expert witness was successful in educating jurors regarding limitations in the initial expert's conclusions, leading to a greater number of not-guilty verdicts. The judicial instructions were shown to have no impact on verdict decisions. These findings suggest that providing opposing expert witnesses may be an effective safeguard against invalid forensic testimony in criminal trials.

  9. Understanding Medical Words Tutorial: Download Instructions

    Science.gov (United States)

    ... https://medlineplus.gov/medwords/medicalwordsdownload.html Understanding Medical Words Tutorial: Download Instructions To use the sharing features ... no Internet connection is available. Download: Understanding Medical Words [16MB zip file] Download instructions : Click on the ...

  10. Types of verbal interaction with instructable robots

    Science.gov (United States)

    Crangle, C.; Suppes, P.; Michalowski, S.

    1987-01-01

    An instructable robot is one that accepts instruction in some natural language such as English and uses that instruction to extend its basic repertoire of actions. Such robots are quite different in conception from autonomously intelligent robots, which provide the impetus for much of the research on inference and planning in artificial intelligence. Examined here are the significant problem areas in the design of robots that learn from vebal instruction. Examples are drawn primarily from our earlier work on instructable robots and recent work on the Robotic Aid for the physically disabled. Natural-language understanding by machines is discussed as well as in the possibilities and limits of verbal instruction. The core problem of verbal instruction, namely, how to achieve specific concrete action in the robot in response to commands that express general intentions, is considered, as are two major challenges to instructability: achieving appropriate real-time behavior in the robot, and extending the robot's language capabilities.

  11. Gagne's Learning Theory Applied to Technical Instruction

    Science.gov (United States)

    Lawson, Tom E.

    1974-01-01

    An overview of Robert M. Gagne's theoretical position of learning and instruction is presented with a discussion of possible applications and usefulness of the theory toward the development of technical instruction. (Author/AG)

  12. Learning Theory, Educational Media and Individualized Instruction

    Science.gov (United States)

    Gagne, Robert M.

    1970-01-01

    An examination of learning theory and its applicability to the design of effective individualized instruction. The article also discusses the need to consider learning objectives when choosing media to perform instructional functions. (AA)

  13. Computer Animation in an Instructional Environment.

    Science.gov (United States)

    Large, Andrew

    1996-01-01

    Reviews the effectiveness of animation in enhancing textual information for instructional purposes and identifies factors that determine effectiveness. Outlines methodological problems in the research and summarizes design criteria for multimedia instructional products. Contains 78 references. (PEN)

  14. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims

    Science.gov (United States)

    2013-01-01

    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  15. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Science.gov (United States)

    2010-10-25

    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  16. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  17. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  18. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  19. Instruction Scheduling Across Control Flow

    Directory of Open Access Journals (Sweden)

    Martin Charles Golumbic

    1993-01-01

    Full Text Available Instruction scheduling algorithms are used in compilers to reduce run-time delays for the compiled code by the reordering or transformation of program statements, usually at the intermediate language or assembly code level. Considerable research has been carried out on scheduling code within the scope of basic blocks, i.e., straight line sections of code, and very effective basic block schedulers are now included in most modern compilers and especially for pipeline processors. In previous work Golumbic and Rainis: IBM J. Res. Dev., Vol. 34, pp.93–97, 1990, we presented code replication techniques for scheduling beyond the scope of basic blocks that provide reasonable improvements of running time of the compiled code, but which still leaves room for further improvement. In this article we present a new method for scheduling beyond basic blocks called SHACOOF. This new technique takes advantage of a conventional, high quality basic block scheduler by first suppressing selected subsequences of instructions and then scheduling the modified sequence of instructions using the basic block scheduler. A candidate subsequence for suppression can be found by identifying a region of a program control flow graph, called an S-region, which has a unique entry and a unique exit and meets predetermined criteria. This enables scheduling of a sequence of instructions beyond basic block boundaries, with only minimal changes to an existing compiler, by identifying beneficial opportunities to cover delays that would otherwise have been beyond its scope.

  20. Psychology of Learning for Instruction.

    Science.gov (United States)

    Driscoll, Marcy P.

    This cognitively-oriented book focuses on learning and instruction. Specific applications and implications of learning theories are discussed and examples are drawn from educational situations and educational problems. Theoretical concepts are illustrated in concrete terms and a wide variety of examples are provided. The text embodies a theme of…

  1. Aesthetic Principles for Instructional Design

    Science.gov (United States)

    Parrish, Patrick E.

    2009-01-01

    This article offers principles that contribute to developing the aesthetics of instructional design. Rather than describing merely the surface qualities of things and events, the concept of aesthetics as applied here pertains to heightened, integral experience. Aesthetic experiences are those that are immersive, infused with meaning, and felt as…

  2. Succession Planning for Library Instruction

    Science.gov (United States)

    Sobel, Karen; Drewry, Josiah

    2015-01-01

    Detailed succession planning helps libraries pass information from one employee to the next. This is crucial in preparing for hiring, turnover, retirements, training of graduate teaching assistants in academic libraries, and other common situations. The authors of this article discuss succession planning for instruction programs in academic…

  3. Safety instruction 51 (IS51)

    CERN Multimedia

    SC Secretariat

    2005-01-01

    Please note that Safety Instruction No. 51 (IS51) entitled 'Operational and Information Procedures in Response to Accidents' is available on the web at the following url: https://edms.cern.ch/document/502036/LAST_RELEASED Paper copies can also be obtained from the SC unit secretariat, e-mail : sc.secretariat@cern.ch SC Secretariat

  4. Health Instruction Packages: Cardiac Anatomy.

    Science.gov (United States)

    Phillips, Gwen; And Others

    Text, illustrations, and exercises are utilized in these five learning modules to instruct nurses, students, and other health care professionals in cardiac anatomy and functions and in fundamental electrocardiographic techniques. The first module, "Cardiac Anatomy and Physiology: A Review" by Gwen Phillips, teaches the learner to draw…

  5. Instruction Sequences for Computer Science

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2012-01-01

    This book demonstrates that the concept of an instruction sequence offers a novel and useful viewpoint on issues relating to diverse subjects in computer science. Selected issues relating to well-known subjects from the theory of computation and the area of computer architecture are rigorously

  6. Classic writings on instructional technology

    NARCIS (Netherlands)

    Ely, D.P.; Ely, Donald P.; Plomp, T.

    1996-01-01

    This paper describes the selection process of 17 articles for inclusion in the book, "Classic Writings on Instructional Technology." The book brings together original "classic" educational technology articles into one volume to document the history of the field through its literature. It is also an

  7. Learning Strategy Instruction Innovation Configuration

    Science.gov (United States)

    Schumaker, Jean B.

    2011-01-01

    One way of helping students with learning disabilities and other struggling students to be independent life-long learners is to teach them how to use learning strategies in efficient ways. Learning strategy instruction can provide students the opportunity to succeed in today's schools and meet rigorous standards, transforming ineffective learners…

  8. The Role of Formal Instruction

    Institute of Scientific and Technical Information of China (English)

    Sun Yu

    2011-01-01

    This paper looks at second language acquisition in a classroom setting. It considers whether formal instruction makes a difference to SLA. This is an important issue, because it address the question of the role played by environmental factors in SLA. It is also an important educational issue, as language pedagogy has traditionally operated on the assumption that grammar can be taught.

  9. Health Instruction Packages: Cardiac Anatomy.

    Science.gov (United States)

    Phillips, Gwen; And Others

    Text, illustrations, and exercises are utilized in these five learning modules to instruct nurses, students, and other health care professionals in cardiac anatomy and functions and in fundamental electrocardiographic techniques. The first module, "Cardiac Anatomy and Physiology: A Review" by Gwen Phillips, teaches the learner to draw…

  10. Dedicated online virtual reference instruction.

    Science.gov (United States)

    Guillot, Ladonna; Stahr, Beth; Plaisance, Louise

    2005-01-01

    To facilitate nursing students' information literacy skills and enhance traditional library user services, academic librarians have developed synchronous (real-time) online virtual reference instruction in nursing research classes. The authors discuss collaborative efforts of nursing and library faculty in planning, implementing, and evaluating a discipline-specific virtual reference pilot program.

  11. Succession Planning for Library Instruction

    Science.gov (United States)

    Sobel, Karen; Drewry, Josiah

    2015-01-01

    Detailed succession planning helps libraries pass information from one employee to the next. This is crucial in preparing for hiring, turnover, retirements, training of graduate teaching assistants in academic libraries, and other common situations. The authors of this article discuss succession planning for instruction programs in academic…

  12. Women Administrators as Instructional Leaders

    Science.gov (United States)

    Horner, Beth A.

    2013-01-01

    Women are under-represented in educational research and are much less likely to hold administrative positions than are men. This study, using the Liberal Feminist Theory and Structural Barrier Theory, proffers possible explanations for this phenomenon. Four women leaders were interviewed to gain insight into their instructional leadership…

  13. Attrition Cost Model Instruction Manual

    Science.gov (United States)

    Yanagiura, Takeshi

    2012-01-01

    This instruction manual explains in detail how to use the Attrition Cost Model program, which estimates the cost of student attrition for a state's higher education system. Programmed with SAS, this model allows users to instantly calculate the cost of attrition and the cumulative attrition rate that is based on the most recent retention and…

  14. The Basics of Blended Instruction

    Science.gov (United States)

    Tucker, Catlin R.

    2013-01-01

    Even though many of teachers do not have technology-rich classrooms, the rapidly evolving education landscape increasingly requires them to incorporate technology to customize student learning. Blended learning, with its mix of technology and traditional face-to-face instruction, is a great approach. Blended learning combines classroom learning…

  15. Market Segmentation: An Instructional Module.

    Science.gov (United States)

    Wright, Peter H.

    A concept-based introduction to market segmentation is provided in this instructional module for undergraduate and graduate transportation-related courses. The material can be used in many disciplines including engineering, business, marketing, and technology. The concept of market segmentation is primarily a transportation planning technique by…

  16. Assistant for instructional development (AID)

    NARCIS (Netherlands)

    Meer, J.P. van; Veldhuis, G.J.; Emmerik, M.L. van; Theunissen, N.C.M.

    2007-01-01

    Introduction: Due to periodical job rotation within the military, instructional developers are not always experts in their field and are consequently unaware of the types of educational concepts that are available to teach with (Jans & Frazer-Jans, 2004). These observations have led to the construct

  17. Instructional Computing: Ten Case Studies.

    Science.gov (United States)

    Hargan, Carol; Hunter, Beverly

    These case studies are written for educational institutions that wish to plan, extend, or improve their use of computers for learning and teaching. Each case study includes a brief description of each of the following: profile of the institution, history of the development of instructional computing, organization and management, student access to…

  18. Cement Mason's Curriculum. Instructional Units.

    Science.gov (United States)

    Hendirx, Laborn J.; Patton, Bob

    To assist cement mason instructors in providing comprehensive instruction to their students, this curriculum guide treats both the skills and information necessary for cement masons in commercial and industrial construction. Ten sections are included, as follow: related information, covering orientation, safety, the history of cement, and applying…

  19. Women Administrators as Instructional Leaders

    Science.gov (United States)

    Horner, Beth A.

    2013-01-01

    Women are under-represented in educational research and are much less likely to hold administrative positions than are men. This study, using the Liberal Feminist Theory and Structural Barrier Theory, proffers possible explanations for this phenomenon. Four women leaders were interviewed to gain insight into their instructional leadership…

  20. Equal Opportunity Through Instructional Design.

    Science.gov (United States)

    Arrighi, Margarite A.

    1985-01-01

    The assumption is that sex-integrated classes are inherently equal by the very fact that boys and girls are in the same class. In fact, educational inequity has increased primarily because of instructional design which perpetuates differences among individuals. Good teaching must accommodate individual differences. (MT)

  1. Instructive selection and immunological theory.

    Science.gov (United States)

    Lederberg, Joshua

    2002-07-01

    The turning point of modern immunological theory was the advent of the clonal selection theory (Burnet, Talmage - 1957). A useful heuristic in the classification of theoretical models was the contrast of 'instructive' with 'selective' models of the acquisition of information by biological systems. The neo-Darwinian synthesis of the 1940s had consolidated biologists' model of evolution based on prior random variation and natural selection, viz. differential fecundity. While evolution in the large was by then pretty well settled, controversy remained about examples of cellular adaptation to chemical challenges, like induced drug-resistance, enzyme formation and the antibody response. While instructive theories have been on the decline, some clear cut examples can be found of molecular imprinting in the abiotic world, leading, e.g. to the production of specific sorbents. Template-driven assembly, as in DNA synthesis, has remained a paradigm of instructive specification. Nevertheless, the classification may break down with more microscopic scrutiny of the processes of molecular fit of substrates with enzymes, of monomers to an elongating polymer chain, as the reactants often traverse a state space from with activated components are appropriately selected. The same process may be 'instructive' from a holistic, 'selective' from an atomic perspective.

  2. Three Logics of Instructional Leadership

    Science.gov (United States)

    Rigby, Jessica G.

    2014-01-01

    Purpose: This study examines conceptions of instructional leadership in the institutional environment. We know that principals' practices affect student learning and that principals are influenced by ideas in the broader environment. This article examines and defines the multiple conceptions of what it means for principals to be instructional…

  3. Instructional Coaching and Emotional Intelligence

    Science.gov (United States)

    Avant, Rue Celia

    2012-01-01

    School site-based instructional coaching is a form of job-embedded professional development for teachers and an element of school reform. Coaches are hired based upon their pedagogical knowledge, content expertise, prior teaching experience, and "people skills." They are adept at handling a variety of social interactions at school sites,…

  4. Embedded Instructional Coaching: What Works

    Science.gov (United States)

    Habegger, Shelly; Hodanbosi, Philip

    2011-01-01

    How are administrators leveraging the expertise and passion in their buildings? How do they inspire enthusiasm in their teachers and improve student achievement? How do they act as an agent for change? Those are the tasks the authors are given as instructional coaches. In the beginning, they were unsure how to tackle those tasks--or even if it was…

  5. Coaching Conversations: Enacting Instructional Scaffolding

    Science.gov (United States)

    Gibson, Sharan A.

    2011-01-01

    This study analyzed coaching conversations and interviews of four coach/teacher partnerships for specific ways in which kindergarten and first-grade teachers, and coaches, conceptualized instructional scaffolding for guided reading. Interview transcripts were coded for coaches' and teachers' specific hypotheses/ ideas regarding instructional…

  6. Alternative Approaches to Classroom Instruction.

    Science.gov (United States)

    Nunan, David

    1992-01-01

    Reexamines the notion of "teaching." Drawing on data from a range of classrooms, as well as from recently published teaching texts, particular attention is focused on the question: "What do we mean by teaching/instruction?" (eight references) (Author/JL)

  7. Alternative Approaches to Classroom Instruction.

    Science.gov (United States)

    Nunan, David

    1992-01-01

    Reexamines the notion of "teaching." Drawing on data from a range of classrooms, as well as from recently published teaching texts, particular attention is focused on the question: "What do we mean by teaching/instruction?" (eight references) (Author/JL)

  8. Instructional Leadership for Quality Learning

    Directory of Open Access Journals (Sweden)

    Dan Dumitrascu

    2008-12-01

    Full Text Available According to this study, through leadership training, school principals learn about highqualityinstruction and about actions that they can take to motivate and support their teachers. Principalsthen organize professional learning for their teachers and otherwise help teachers improve their classroompractices. With improved instruction, the theory maintains, student achievement will also improve.Thestudy objective of learning for district and school administrators is guided by a theory of action that isdepicted in Figure 1. As the figure suggests, principals play a key role in the instructional improvementprocess by setting in motion a sequence of school-level behavior changes that make for improved teachingand learning. We want to definitive the method that can be used to improve learning and we named thisprogram - Principles of Learning - this Principles are about concrete actions that professor can take to motivateand support their teachers. Principals are expected to organize professional learning for their teachersas well as to monitor teachers’' classroom practices and help them incorporate new behaviors that are inaccordance with the Principles of Learning into their instructional repertory. With improved instruction,the theory holds, student achievement will improve.

  9. Archery: Success through Classroom Instruction.

    Science.gov (United States)

    Hensley, Ralph W.

    1982-01-01

    For maximum early success in mastering the sport of archery, the first few days of instruction should be taken in the classroom. Two positions, the grip and the anchor, which can be taught and rehearsed in the classroom, are described. (JN)

  10. Instruction: A Basis beyond Performance?

    Science.gov (United States)

    Gagne, Robert M.

    1979-01-01

    Reviews and discusses the potential accomplishments and limitations of a performance-based method of deriving instructional content, taking into account five broad classes of learning outcomes--intellectual skills, information, cognitive strategies, attitudes, and motor skills--which are viewed as what is learned in any or all of the subjects of a…

  11. Instructional Technology: The Research Field.

    Science.gov (United States)

    Gagne, Robert M.

    1986-01-01

    Reflects upon opportunities for research in instructional technology provided by present state of media hardware technology and educational requirements. Prospects for research in incidental learning, including learning from television, are discussed, as well as traditional learning research on intentional learning, including possibilities for…

  12. Classic writings on instructional technology

    NARCIS (Netherlands)

    Ely, Donald P.; Plomp, Tjeerd

    1996-01-01

    This paper describes the selection process of 17 articles for inclusion in the book, "Classic Writings on Instructional Technology." The book brings together original "classic" educational technology articles into one volume to document the history of the field through its literature. It is also an

  13. Putting Pow into Art Instruction

    Science.gov (United States)

    Berkowitz, Jay; Packer, Todd

    2004-01-01

    How would you like to put some "Pow!" into your art instruction? A lesson in comic books--history, design, story, and production--can make your classes come alive. The authors present a new approach to using comics to build artistic skills and involve students in art appreciation. Why Comics? Many art teachers have students who say, "I hate art!"…

  14. Interior Design: Teacher's Instructional Guide.

    Science.gov (United States)

    Hays, Tricia

    This teacher's instructional guide, which is part of a family and consumer sciences education series focusing on a broad range of employment opportunities, is intended to assist teachers responsible for teaching one- and two-year interior design programs for Texas high school students. The following are among the items included: (1) introductory…

  15. Emerging Issues in Handwriting Instruction.

    Science.gov (United States)

    Spillman, Carolyn V.; And Others

    Noting the general lack of research on handwriting instruction, a study examined hand and eye dominance, hand positions, and handwriting production of children. Subjects were 310 children from grades one through five in classrooms of regular children, mainstreamed team teaching classrooms, and self-contained gifted classes in a large elementary…

  16. New Approaches to String Instruction.

    Science.gov (United States)

    Teaching Music, 1994

    1994-01-01

    Maintains that use of the Suzuki, Orff, and Dalcroze methods have assisted string teachers in helping music students achieve mastery from the beginning of instruction. Describes how these methods are used by five music teachers. Includes addresses of organizations that provide information about these music teaching methods. CFR)

  17. Interior Design: Teacher's Instructional Guide.

    Science.gov (United States)

    Hays, Tricia

    This teacher's instructional guide, which is part of a family and consumer sciences education series focusing on a broad range of employment opportunities, is intended to assist teachers responsible for teaching one- and two-year interior design programs for Texas high school students. The following are among the items included: (1) introductory…

  18. Health Instruction Packages: Dental Personnel.

    Science.gov (United States)

    Hayes, Gary E.; And Others

    Text, illustrations, and exercises are utilized in this set of four learning modules designed to instruct non-professional dental personnel in selected job-related skills. The first module, by Gary E. Hayes, describes how to locate the hinge axis point of the jaw, place and secure a bitefork, and perform a facebow transfer. The second module,…

  19. Gestalt Theory and Instructional Design.

    Science.gov (United States)

    Moore, Patrick; Fitz, Chad

    1993-01-01

    Offers a brief overview of Gestalt theory. Shows how six Gestalt principles (proximity, closure, symmetry, figure-ground segregation, good continuation, and similarity) can be applied to improve a reader's comprehension of a badly designed instruction module that uses several graphics. (SR)

  20. Criterion Reading Instructional Project (CRIP).

    Science.gov (United States)

    Linden Board of Education, NJ.

    This booklet describes the Linden Title I Program between the years 1971-1974, with a focus on the Criterion Reading Instructional Project (CRIP). The program (in Linden, New Jersey) evolved from a supplemental reading and mathematics program to a structured developmental program of language arts designed to meet the needs of primary grade…

  1. Instruction of Competent Psychomotor Skill

    Science.gov (United States)

    Olson, Valerie Dong

    2008-01-01

    Instruction of competent psychomotor skill necessitates an eclectic approach. The principles of learning, complemented with learning styles and sensory modalities preferences, provide a background for teaching physical skills. The use of the psychomotor domain of Bloom's Taxonomy as a map and corresponding behavioral objectives foster the mastery…

  2. Effective instruction for English learners.

    Science.gov (United States)

    Calderón, Margarita; Slavin, Robert; Sánchez, Marta

    2011-01-01

    The fastest-growing student population in U.S. schools today is children of immigrants, half of whom do not speak English fluently and are thus labeled English learners. Although the federal government requires school districts to provide services to English learners, it offers states no policies to follow in identifying, assessing, placing, or instructing them. Margarita Calderón, Robert Slavin, and Marta Sánchez identify the elements of effective instruction and review a variety of successful program models. During 2007-08, more than 5.3 million English learners made up 10.6 percent of the nation's K-12 public school enrollment. Wide and persistent achievement disparities between these English learners and English-proficient students show clearly, say the authors, that schools must address the language, literacy, and academic needs of English learners more effectively. Researchers have fiercely debated the merits of bilingual and English-only reading instruction. In elementary schools, English learners commonly receive thirty minutes of English as a Second Language (ESL) instruction but attend general education classes for the rest of the day, usually with teachers who are unprepared to teach them. Though English learners have strikingly diverse levels of skills, in high school they are typically lumped together, with one teacher to address their widely varying needs. These in-school factors contribute to the achievement disparities. Based on the studies presented here, Calderón, Slavin, and Sánchez assert that the quality of instruction is what matters most in educating English learners. They highlight comprehensive reform models, as well as individual components of these models: school structures and leadership; language and literacy instruction; integration of language, literacy, and content instruction in secondary schools; cooperative learning; professional development; parent and family support teams; tutoring; and monitoring implementation and outcomes

  3. Demonstrating Empathy: A Phenomenological Study of Instructional Designers Making Instructional Strategy Decisions for Adult Learners

    Science.gov (United States)

    Vann, Linda S.

    2017-01-01

    Instructional designers are tasked with making instructional strategy decisions to facilitate achievement of learning outcomes as part of their professional responsibilities. While the instructional design process includes learner analysis, that analysis alone does not embody opportunities to assist instructional designers with demonstrations of…

  4. A Comparison of Traditional Classroom Instruction and Anchored Instruction with University General Education Students.

    Science.gov (United States)

    Langone, John; Malone, D. Michael; Stecker, Pamela M.; Greene, Eric

    1998-01-01

    Effects of a traditional instructional format and technology-enhanced anchored instruction on the immediate and long-term acquisition of knowledge was evaluated with 100 university students in a special-education course. The CD-ROM-based anchored-instruction group outperformed the traditional instruction group on the multiple-choice follow-up test…

  5. A History of Instructional Design and Technology: Part I: A History of Instructional Media.

    Science.gov (United States)

    Reiser, Robert A.

    2001-01-01

    Discusses the history of the field of instructional design and technology in the United States. Includes a definition, major features, rational for using instructional design and technology as the label for the field, history of instructional media from 1900 to the present, effects media have had on instructional practices, and the effect…

  6. The Roles of Teacher Efficacy in Instructional Innovation: Its Predictive Relations to Constructivist and Didactic Instruction

    Science.gov (United States)

    Nie, Youyan; Tan, Gim Hoon; Liau, Albert Kienfie; Lau, Shun; Chua, Bee Leng

    2013-01-01

    Constructivist instruction has been implemented in the current instructional innovation in Singapore. Large scale survey study was conducted to examine the roles of teacher efficacy in implementing the innovative constructivist instruction. The results showed that the positive correlation between teacher efficacy and constructivist instruction was…

  7. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  8. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  9. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  10. Review--Processing Instruction and Discourse

    Institute of Scientific and Technical Information of China (English)

    Liu Chang

    2014-01-01

    This book, written by the research experts in the field of processing instruction Alessandro G.Benati and James F.Lee, informs readers of the newest development in processing instruction research and suggests the directions for the future research on processing instruction at the discourse level.

  11. Review——Processing Instruction and Discourse

    Institute of Scientific and Technical Information of China (English)

    Liu; Chang

    2014-01-01

    This book,written by the research experts in the field of processing instruction Alessandro G.Benati and James F.Lee,informs readers of the newest development in processing instruction research and suggests the directions for the future research on processing instruction at the discourse level.

  12. Students and Instructors Opinions about Piano Instruction

    Science.gov (United States)

    Kilic, Deniz Beste Çevik

    2016-01-01

    This study examined the opinions of the students and piano instructors in the Turkish Education Faculties' Fine Arts Instruction Departments' music instruction programs about piano instruction. The study data were collected using a questionnaire administered to the piano instructors and the students who took lessons from them. The study results…

  13. Looking Mother Tongue Instruction through Different Perspectives

    Science.gov (United States)

    Regmi, Kapil Dev

    2008-01-01

    Mother Tongue Instruction has been a debatable issue since long. There may be two options in the medium of instruction: either to teach especially primary and preprimary schoolchildren in their own mother tongue or continue using second or foreign language as the medium of instruction. Both of the approaches bear some pros and cons. This article…

  14. 16 CFR 1204.5 - Manufacturer's instructions.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Manufacturer's instructions. 1204.5 Section... Manufacturer's instructions. (a) For all antennas covered under this part 1204, the following statement shall be included in the manufacturer's instructions, in addition to the material required by 16 CFR...

  15. Distributed Instructional Leadership in High Schools

    Science.gov (United States)

    Halverson, Richard; Clifford, Matthew

    2013-01-01

    This article explores the idea of distributed instructional leadership as a way to understand instructional leadership practice in comprehensive high schools. Our argument is that distributed leadership analyses allow researchers to uncover and explain how instructional improvement in high schools occurs through the efforts of multiple individuals…

  16. Direct Reading Instruction and the NYS ELA

    Science.gov (United States)

    Jones-Carey, Margaret H.

    2013-01-01

    This study analyzed the impact of classroom based reading instruction ("direct instruction") on the standardized test scores of 6th grade students as measured by the New York State English Language Arts assessment (NYS ELA). It was hypothesized that the implementation of direct instruction in reading in grade 6 would improve NYS ELA…

  17. Building Conceptual Understanding through Vocabulary Instruction

    Science.gov (United States)

    Rupley, William H.; Nichols, William Dee; Mraz, Maryann; Blair, Timothy R.

    2012-01-01

    Instructional design is an integral part of a balanced approach to teaching vocabulary instruction. This article presents several instructional procedures using research-based vocabulary strategies and explains how to design and adapt those strategies in order to reach desired learning outcomes. Emphasis is placed on research-based principles that…

  18. Audi-Tutorial Instruction in Basic Business

    Science.gov (United States)

    Brown, Richard D.

    1974-01-01

    Results of a study in which audio-tutorial instruction was compared to illustrated lecture instruction are reported. No great differences in achievement levels in the two strategies of instruction were found. The development of such an alternative teaching strategy forces better teacher organization, leading to improvement of the illustrated…

  19. New Electronic Technologies for Facilitating Differentiated Instruction

    Science.gov (United States)

    Scalise, Kathleen

    2009-01-01

    With electronic technologies, differentiated instruction has the same meaning as in traditional instruction, but different tools are available for teachers to help students learn. Electronic technologies for differentiated instruction can add powerful new types of media inclusion, levels of interactivity, and response actions. This rapidly…

  20. 33 CFR 157.49 - Instruction manual.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Instruction manual. 157.49... Vessel Operation § 157.49 Instruction manual. The master of a tank vessel shall ensure that the instruction manual under § 157.23 is available and used when the cargo or ballast systems are operated....

  1. Audi-Tutorial Instruction in Basic Business

    Science.gov (United States)

    Brown, Richard D.

    1974-01-01

    Results of a study in which audio-tutorial instruction was compared to illustrated lecture instruction are reported. No great differences in achievement levels in the two strategies of instruction were found. The development of such an alternative teaching strategy forces better teacher organization, leading to improvement of the illustrated…

  2. On the Practice Architectures of Instructional Leadership

    Science.gov (United States)

    Salo, Petri; Nylund, Jan; Stjernstrøm, Else

    2015-01-01

    This paper explores the concept of instructional leadership and principals' perceptions of the practices of instructional leadership. Despite the emphasis on the effects of school leadership regarding teaching practices and learning outcomes, research on direct instructional leadership is scarce. It is focused either on identifying overall…

  3. A Reflexive Model for Teaching Instructional Design.

    Science.gov (United States)

    Shambaugh, Neal; Magliaro, Susan

    2001-01-01

    Documents a five-year study of two instructors who collaborated on formally studying their teaching of a master's level instructional design course. Outlines their views on learning, teaching, and instructional design (ID), describes the ID course, and explains the reflexive instructional model used, in which the teachers examined their teaching…

  4. Effective Instruction: A Mathematics Coach's Perspective

    Science.gov (United States)

    Nebesniak, Amy L.

    2012-01-01

    Effective instruction is multifaceted, dependent largely on the context and, consequently, on numerous variables. Although "effective instruction" is difficult to define, in the author's experience--and as the work of mathematics education specialists and researchers indicates--three key features of quality instruction stand out: (1) Teaching…

  5. El espanol: La lengua de Puerto Rico. Aprecio y defensa de nuestra lengua materna en la ciudad de Nueva York (Spanish: Language of Puerto Rico. Appreciation and Defense of our Mother Tongue in New York City).

    Science.gov (United States)

    Ramirez de Arellano, Diana

    The author presents her appreciation and defense of Spanish as it is spoken in New York City, especially among Puerto Ricans. She believes that the institution of bilingual education in the city's schools is an important first step in elevating Spanish to the position it deserves as a means of instruction and communication. The instructional…

  6. Direct Vocabulary Instruction in Preschool: A Comparison of Extended Instruction, Embedded Instruction, and Incidental Exposure

    Science.gov (United States)

    Loftus-Rattan, Susan M.; Mitchell, Alison M.; Coyne, Michael D.

    2016-01-01

    Based on its coincidence with a significant period in language development for children, preschool provides a favorable setting to foster vocabulary growth. The purpose of this study was to evaluate the effectiveness of two instructional conditions and an incidental exposure condition for teaching targeted vocabulary words to preschool students…

  7. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  8. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  9. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  10. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  11. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  12. Evaluation of a Theory of Instructional Sequences for Physics Instruction

    Science.gov (United States)

    Wackermann, Rainer; Trendel, Georg; Fischer, Hans E.

    2010-05-01

    The background of the study is the theory of basis models of teaching and learning, a comprehensive set of models of learning processes which includes, for example, learning through experience and problem-solving. The combined use of different models of learning processes has not been fully investigated and it is frequently not clear under what circumstances a particular model should be used by teachers. In contrast, the theory under investigation here gives guidelines for choosing a particular model and provides instructional sequences for each model. The aim is to investigate the implementation of the theory applied to physics instruction and to show if possible effects for the students may be attributed to the use of the theory. Therefore, a theory-oriented education programme for 18 physics teachers was developed and implemented in the 2005/06 school year. The main features of the intervention consisted of coaching physics lessons and video analysis according to the theory. The study follows a pre-treatment-post design with non-equivalent control group. Findings of repeated-measures ANOVAs show large effects for teachers' subjective beliefs, large effects for classroom actions, and small to medium effects for student outcomes such as perceived instructional quality and student emotions. The teachers/classes that applied the theory especially well according to video analysis showed the larger effects. The results showed that differentiating between different models of learning processes improves physics instruction. Effects can be followed through to student outcomes. The education programme effect was clearer for classroom actions and students' outcomes than for teachers' beliefs.

  13. Directed Energy Missions for Planetary Defense

    OpenAIRE

    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  14. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    Science.gov (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  15. Basic Operational Robotics Instructional System

    Science.gov (United States)

    Todd, Brian Keith; Fischer, James; Falgout, Jane; Schweers, John

    2013-01-01

    The Basic Operational Robotics Instructional System (BORIS) is a six-degree-of-freedom rotational robotic manipulator system simulation used for training of fundamental robotics concepts, with in-line shoulder, offset elbow, and offset wrist. BORIS is used to provide generic robotics training to aerospace professionals including flight crews, flight controllers, and robotics instructors. It uses forward kinematic and inverse kinematic algorithms to simulate joint and end-effector motion, combined with a multibody dynamics model, moving-object contact model, and X-Windows based graphical user interfaces, coordinated in the Trick Simulation modeling environment. The motivation for development of BORIS was the need for a generic system for basic robotics training. Before BORIS, introductory robotics training was done with either the SRMS (Shuttle Remote Manipulator System) or SSRMS (Space Station Remote Manipulator System) simulations. The unique construction of each of these systems required some specialized training that distracted students from the ideas and goals of the basic robotics instruction.

  16. Remote instruction in groundwater hydrology

    Science.gov (United States)

    staff of the Interactive Remote Instructional System

    Wright State University (Dayton, Ohio) is preparing for its fourth cycle of the Interactive Remote Instructional System (IRIS) in groundwater hydrology beginning July 15, 1986. The Department of Geological Sciences proudly announces that the first two cycles recorded an impressive 83% completion ratio for registered participants. This completion rate is a significant departure from success rates traditionally recorded by courses of this nature; it is the result of 2 years of implementation and refinement and demonstrates the progressive orientation of the program. The third cycle has been underway since January. This comprehensive hydrogeology program was originally developed for the U.S. Department of Agriculture Soil Conservation Service to prepare their personnel for professional practice work. As a result of that cooperative effort, the IRIS program has evolved to meet the needs of participants by developing a curriculum that reflects current trends in the groundwater industry and has provided a unique educational approach that ensures maximum interaction between the instructional staff and participants.

  17. Automated illustration of patients instructions.

    Science.gov (United States)

    Bui, Duy; Nakamura, Carlos; Bray, Bruce E; Zeng-Treitler, Qing

    2012-01-01

    A picture can be a powerful communication tool. However, creating pictures to illustrate patient instructions can be a costly and time-consuming task. Building on our prior research in this area, we developed a computer application that automatically converts text to pictures using natural language processing and computer graphics techniques. After iterative testing, the automated illustration system was evaluated using 49 previously unseen cardiology discharge instructions. The completeness of the system-generated illustrations was assessed by three raters using a three-level scale. The average inter-rater agreement for text correctly represented in the pictograph was about 66 percent. Since illustration in this context is intended to enhance rather than replace text, these results support the feasibility of conducting automated illustration.

  18. Inclusive Design in Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Gabriel ZAMFIR

    2008-01-01

    Full Text Available Much instruction starts with abstract representations for which learners have insufficient foundation [1]. The British Standard, BS 7000-6:2005 Guide to Managing Inclusive Design, provides a comprehensive framework that can help all private enterprises, public sector and not-for-profit organizations, build a consistent approach to inclusive design into organizational culture as well as processes [2]. While courses, technology, and student services are typically designed for the narrow range of characteristics of the average student, the practice of universal design in education (UDE considers people with a broad range of characteristics in the design of all educational products and environments [3]. This paper has been designed to provide an overview about the curriculum paradigm consisting in the fusion of the technology and the classroom instruction in economic higher education.

  19. SAFETY INSTRUCTION AND SAFETY NOTE

    CERN Multimedia

    TIS Secretariat

    2002-01-01

    Please note that the SAFETY INSTRUCTION N0 49 (IS 49) and the SAFETY NOTE N0 28 (NS 28) entitled respectively 'AVOIDING CHEMICAL POLLUTION OF WATER' and 'CERN EXHIBITIONS - FIRE PRECAUTIONS' are available on the web at the following urls: http://edms.cern.ch/document/335814 and http://edms.cern.ch/document/335861 Paper copies can also be obtained from the TIS Divisional Secretariat, email: TIS.Secretariat@cern.ch

  20. Optimal Structures for Multimedia Instruction.

    Science.gov (United States)

    1985-07-01

    Pinker , Steven , Simcox, William, and Parker,Leon. Understanding Charts and Graphs: A Project in Applied Cognitive Science. Technical Report, Office of...Prancisco, CA 96503 Dr. Steven Pinker Dr. Judith Orasanu Department of Psychology Army Research Institute E1O-018 5001 Eisenhower Avenue M.I.T...understanding of the audience. Similarly, in a study of Navy instruction manuals, [ Stevens & * Steinberg 811 provide a typology of explanations which

  1. The Full Costs of Ballistic Missile Defense

    Science.gov (United States)

    2003-01-01

    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  2. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  3. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  4. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  5. Enhancing Air Base Defense Through Joint Doctrine

    Science.gov (United States)

    2009-01-01

    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  6. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  7. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this doctrine...to forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  8. Defense Advanced Research Projects Agency Strategic Plan

    Science.gov (United States)

    2007-02-01

    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  9. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  10. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  11. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  12. Rigorous Cyberspace Defense Expert Training Moves Forward

    Science.gov (United States)

    2012-09-01

    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  13. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  14. Host Defense against Opportunist Microorganisms Following Trauma.

    Science.gov (United States)

    1988-06-30

    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  15. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  16. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  17. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  18. The equal effectiveness of different defensive strategies

    Science.gov (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming

    2015-01-01

    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  19. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata

    2016-01-01

    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  1. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  2. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore

    2016-01-01

    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  3. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  4. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and will...management systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden survivability...technology for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  5. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  6. The US-Japan Alliance: Sharing the Burden of Defense

    Science.gov (United States)

    1983-01-01

    expenditures to GNP. Japan Is also far down the list in defense spending per capita, behind nations such as Sweden, Australia, and Canada. Table 1.2 compares...TABLES Figures 1.1 Trends in Japanese Defense Spending ................. 14 Tables 1.1 Defense Expenditures of Major Countries ............... 12 1.2...Percentage Breakdown of Japanese Defense Expenditures by Category, FY 1977-1981 ............ 40 3.3 Disposition of US Forces in Japan

  7. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that the Defense Intelligence Agency Advisory Board, will meet on March 22 and 23, 2010....

  8. 76 FR 20336 - Defense Audit Advisory Committee (DAAC)

    Science.gov (United States)

    2011-04-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Defense Audit Advisory Committee (DAAC) AGENCY: Under Secretary of Defense... (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as...

  9. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain

    Science.gov (United States)

    2015-10-28

    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  10. Urban Youth, Fear of Crime, and Resulting Defensive Actions.

    Science.gov (United States)

    Williams, J. Sherwood; And Others

    1994-01-01

    Used data from 1,775 urban youth collected in 1986 to examine fear of crime and defensive actions taken by youth. Results revealed that only 11% reported having taken no defensive actions as result of fear of crime. Nearly three-fifths took precaution of having escort at night. Learning self-defense techniques was reported by 19%; 10% indicated…

  11. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  12. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  13. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  14. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  15. Children's Use of Defenses and Self-Esteem Management.

    Science.gov (United States)

    Hay, Deborah

    Children's use of defenses to maintain or enhance self-esteem was investigated. Attention was given to four questions: Do children with different levels of self-esteem differ in (1) the frequency with which they employ defenses? (2) kinds of emotions they defend against? (3) the kinds of social situations which elicit their defensive responses?…

  16. 32 CFR 644.333 - Screening for defense needs.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Screening for defense needs. 644.333 Section 644... Screening for defense needs. Real property which becomes excess to the needs of any element of the Army or... the property is excess to the needs of the using command, without screening for other requirements....

  17. Defense Institution Reform Initiative Program Elements Need to Be Defined

    Science.gov (United States)

    2012-11-09

    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership Strategy...to the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  18. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.

    2003-01-01

    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  19. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    P.G.J. Roosenboom (Peter); T. van der Goot

    2003-01-01

    textabstractThe central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO

  20. Learning procedures from interactive natural language instructions

    Science.gov (United States)

    Huffman, Scott B.; Laird, John E.

    1994-01-01

    Despite its ubiquity in human learning, very little work has been done in artificial intelligence on agents that learn from interactive natural language instructions. In this paper, the problem of learning procedures from interactive, situated instruction is examined in which the student is attempting to perform tasks within the instructional domain, and asks for instruction when it is needed. Presented is Instructo-Soar, a system that behaves and learns in response to interactive natural language instructions. Instructo-Soar learns completely new procedures from sequences of instruction, and also learns how to extend its knowledge of previously known procedures to new situations. These learning tasks require both inductive and analytic learning. Instructo-Soar exhibits a multiple execution learning process in which initial learning has a rote, episodic flavor, and later executions allow the initially learned knowledge to be generalized properly.

  1. Instructions

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    Animal Husbandry and Feed Science(ISSN 1943-9911)is an academic journal sponsored by Wu Chu(USA-China)Science and Culture Media Co.(USA).It was first published in 2009.The journal is published bimonthly to report basic theory and applied research about animal husbandry,veterinary,aquaculture,feed science and other related fields,including aspects of genetics and breeding,reproduction,physiology,biochemistry,nutrition,

  2. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence... a closed meeting of the Defense Intelligence Agency National Intelligence University Board...

  3. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  4. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  5. Scaffolding Instruction on Business English Writing Teaching

    Institute of Scientific and Technical Information of China (English)

    邱迪

    2014-01-01

    The scaffolding instruction is to help students probe into knowledge learning independently, and achieve the construction of knowledge and information finally by constructing a series of appropriate conceptual frameworks and concrete teaching circumstances. This instruction has been extensively applied and has been proved to be very effective in teaching in western countries. But in China very few empirical studies have been carried out on the scaffolding instruction, especial y in the field of teaching Business English writing.

  6. Exploring Instruction Cache Analysis - On Arm

    OpenAIRE

    Svedenborg, Stian Valentin

    2014-01-01

    This thesis explores the challenges of implementing an instruction cache side-channel attack on an ARM platform. The information leakage through the instruction cache is formally discussed using information theoretic metrics. A successful Prime+Probe instruction cache side-channel attack against RSA is presented, recovering 967/1024 secret key bits by observing a single decryption using a synchronous spy process. Furthermore, an unsuccessful attempt is made at decoupling the spy from the vict...

  7. The effects of video modeling with voiceover instruction on accurate implementation of discrete-trial instruction

    National Research Council Canada - National Science Library

    Vladescu, Jason C; Carroll, Regina; Paden, Amber; Kodak, Tiffany M

    2012-01-01

    ...) with voiceover instruction to train staff to implement discrete-trial instruction (DTI). After staff trainees reached the mastery criterion when teaching an adult confederate with VM, they taught a child with a developmental disability using DTI...

  8. Explicit Comprehension Instruction: A Review of Research and a New Conceptualization of Instruction.

    Science.gov (United States)

    Pearson, P. David; Dole, Janice A.

    1987-01-01

    Reviews representative instructional studies of inference training, reciprocal teaching, and process training. Discusses both the concept of explicit comprehension instruction and potential difficulties in classroom implementation. Raises two important curricular concerns. (NH)

  9. Validity of Self-Report Measures of Defense Mechanisms

    Science.gov (United States)

    Mehlman; Slane

    1994-06-01

    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  10. Insect response to plant defensive protease inhibitors.

    Science.gov (United States)

    Zhu-Salzman, Keyan; Zeng, Rensen

    2015-01-07

    Plant protease inhibitors (PIs) are natural plant defense proteins that inhibit proteases of invading insect herbivores. However, their anti-insect efficacy is determined not only by their potency toward a vulnerable insect system but also by the response of the insect to such a challenge. Through the long history of coevolution with their host plants, insects have developed sophisticated mechanisms to circumvent antinutritional effects of dietary challenges. Their response takes the form of changes in gene expression and the protein repertoire in cells lining the alimentary tract, the first line of defense. Research in insect digestive proteases has revealed the crucial roles they play in insect adaptation to plant PIs and has brought about a new appreciation of how phytophagous insects employ this group of molecules in both protein digestion and counterdefense. This review provides researchers in related fields an up-to-date summary of recent advances.

  11. National Defense Budget Estimates for FY 2012

    Science.gov (United States)

    2011-03-01

    Military Construction, Navy Reserve 21,708 26,299 26,299 26,299 Military Construction, Air Force Reserve 25,986 33,620 33,620 33,620 Chemical Demil ...Air Force Reserve 7,634 Chemical Demil Construction, Defense 75,312 13,071,701 Appropriation 13,071,701 Budget Authority 13,071,701 TOA...7.00 3.00 Defense Prod Act 59.00 25.00 16.00 Chemical Demil 53.00 30.00 15.00 2.00 RDT&E Army 34.28 48.72 11.33 3.17 1.70 0.80 Navy 36.87 50.51 9.82

  12. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  13. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  14. Information on Japanese Defensive Installations and Tactics

    Science.gov (United States)

    1945-01-01

    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  15. Research on Nonlinear Dynamics with Defense Applications

    Science.gov (United States)

    2006-04-01

    numerical verifications, we have experimentally realized the scheme by using a Duffing -type of nonlinear electronic oscillator (originally developed by C...circuits In defense applications it may be desirable to induce chaos in nonlinear oscillators operating in a stable regime. Examples of such oscillators ...evolutions of the target Duffing circuit and deliver resonant perturbations to generate robust chaotic attractors. A brief account of the work has been

  16. Defense Trade Data: Sources and Recommendations

    Science.gov (United States)

    2010-11-01

    detailed trade information on such products may be difficult. Recent U.S. concerns have ranged from dependency on rare earths and first level products...BHUTAN BR INDIAN OCEAN TERR EGYPT INDIA IRAN IRAQ ISRAEL JORDAN KOWAIT LEBANON LIBYA MALDIVES MOROCCO NEPAL OMAN PAKISTAN QATAR SAODI...specifically designed or developed for military application and any computer specifically modified for use with any defense article in any category of

  17. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  18. Russian Ballistic Missile Defense: Rhetoric and Reality

    Science.gov (United States)

    2015-06-01

    2012/06/08/russia_installs_new_radars_as_a_ deterrent_15834.html. 130. “Direct Line with Vladimir Putin ,” President of Russia , April 17, 2014...and increases the danger of war. In his 2012 pre-election treatise on defense policy and national security, Rus- sian President Vladimir Putin ...Kontsern PVO Almaz-Antey) was established by President Vladimir Putin in 2002 uniting no fewer than 46 enterprises, including factories, research and

  19. Implications of Germany's declining defense spending

    OpenAIRE

    Merrath, Jurgen

    2000-01-01

    With its reunification on 3 October 1990, Germany regained its full sovereignty and stands now in a position of greater global responsibility. Faced with dramatically increased demands on and expectations for Germany's armed forces, it must answer the question of how much it is willing to invest for safety and stability in Europe and for protection of peace in the world. In determining the level of commitment behind Germany's foreign and security policy, defense spending is an important indic...

  20. The Defense of Henderson Field, Guadalcanal

    Science.gov (United States)

    2011-03-31

    of US airpower an4 know disruption ofsuch power is critical to achieving their goals. Most US airpower operates from airbases, which can be...Vandegrift remained in his defensive positions because he did not know the size, strength, location, or intentions of the Japanese main body.67 Ichiki...Parachute/Raider Battalion. 75 Edson deployed his 830 men South of Henderson Field in a series of mut ~ally supporting strongnolds. He was flanked to

  1. A Content Analysis of Defense Budget Rhetoric

    Science.gov (United States)

    2011-06-01

    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  2. Affordability Constraints in Major Defense Acquisitions

    Science.gov (United States)

    2016-11-01

    price , this is actually an inverse supply curve. In competitive markets, the inverse supply curve is the firm’s marginal cost curve. When firms have a...support features and functions. The vertical axis represents the unit sale price , inclusive of all life-cycle or total ownership costs as appropriate...Three Defense Programs 3 We can easily extend the example to incorporate cost - plus payment schemes

  3. Defense Horizons. Number 78, March 2015

    Science.gov (United States)

    2015-03-01

    databases , National Defense University researchers have identified 124 examples of effective P4s across a wide spectrum of industries and...environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000 examples of public-public and public...Partnering,” SONRI, Inc., 2010. 8 Farming First, “Innovation and Incentives for Farmers Needed to Protect World’s Biodiversity ,” press release, May 21

  4. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  5. Department of Defense Energy Management Plan, 1980

    Science.gov (United States)

    1980-07-01

    Energy Usage in Existing Buildings . .......... .111-29 111-11 Timetable for Developing Utility Efficiency Standards ................. .......... 111-30...in the Defense Energy Emergency Planning System (DEEMS) document (Appendix A). The purpose of the DEEMS is to assure the availabilty of fuels to the...unleaded gasoline usage , y 1985. It is anticipated that sufficient supplies of ’alcohol and non-petroleum derived fuel will be available. DoD’s

  6. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  7. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral...

  8. Effects of Instruction and Stage-Fright on Intelligence Testing

    Science.gov (United States)

    Meijer, Joost; Oostdam, Ron

    2011-01-01

    In the present research, it was tried to unravel the influence of various types of instruction on test anxiety levels and, in turn, its influence on intelligence test performance. Three types of instruction were compared: a stressful, achievement-orientated instruction; a reassuring, task-orientated instruction; and an ambiguous instruction.…

  9. Effects of Instruction and Stage-Fright on Intelligence Testing

    Science.gov (United States)

    Meijer, Joost; Oostdam, Ron

    2011-01-01

    In the present research, it was tried to unravel the influence of various types of instruction on test anxiety levels and, in turn, its influence on intelligence test performance. Three types of instruction were compared: a stressful, achievement-orientated instruction; a reassuring, task-orientated instruction; and an ambiguous instruction.…

  10. Archery: A Planning Guide for Group and Individual Instruction.

    Science.gov (United States)

    American Association for Health, Physical Education, and Recreation, Washington, DC.

    This instructor's manual for group or individual instruction in archery includes line drawings as illustrations. The manual advances from facilities to beginning instruction and general instructional practices (safety tips, instructional aids, archery etiquette) to intermediate instruction (discussions of causes of faulty arrow flight, analysis of…

  11. Computer Assisted Instruction (CAI): A Partner for PI?

    Science.gov (United States)

    Edwards, John S.; Tillman, Murray

    1982-01-01

    Discusses differences between computer-delivered instruction and print-delivered instruction and the importance of the role of the instructional design process when adapting traditional teaching materials to newer media. The use of authoring systems for preparing materials and computer-managed instruction as a support for programed instruction are…

  12. Modified Cognitive Strategy Instruction: An Expository Writing Strategy

    Science.gov (United States)

    Guzel-Ozmen, Ruya

    2009-01-01

    In this article, modified cognitive strategy instruction in writing (CSIW), a cognitive strategy instructional model is described. Modified CSIW was designed based on two effective instructional models: cognitive strategy instruction in writing (CSIW) and self-regulated strategy development (SRSD). Modified CSIW provides tailored instruction to…

  13. Tutorial Instruction in Science Education

    Directory of Open Access Journals (Sweden)

    Rhea Miles

    2015-06-01

    Full Text Available The purpose of the study is to examine the tutorial practices of in-service teachers to address the underachievement in the science education of K-12 students. Method: In-service teachers in Virginia and North Carolina were given a survey questionnaire to examine how they tutored students who were in need of additional instruction. Results: When these teachers were asked, “How do you describe a typical one-on-one science tutorial session?” the majority of their responses were categorized as teacher-directed. Many of the teachers would provide a science tutorial session for a student after school for 16-30 minutes, one to three times a week. Respondents also indicated they would rely on technology, peer tutoring, scientific inquiry, or themselves for one-on-one science instruction. Over half of the in-service teachers that responded to the questionnaire stated that they would never rely on outside assistance, such as a family member or an after school program to provide tutorial services in science. Additionally, very few reported that they incorporated the ethnicity, culture, or the native language of ELL students into their science tutoring sessions.

  14. How Much English Language Arts and Mathematics Instruction Do Students Receive? Investigating Variation in Instructional Time

    Science.gov (United States)

    Phelps, Geoffrey; Corey, Douglas; DeMonte, Jenny; Harrison, Delena; Loewenberg Ball, Deborah

    2012-01-01

    The amount of instruction students receive has long been viewed as a foundational educational resource. This article presents an analysis of the time students spend in elementary English language arts (ELA) and mathematics instruction. In mathematics, the average student received about 140 hr of instruction, but students in the top sixth of…

  15. Addressing the Missing Instructional Data Problem: Using a Teacher Log to Document Tier 1 Instruction

    Science.gov (United States)

    Kurz, Alexander; Elliott, Stephen N.; Roach, Andrew T.

    2015-01-01

    Response-to-intervention (RTI) systems posit that Tier 1 consists of high-quality general classroom instruction using evidence-based methods to address the needs of most students. However, data on the extent to which general education teachers provide such instruction are rarely collected. This missing instructional data problem may result in RTI…

  16. Elementary Students' Retention of Environmental Science Knowledge: Connected Science Instruction versus Direct Instruction

    Science.gov (United States)

    Upadhyay, Bhaskar; DeFranco, Cristina

    2008-01-01

    This study compares 3rd-grade elementary students' gain and retention of science vocabulary over time in two different classes--"connected science instruction" versus "direct instruction." Data analysis yielded that students who received connected science instruction showed less gain in science knowledge in the short term compared to students who…

  17. Instructed Pragmatics at a Glance: Where Instructional Studies Were, Are, and Should Be Going

    Science.gov (United States)

    Taguchi, Naoko

    2015-01-01

    This paper brings together the research and developments of instructed pragmatics over the past three decades by reporting the synthesis findings of instructional intervention studies in interlanguage pragmatics. Two questions have guided this investigation: (1) is instruction effective in learning pragmatics?; and (2) what methods are most…

  18. Learning, Lecture, and Programmed Instruction Text: An Experiment in Bibliographic Instruction.

    Science.gov (United States)

    Suprenant, Thomas T.

    1982-01-01

    Results of a study of college freshmen using a bibliographic instruction model that considers interaction of library tools, styles of instruction, and Robert M. Gagne's Learning Hierarchy indicate a superiority of programed instruction at factual and problem-solving levels, and also a need for further experimentation. Eight references are…

  19. Instructed Pragmatics at a Glance: Where Instructional Studies Were, Are, and Should Be Going

    Science.gov (United States)

    Taguchi, Naoko

    2015-01-01

    This paper brings together the research and developments of instructed pragmatics over the past three decades by reporting the synthesis findings of instructional intervention studies in interlanguage pragmatics. Two questions have guided this investigation: (1) is instruction effective in learning pragmatics?; and (2) what methods are most…

  20. Individualizing Student Instruction Precisely: Effects of Child x Instruction Interactions on First Graders' Literacy Development

    Science.gov (United States)

    Connor, Carol McDonald; Piasta, Shayne B.; Fishman, Barry; Glasney, Stephanie; Schatschneider, Christopher; Crowe, Elizabeth; Underwood, Phyllis; Morrison, Frederick J.

    2009-01-01

    Recent findings demonstrate that the most effective reading instruction may vary with children's language and literacy skills. These Child x Instruction interactions imply that individualizing instruction would be a potent strategy for improving students' literacy. A cluster-randomized control field trial, conducted in 10 high-moderate poverty…

  1. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  2. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  3. Inducible defenses in prey intensify predator cannibalism.

    Science.gov (United States)

    Kishida, Osamu; Trussell, Geoffrey C; Nishimura, Kinya; Ohgushi, Takayuki

    2009-11-01

    Trophic cascades are often a potent force in ecological communities, but abiotic and biotic heterogeneity can diffuse their influence. For example, inducible defenses in many species create variation in prey edibility, and size-structured interactions, such as cannibalism, can shift predator diets away from heterospecific prey. Although both factors diffuse cascade strength by adding heterogeneity to trophic interactions, the consequences of their interactioh remain poorly understood. We show that inducible defenses in tadpole prey greatly intensify cannibalism in predatory larval salamanders. The likelihood of cannibalism was also strongly influenced by asymmetries in salamander size that appear to be most important in the presence of defended prey. Hence, variation in prey edibility and the size structure of the predator may synergistically affect predator-prey population dynamics by reducing prey mortality and increasing predator mortality via cannibalism. We also suggest that the indirect effects of prey defenses may shape the evolution of predator traits that determine diet breadth and how trophic dynamics unfold in natural systems.

  4. Tsunami Defense Efforts at Samcheok Port, Korea

    Science.gov (United States)

    Cho, Y. S.

    2016-02-01

    Tsunamis mainly triggered by impulsive undersea motions are long waves and can propagate a long distance. Thus, they can cause huge casualties not only neighboring countries but also distant countries. Recently, several devastating tsunamis have been occurred around the Pacific Ocean rim. Among them, the Great East Japan tsunami occurred on March 11, 2011 is probably recorded as one of the most destructive tsunamis during last several decades. The Tsunami killed more than 20,000 people (including missing people) and deprived of property damage of approximately 300 billion USD. The eastern coast of the Korean Peninsula has been attacked historically by unexpected tsunami events. These tsunamis were generated by undersea earthquakes occurred off the west coast of Japan. For example, the Central East Sea Tsunami occurred on May 26, 1983 killed 3 people and caused serious property damage at Samcheok Port located at the eastern coast of Korea. Thus, a defense plan against unexpected tsunami strikes is an essential task for the port authority to protect lives of human beings and port facilities. In this study, a master plan of tsunami defense is introduced at Samcheok Port. A tsunami hazard map is also made by employing both propagation and inundation models. Detailed defense efforts are described including the procedure of development of a tsunami hazard map. Keywords: tsunami, hazard map, run-up height, emergency action plan

  5. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  6. Antiviral Defenses in Plants through Genome Editing

    Science.gov (United States)

    Romay, Gustavo; Bragard, Claude

    2017-01-01

    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  7. Extracellular DNA: the tip of root defenses?

    Science.gov (United States)

    Hawes, Martha C; Curlango-Rivera, Gilberto; Wen, Fushi; White, Gerard J; Vanetten, Hans D; Xiong, Zhongguo

    2011-06-01

    This review discusses how extracellular DNA (exDNA) might function in plant defense, and at what level(s) of innate immunity this process might operate. A new role for extracellular factors in mammalian defense has been described in a series of studies. These studies reveal that cells including neutrophils, eosinophils, and mast cells produce 'extracellular traps' (ETs) consisting of histone-linked exDNA. When pathogens are attracted to such ETs, they are trapped and killed. When the exDNA component of ETs is degraded, trapping is impaired and resistance against invasion is reduced. Conversely, mutation of microbial genes encoding exDNases that degrade exDNA results in loss of virulence. This discovery that exDNases are virulence factors opens new avenues for disease control. In plants, exDNA is required for defense of the root tip. Innate immunity-related proteins are among a group of >100 proteins secreted from the root cap and root border cell populations. Direct tests revealed that exDNA also is rapidly synthesized and exported from the root tip. When this exDNA is degraded by the endonuclease DNase 1, root tip resistance to fungal infection is lost; when the polymeric structure is degraded more slowly, by the exonuclease BAL31, loss of resistance to fungal infection is delayed accordingly. The results suggest that root border cells may function in a manner analogous to that which occurs in mammalian cells.

  8. Electroconvulsive Therapy Malpractice: Verdict for the Defense.

    Science.gov (United States)

    Goodman, Theodore; McCall, W Vaughn

    2015-09-01

    Malpractice cases involving electroconvulsive therapy (ECT) are rare. Even rarer are those malpractice cases alleging ECT-related brain damage. The few cases of ECT malpractice lawsuits are not described in the medical literature in detail. We provide a detailed account of a case of a patient and subsequent alleged ECT-related malpractice. The details of the case were collated using the handwritten notes of one of the authors who was present at the trial and the pretrial documents of discovery that were entered into evidence. The plaintiff alleged complete autobiographical amnesia after ECT, supposedly as a result of ECT-related brain damage. The defense was aided by the presence of extensive neurological examination and brain imaging both before and after ECT. The defense team also offered to the jury the concept of "dissociative amnesia" as an alternative explanation for the plaintiff's memory complaints. The case went to trial and was successfully defended. Electroconvulsive therapy malpractice cases alleging brain damage can be successfully defended, and the successful defense is aided by adequate documentation before, during, and after ECT. Malpractice cases, especially if they are baseless, can occur unpredictably, but they can be defended if the medical documentation is thorough.

  9. DEFENSE RESOURCES MANAGEMENT USING GAME THEORY

    Directory of Open Access Journals (Sweden)

    Marian NEDELCU

    2014-04-01

    Full Text Available Game theory provides a number of analytical tools designed to assist in developing a more comprehensive understanding of phenomena emerging when decision makers interact. A game describes the strategic interactions between players who act guided by their interests and with the consciousness that their actions affect each other. The basic entity in all game theory models is the player. A player may be understood as an individual, group of individuals or any kind of organization, even countries or alliances facing decisions-making challenges and opportunities. In this respect, the concept providing the dimensions and variables informing on the planning “game” elements required for an optimal defense resource allocation is that of ‘capabilities’. The model developed in this paper is focused on allocations of the available defense resources over the assumed capabilities in order to achieve the best response to national security. I consider as a game the competition between strategic decision-makers involved in defense resource management and the threats to the national security.

  10. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  11. Instructable autonomous agents. Ph.D. Thesis

    Science.gov (United States)

    Huffman, Scott Bradley

    1994-01-01

    In contrast to current intelligent systems, which must be laboriously programmed for each task they are meant to perform, instructable agents can be taught new tasks and associated knowledge. This thesis presents a general theory of learning from tutorial instruction and its use to produce an instructable agent. Tutorial instruction is a particularly powerful form of instruction, because it allows the instructor to communicate whatever kind of knowledge a student needs at whatever point it is needed. To exploit this broad flexibility, however, a tutorable agent must support a full range of interaction with its instructor to learn a full range of knowledge. Thus, unlike most machine learning tasks, which target deep learning of a single kind of knowledge from a single kind of input, tutorability requires a breadth of learning from a broad range of instructional interactions. The theory of learning from tutorial instruction presented here has two parts. First, a computational model of an intelligent agent, the problem space computational model, indicates the types of knowledge that determine an agent's performance, and thus, that should be acquirable via instruction. Second, a learning technique, called situated explanation specifies how the agent learns general knowledge from instruction. The theory is embodied by an implemented agent, Instructo-Soar, built within the Soar architecture. Instructo-Soar is able to learn hierarchies of completely new tasks, to extend task knowledge to apply in new situations, and in fact to acquire every type of knowledge it uses during task performance - control knowledge, knowledge of operators' effects, state inferences, etc. - from interactive natural language instructions. This variety of learning occurs by applying the situated explanation technique to a variety of instructional interactions involving a variety of types of instructions (commands, statements, conditionals, etc.). By taking seriously the requirements of flexible

  12. An Analysis of U.S. Army Health Hazard Assessments During the Acquisition of Military Materiel

    Science.gov (United States)

    2010-06-03

    Agreement 2345 (DoDI 6055.11, 2009; NATO, 2003). Necessary criteria to compute the root mean square (rms) electric field strengths for comparison...criteria. Computer modeling is used for injury probability and severity classification and to predict the potential injury and pathology resulting from...Operations Division, System Sciences Laboratory. Edinburgh, South Australia: Defense Sceince and Technology Organisation. Kluchinsky Jr., T

  13. Advancing Instructional Communication: Integrating a Biosocial Approach

    Science.gov (United States)

    Horan, Sean M.; Afifi, Tamara D.

    2014-01-01

    Celebrating 100 years of the National Communication Association necessitates that, as we commemorate our past, we also look toward our future. As part of a larger conversation about the future of instructional communication, this essay reinvestigates the importance of integrating biosocial approaches into instructional communication research. In…

  14. Classroom Instruction: The Influences of Marie Clay

    Science.gov (United States)

    McNaughton, Stuart

    2014-01-01

    Marie Clay's body of work has influenced classroom instruction in direct and indirect ways, through large overarching themes in our pedagogical content knowledge as well as specific smart practices. This paper focuses on her the contributions to our thinking about instruction which come from two broad theoretical concepts; emergent literacy…

  15. Augmenting the ADDIE Paradigm for Instructional Design

    Science.gov (United States)

    Ni, Xiaopeng; Branch, Robert Maribe

    2008-01-01

    The authors discuss topics appropriate for augmenting the ADDIE paradigm for instructional design. The topics selected are based on data from a study of working professionals who successfully completed an instructional design and technology certificate program and who identified related topics that they regarded as beneficial. The participants…

  16. A Self-Instructional System in Plastics.

    Science.gov (United States)

    Greene, Mark M.; And Others

    The purpose of this system is to teach rural high school students the process of forming objects with expandable polystyrene plastic beads. Instruction in the system generally follows a three-step sequence in which the student: 1) views one of the four demonstration films; 2) progresses through a corresponding programed instruction book; and 3)…

  17. Individualized Instructional Systems Used by Xerox

    Science.gov (United States)

    Burgwardt, Frederick C.

    1975-01-01

    A discussion of how individualized instruction has been used by Xerox to: 1) identify appropriate instructional techniques; and 2) reduce costs by devising a delivery system by which programs prepared under a "single point" design/development concept can be distributed to users at various geographical locations. (Author)

  18. Authentic Interdisciplinary Instruction: Raising the Bar

    Science.gov (United States)

    Mohnsen, Bonnie

    2011-01-01

    This article addressed the need for authentic interdisciplinary instruction. Authentic interdisciplinary instruction is defined as a learning activity that simultaneously improves student performance related to grade-level standards in two or more disciplines (e.g., science and physical education). The process described for creating authentic…

  19. Analysis of Research Data Management Instruction Materials

    OpenAIRE

    Dressel, Willow

    2015-01-01

    Poster given at the 2015 SLA - All Sciences Poster Session. Many academic libraries are developing research data management instruction programs including online guides and workshops. A wealth of materials are available to draw from. However, the quantity and variety can be overwhelming to someone just starting out. This poster examines and compares 17 publicly available research data management instruction materials.

  20. The Multimodal Possibilities of Online Instructions

    DEFF Research Database (Denmark)

    Kampf, Constance

    2006-01-01

    The WWW simplifies the process of delivering online instructions through multimodal channels because of the ease of use for voice, video, pictures, and text modes of communication built into it.  Given that instructions are being produced in multimodal format for the WWW, how do multi-modal analy...

  1. Assistant Principals: Their Readiness as Instructional Leaders

    Science.gov (United States)

    Searby, Linda; Browne-Ferrigno, Tricia; Wang, Chih-hsuan

    2017-01-01

    This article reports findings from a study investigating the capacity of assistant principals to be instructional leaders. Analyses of survey responses yielded four interesting findings: (a) years of experience as a teacher and age had no significance on assistant principals' perceived readiness as an instructional leader; (b) those completing…

  2. Culinary Occupations. Instructional Materials Committee Recommendations Report.

    Science.gov (United States)

    Louisiana State Technical Resource Center, Natchitoches.

    This resource listing contains those culinary occupations instructional materials given a rating of "highly recommended" or "recommended" by a committee of instructors. Titles are arranged alphabetically by title within each of the following Classification of Instructional Programs (CIP) categories: institutional management;…

  3. Instructional Podcasting with Undergraduate Digital Natives

    Science.gov (United States)

    Thomas, Kevin M.; Willis, Dottie

    2013-01-01

    This paper analyzes the use of instructional podcasts with students in introductory computer application classes at a small, independent, private university. Participants were all undergraduates in the school of education. In an effort to model effective use of instructional technology for preservice teachers and to "meet digital native…

  4. Technology: Differentiating Instruction by Flipping the Classroom

    Science.gov (United States)

    Siegle, Del

    2014-01-01

    Flipping the classroom can be an effective instructional strategy for differentiating instruction for gifted and talented students. The author presents a rationale for using the strategy with gifted students, possible problems educators might encounter, and practical tips for beginning the process of flipping the classroom.

  5. Text-Picture Relations in Cooking Instructions

    NARCIS (Netherlands)

    van der Sluis, Ielka; Leito, Shadira; Redeker, Gisela; Bunt, Harry

    2016-01-01

    Like many other instructions, recipes on packages with ready-to-use ingredients for a dish combine a series of pictures with short text paragraphs. The information presentation in such multimodal instructions can be compact (either text or picture) and/or cohesive (text and picture). In an explorato

  6. Author and reader in Instructions for use

    NARCIS (Netherlands)

    Steehouder, Michael F.

    1997-01-01

    Instructions for use should not be seen as merely instrumental-they should also persuade the reader to read the text and to act accordingly. Moreover, they should establish a positive image of the product and the manufacturer. In this paper, a collection of instructions for use is used to identify s

  7. Instructional Models Effective in Distance Education.

    Science.gov (United States)

    Jackman, Diane H.; Swan, Michael K.

    The purpose of this study was to identify which instructional models based on the framework of Joyce, Weil, and Showers, could be used effectively in distance education over the Interactive Video Network (IVN) system in North Dakota. Instructional models have been organized into families such as Information Processing, Social, Personal, and…

  8. Sources of Information for Instructional Technology.

    Science.gov (United States)

    Wiley, Ann L., Comp.

    This booklet is designed to help instructional technologists, students of instructional technology, faculty, and researchers in the field locate information quickly and easily. Information services described are libraries, the ERIC system, online information services, state education departments, regional education centers, and information…

  9. An Automated Approach to Instructional Design Guidance.

    Science.gov (United States)

    Spector, J. Michael; And Others

    This paper describes the Guided Approach to Instructional Design Advising (GAIDA), an automated instructional design tool that incorporates techniques of artificial intelligence. GAIDA was developed by the U.S. Air Force Armstrong Laboratory to facilitate the planning and production of interactive courseware and computer-based training materials.…

  10. Measuring the Mathematical Quality of Instruction

    Science.gov (United States)

    Journal of Mathematics Teacher Education, 2011

    2011-01-01

    In this article, we describe a framework and instrument for measuring the mathematical quality of mathematics instruction. In describing this framework, we argue for the separation of the "mathematical quality of instruction" (MQI), such as the absence of mathematical errors and the presence of sound mathematical reasoning, from pedagogical…

  11. Instructional Computing in Wyoming: Status and Recommendations.

    Science.gov (United States)

    Kansky, Bob

    The status of instructional computing in Wyoming's public schols as of April 1980 is reported. Specifically the document indicates the nature and extent of computer usage in grades K-12, summarizes teachers' opinions regarding the potential instructional uses of computers in the schools, and presents the recommendations of a select committee of…

  12. Instructional Computing. An Action Guide for Educators.

    Science.gov (United States)

    Dennis, J. Richard; Kansky, Robert J.

    This book is directed to any educator who is interested in the use of the computer to improve classroom instruction. It is a book about the materials, human factors, and decision-making procedures that make up the instructional application of computers. This document's single goal is to promote educators' thoughtful selection and use of both…

  13. Implicit and Explicit Instruction of Spelling Rules

    Science.gov (United States)

    Kemper, M. J.; Verhoeven, L.; Bosman, A. M. T.

    2012-01-01

    The study aimed to compare the differential effectiveness of explicit and implicit instruction of two Dutch spelling rules. Students with and without spelling disabilities were instructed a spelling rule either implicitly or explicitly in two experiments. Effects were tested in a pretest-intervention-posttest control group design. Experiment 1…

  14. Implicit and explicit instruction of spelling rules

    NARCIS (Netherlands)

    Kemper, M.J.; Verhoeven, L.T.W.; Bosman, A.M.T.

    2012-01-01

    The study aimed to compare the differential effectiveness of explicit and implicit instruction of two Dutch spelling rules. Students with and without spelling disabilities were instructed a spelling rule either implicitly or explicitly in two experiments. Effects were tested in a pretest-interventio

  15. Robust Vocabulary Instruction in a Readers' Workshop

    Science.gov (United States)

    Feezell, Greg

    2012-01-01

    This article presents strategies for integrating explicit vocabulary instruction within a reading workshop. The author begins by describing a process for involving students in word selection. The author then provides a weeklong instructional sequence using student-selected words. Finally, the author briefly examines the role of vocabulary…

  16. Instructional Leadership: Are Women Principals Better?

    Science.gov (United States)

    Andrews, Richard L.; Basom, Margaret R.

    1990-01-01

    A 1984 study found that female elementary school principals spent 38.4 percent of their time on instructional leadership activities, while their male counterparts spent only 21.8 percent. A 1989 follow-up study found that women principals were more likely to be seen by their staffs as instructional leaders. A sidebar examines sex discrimination in…

  17. Mass Communication Instruction in the Secondary School.

    Science.gov (United States)

    Fletcher, James E.; Surlin, Stuart H.

    The steady increase of mass communication instruction in secondary schools has resulted from the demands by educators and the public for programs to help students cope with the impact and potential of mass media. This book describes the status and potential of mass communication instruction in secondary schools. Following an introductory chapter…

  18. Self-Paced Instruction: Hello, Education

    Science.gov (United States)

    Leuba, Richard J.; Flammer, Gordon H.

    1975-01-01

    Answers criticisms of self-paced instruction (SPI) by citing advantages of SPI over lecture methods. Concludes that criticisms of SPI are useful since they indicate in which areas further research should be conducted to improve this method of instruction. (MLH)

  19. Project Physics Programmed Instruction, Vectors 1.

    Science.gov (United States)

    Harvard Univ., Cambridge, MA. Harvard Project Physics.

    This programmed instruction booklet is an interim version of instructional materials being developed by Harvard Project Physics. It is the first in a series of three booklets on vectors and covers the definitions of vectors and scalars, drawing vector quantities to scale, and negative vectors. For others in this series, see SE 015 550 and SE 015…

  20. 24 CFR 3285.401 - Anchoring instructions.

    Science.gov (United States)

    2010-04-01

    ... wind by use of anchor assembly type installations or by connecting the home to an alternative foundation system. See § 3285.301. (b) For anchor assembly type installations, the installation instructions... instructions and design for anchor type assemblies must be prepared by a registered professional engineer...