WorldWideScience

Sample records for defense instruction dodi

  1. 75 FR 66680 - Defense Federal Acquisition Regulation Supplement (DFARS); Continuation of Essential Contractor...

    Science.gov (United States)

    2010-10-29

    ...-AG52 Defense Federal Acquisition Regulation Supplement (DFARS); Continuation of Essential Contractor... that contractors providing essential contractor services, as determined by the requiring activity..., implementing the requirements of DoDI 3020.37, Continuation of Essential DoD Contractor Services During Crises...

  2. An Analysis of Factors Affecting Affiliation in the Marine Corps Reserves

    Science.gov (United States)

    2014-12-01

    AR Active Reserve ASL Active Status List CC Continuance Commitment DODI Department of Defense Instruction DON Department of the Navy FFM ...turnover (Mobley, Griffeth, Hand, & Meglino, 1979). Other research on personality constructs use the five factor model ( FFM ) as a basis...Conscientiousness and emotional stability are two personality dimensions of the FFM , which are negatively correlated and useful predictors of voluntary turnover

  3. 76 FR 21708 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-04-18

    ... Appendix I to OMB Circular No. A-130, ``Federal Agency Responsibilities for Maintaining Records About... Instruction (DoDI) 1400.25-V810, DoD Civilian Personnel Management System: Injury Compensation; DoDI 1400.25-V850, DoD Civilian Personnel Management System: Unemployment Compensation; DoD 1400.25-M, DoD Civilian...

  4. 77 FR 29616 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-18

    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program... Infrastructure Program (DCIP) Management; and DoDI 5205.13, Defense Industrial Base (DIB) Cyber Security...

  5. Computer Assisted Instruction

    Science.gov (United States)

    Higgins, Paul

    1976-01-01

    Methodology for developing a computer assisted instruction (CAI) lesson (scripting, programing, and testing) is reviewed. A project done by Informatics Education Ltd. (IEL) for the Department of National Defense (DND) is used as an example. (JT)

  6. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche

    2012-01-01

    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  7. Public Health Emergency Management Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    February 20071 (aa) DoD Instruction 1100.21, “ Voluntary Services in the Department of Defense,” March 11, 2002 (ab) DoD Instruction 5210.25...include eradication of disease, identification of affected animals, animal quarantine implementation, euthanasia , carcass disposal, cleaning and

  8. 32 CFR 884.17 - Commander's instruction letter to member.

    Science.gov (United States)

    2010-07-01

    ... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...

  9. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  10. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling

    International Nuclear Information System (INIS)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid

    2010-01-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  11. Symposium by NATO Defense Research Group Panel VIII on Computer-Based Instruction in Military Environments

    CERN Document Server

    Weddle, Peter

    1987-01-01

    This collection of papers is the result of a symposium sponsored by NATO's Defense Research Group Panel VIII in the Spring of 1985. The symposium came into being when it became obvious to the NATO countries that research, development and utilization of advanced technologies for training was the best means of increasing both training effectiveness and efficiency. This symposium was the second in a series of three devoted to training. The series was structured to cover all aspects of training. The first series addressed the value of training, the second one dealt with the application of training technologies and the third and last of the series focused on academic issues concerned with the effect of prior learning on subsequent learning. The fact that a major American publisher has determined that computer based instruction is the technology of greatest interest to the NATO community is not surprising. Advances in microprocessor technology have revolutionized both how and where we train. During this symposium t...

  12. Short Term Cyber Attacks with Long Term Effects and Degradation of Supply Chain Capability

    Science.gov (United States)

    2016-09-01

    Artificial Intelligence Research Society Conference, 271–275, St. Augustine: Florida. Goetschalckx, Marc. 2011. Supply Chain Engineering. New York: Springer...term risks in a network supply chain to establish the existence of black swan events. 14. SUBJECT TERMS cybersecurity , supply chain risk...Mission, and Information System View (NIST SP 800–39) .....50 6. Cybersecurity Instruction for the DOD (DODI 8500.01) .........51 7. Risk Management

  13. Analysis of Department of Defense Organic Depot Maintenance Capacity Management and Facility Utilization Factors

    Science.gov (United States)

    1991-09-01

    System ( CAPMS ) in lieu of using DODI 4151.15H. Facility utilization rate computation is not explicitly defined; it is merely identified as a ratio of...front of a bottleneck buffers the critical resource and protects against disruption of the system. This approach optimizes facility utilization by...run titled BUFFERED BASELINE. Three different levels of inventory were used to evaluate the effect of increasing the inventory level on critical

  14. 77 FR 11495 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-02-27

    ... management, curricula, and methods of instructions, facilities, and other matters of interest. The Secretary... more than 10 members, who are eminent authorities in the fields of academia, business, national defense and security, the defense industry, and research and analysis. Not less than 50 percent of Board...

  15. Department of Defense Facilities Energy Conservation Policies and Spending

    National Research Council Canada - National Science Library

    Andrews, Anthony

    2008-01-01

    .... This report reviews energy conservation legislation and Executive Orders that apply to the Department of Defense, directives and instructions to the military departments and agencies on implementing...

  16. SMC Systems Engineering: Specialty Engineering Disciplines Framework and Descriptions. Volume 2

    Science.gov (United States)

    2011-10-03

    Evaluation Activities Provide T&E Program Contract Req’ts: JRMET Participation; GIDEP; FRB, RCM; FMEA; FTA , Derating, Otller T&E Reqts Provide...Operation of the Defense Acquisition System 08 Dec08 CJCSI 3170 01G Joint Capabilities lnteoration and Development svstem 01 Mar 09 DoDI 3020.37...Acquisition and Sustainment Life Cycle Management 22 Mar 11 AFI63-1201 Life Cycle Systems Engineering 23 Jul 07 Document X umber Standards Title Issue

  17. 32 CFR 632.6 - Administrative instructions.

    Science.gov (United States)

    2010-07-01

    ... defense techniques. (ii) MP club. (iii) Individual chemical aerosol irritant projectors. (iv) Their assigned firearms. (b) Commanders will also— (1) Provide periodic refresher training to ensure continued... guards to receive instructions regarding use of force. (Give periodic refresher training to ensure...

  18. Forum: Interpersonal Communication in Instructional Settings: Interpersonal Communication Research in Instructional Contexts: A Dyadic Approach

    Science.gov (United States)

    Goodboy, Alan K.; Kashy, Deborah A.

    2017-01-01

    Do we study too much interpersonal communication and not enough of other topics in the instructional communication literature? This forum provides a mixed bag of both affirmative and negative responses to this question. On one hand, answering "yes" is quite defensible because there are many recent studies examining interpersonal…

  19. A Study on the Defensive Stance and Position of Handball Goalkeepers: Facing a Forward Jump Shot Made from 9 Meters.

    Science.gov (United States)

    Yang, Jong Hyun; Lee, Young Suk

    2016-10-01

    The purpose of this study was to find the defensive stance and calculate an optimal defense position for goalkeepers while blocking forward jump shots made from a distance of 9 m. Nine men's handball matches were recorded and 78 video clips were selected for analysis. These are the top class goalkeepers, which included players from the national team and reserve team of Korea. The goalkeeper's actual defensive position was significantly different from instructional suggestions; the width of both feet of the goalkeeper was approximately 2.5 times the width of the shoulders, and the hands were at waist height. The goalkeeper's actual defense position was about 1.10 (± 0.3) m from the goal line and also significantly different than instructional material (0.75 m). The optimal defense position, which was calculated from the goalkeeper's actual movement, was 1.44 m from the goal line, because the ratio of goalkeeper's defensive area in relation to the total area to be defended is highest at this point. In summary, we recommended that handball goalkeepers move forward, about a half step (0.34 m), when defending a forward jump shot made from 9 m, and instructional material should be modified according to the findings from this study.

  20. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S

    2008-01-01

    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  1. An Analysis of Communication Between Program Managers and Contracting Officers and Its Effect on the Performance of the Defense Acquisition System

    Science.gov (United States)

    2015-09-01

    McCurdy MDAP Breaches per SAR Year (1997–2013) ................45 Figure 13. Nunn-McCurdy MDAP Breech Rates by Component (1997–2013) .........46 Figure...and KO only to be rejected by the KO’s approving authority or higher headquarters. Instances were cited where often external pressures from...the 5000 Series is the DODI 5000.02. As of the writing of this document, the current version dates from January 7, 2015. The following is an

  2. A Report on the Research and Development of Instructional Simulation.

    Science.gov (United States)

    West, Charles K.; And Others

    The purpose of this report is to communicate findings on current knowledge of simulation design, development, and evaluation. Research on this project was guided by questions posed by the Defense Systems Management College in Fort Belvoir, Virginia. These questions fall into three categories: the constituents of good instructional simulations, the…

  3. Effects of Sex, Social Desirability, and Birth Order on the Defense Mechanisms Inventory.

    Science.gov (United States)

    Dudley, Gary E.

    1978-01-01

    Investigated effects of sex difference, social desirability instructions, and birth order of respondents on defense mechanisms inventory (DMI). Sex difference was found in projection only. Social desirability effects were found in turning-against-others, projection, principalization, and reversal. Thus, an interpretive caution is in order…

  4. Legal review on PTSD defense of adolescent patients in criminal cases

    Directory of Open Access Journals (Sweden)

    Xiaofu Li

    2017-02-01

    Full Text Available Post-Traumatic Stress Disorder is nothing new for Chinese society; however, Chinese courts are hesitated to accept the PTSD as a mental defense for adolescent patients. PTSD defense might be popular in future and court shall give proper weight to relevant factors. It is a big problem that there are no procedures or instructions for the connection between diagnosis and judgment. The paper illustrates the origination of PTSD and its development in USA with some relevant cases. Even the American courts consider PTSD as a problem. And there should be detailed regulations in China to keep pace with the development of science technology.

  5. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen. Kurzanleitung fuer die CBRN-Probenahme

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid (and others)

    2010-07-01

    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  6. Educating Jurors about Forensic Evidence: Using an Expert Witness and Judicial Instructions to Mitigate the Impact of Invalid Forensic Science Testimony.

    Science.gov (United States)

    Eastwood, Joseph; Caldwell, Jiana

    2015-11-01

    Invalid expert witness testimony that overstated the precision and accuracy of forensic science procedures has been highlighted as a common factor in many wrongful conviction cases. This study assessed the ability of an opposing expert witness and judicial instructions to mitigate the impact of invalid forensic science testimony. Participants (N = 155) acted as mock jurors in a sexual assault trial that contained both invalid forensic testimony regarding hair comparison evidence, and countering testimony from either a defense expert witness or judicial instructions. Results showed that the defense expert witness was successful in educating jurors regarding limitations in the initial expert's conclusions, leading to a greater number of not-guilty verdicts. The judicial instructions were shown to have no impact on verdict decisions. These findings suggest that providing opposing expert witnesses may be an effective safeguard against invalid forensic testimony in criminal trials. © 2015 American Academy of Forensic Sciences.

  7. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    Science.gov (United States)

    2016-06-01

    Managed Spare Parts at Service Industrial Sites by Supply Chain , Fiscal...Metrics and Inventory Stratification Reporting; and Defense Logistics Agency Instruction 4140.08, DLA Retail Supply Chain Materiel Management ...the retail supply system, which is typically managed by the services. As a retail inventory manager at industrial sites, DLA manages the supply

  8. Waste Generator Instructions: Key to Successful Implementation of the US DOE's 435.1 for Transuranic Waste Packaging Instructions (LA-UR-12-24155) - 13218

    International Nuclear Information System (INIS)

    French, David M.; Hayes, Timothy A.; Pope, Howard L.; Enriquez, Alejandro E.; Carson, Peter H.

    2013-01-01

    In times of continuing fiscal constraints, a management and operation tool that is straightforward to implement, works as advertised, and virtually ensures compliant waste packaging should be carefully considered and employed wherever practicable. In the near future, the Department of Energy (DOE) will issue the first major update to DOE Order 435.1, Radioactive Waste Management. This update will contain a requirement for sites that do not have a Waste Isolation Pilot Plant (WIPP) waste certification program to use two newly developed technical standards: Contact-Handled Defense Transuranic Waste Packaging Instructions and Remote-Handled Defense Transuranic Waste Packaging Instructions. The technical standards are being developed from the DOE O 435.1 Notice, Contact-Handled and Remote-Handled Transuranic Waste Packaging, approved August 2011. The packaging instructions will provide detailed information and instruction for packaging almost every conceivable type of transuranic (TRU) waste for disposal at WIPP. While providing specificity, the packaging instructions leave to each site's own discretion the actual mechanics of how those Instructions will be functionally implemented at the floor level. While the Technical Standards are designed to provide precise information for compliant packaging, the density of the information in the packaging instructions necessitates a type of Rosetta Stone that translates the requirements into concise, clear, easy to use and operationally practical recipes that are waste stream and facility specific for use by both first line management and hands-on operations personnel. The Waste Generator Instructions provide the operator with step-by-step instructions that will integrate the sites' various operational requirements (e.g., health and safety limits, radiological limits or dose limits) and result in a WIPP certifiable waste and package that can be transported to and emplaced at WIPP. These little known but widely productive Waste

  9. Counterfeit Parts Prevention Strategies Guide

    Science.gov (United States)

    2014-06-24

    requirements of 252.211-7003, Item Unique Identification and Valuation .” This section establishes a recommended approach for requirements, polices, and...7003 Item Unique Identification and Valuation DoDI 4140.67 DoD Counterfeit Prevention Policy DoDI 5200.39 Critical Program Information (CPI...Deborah Valley deborah.valley@ll.mit.edu MIT Fred Van Milligen fvanmilligen@jdsu.com JDSU Marvin VanderWeg marvin.vanderwag@spacex.c om SpaceX Gerrit

  10. Waste Generator Instructions: Key to Successful Implementation of the US DOE's 435.1 for Transuranic Waste Packaging Instructions (LA-UR-12-24155) - 13218

    Energy Technology Data Exchange (ETDEWEB)

    French, David M. [LANL EES-12, Carlsbad, NM, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Hayes, Timothy A. [LANL EES-12, Carlsbad, NM, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Pope, Howard L. [Aspen Resources Ltd., Inc., P.O. Box 3038, Boulder, CO 80307 (United States); Enriquez, Alejandro E. [LANL NCO-4, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States); Carson, Peter H. [LANL NPI-7, Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM 87545 (United States)

    2013-07-01

    In times of continuing fiscal constraints, a management and operation tool that is straightforward to implement, works as advertised, and virtually ensures compliant waste packaging should be carefully considered and employed wherever practicable. In the near future, the Department of Energy (DOE) will issue the first major update to DOE Order 435.1, Radioactive Waste Management. This update will contain a requirement for sites that do not have a Waste Isolation Pilot Plant (WIPP) waste certification program to use two newly developed technical standards: Contact-Handled Defense Transuranic Waste Packaging Instructions and Remote-Handled Defense Transuranic Waste Packaging Instructions. The technical standards are being developed from the DOE O 435.1 Notice, Contact-Handled and Remote-Handled Transuranic Waste Packaging, approved August 2011. The packaging instructions will provide detailed information and instruction for packaging almost every conceivable type of transuranic (TRU) waste for disposal at WIPP. While providing specificity, the packaging instructions leave to each site's own discretion the actual mechanics of how those Instructions will be functionally implemented at the floor level. While the Technical Standards are designed to provide precise information for compliant packaging, the density of the information in the packaging instructions necessitates a type of Rosetta Stone that translates the requirements into concise, clear, easy to use and operationally practical recipes that are waste stream and facility specific for use by both first line management and hands-on operations personnel. The Waste Generator Instructions provide the operator with step-by-step instructions that will integrate the sites' various operational requirements (e.g., health and safety limits, radiological limits or dose limits) and result in a WIPP certifiable waste and package that can be transported to and emplaced at WIPP. These little known but widely

  11. Improving DLA Aviation Engineering’s Support to its Customers and the DoD Supply Chain

    Science.gov (United States)

    2014-10-01

    Report and issued DMRD 926 under the same title. The report’s central recommendation transferred Item Management (IM) responsibilities for...3200.1 and other related functions are more appropriately addressed in a DoDI sponsored by ASD (L&MR). Currently, there is no DoDI that addresses...appropriate, of DCMA to perform in-plant quality assurance, and the option to conduct PLT when circumstances warrant, must be combined in a coherent and

  12. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  13. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  14. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing

    Science.gov (United States)

    Hackney, Dennis W. G.

    2011-01-01

    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…

  15. Instructional strategies to improve women's attitudes toward science

    Science.gov (United States)

    Newbill, Phyllis Leary

    Although negative attitudes toward science are common among women and men in undergraduate introductory science classes, women's attitudes toward science tend to be more negative than men's. The reasons for women's negative attitudes toward science include lack of self-confidence, fear of association with social outcasts, lack of women role models in science, and the fundamental differences between traditional scientific and feminist values. Attitudes are psychological constructs theorized to be composed of emotional, cognitive, and behavioral components. Attitudes serve functions, including social expressive, value expressive, utilitarian, and defensive functions, for the people who hold them. To change attitudes, the new attitudes must serve the same function as the old one, and all three components must be treated. Instructional designers can create instructional environments to effect attitude change. In designing instruction to improve women's attitudes toward science, instructional designers should (a) address the emotions that are associated with existing attitudes, (b) involve credible, attractive women role models, and (c) address the functions of the existing attitudes. Two experimental instructional modules were developed based on these recommendations, and two control modules were developed that were not based on these recommendations. The asynchronous, web-based modules were administered to 281 undergraduate geology and chemistry students at two universities. Attitude assessment revealed that attitudes toward scientists improved significantly more in the experimental group, although there was no significant difference in overall attitudes toward science. Women's attitudes improved significantly more than men's in both the experimental and control groups. Students whose attitudes changed wrote significantly more in journaling activities associated with the modules. Qualitative analysis of journals revealed that the guidelines worked exactly as predicted

  16. Examining the influence of acute instructional approaches on the decision-making performance of experienced team field sport players.

    Science.gov (United States)

    Buszard, Tim; Farrow, Damian; Kemp, Justin

    2013-01-01

    We examined the influence of instructions on decision-making accuracy using video simulations of game-specific scenarios in Australian football. Skilled performers (average age of 23.4 ± 4.2 years) differing in experience (range 0 to 339 Australian Football League (AFL) matches) assumed the role of the key attacker and verbally indicated their kicking decision. Participants were randomly stratified into three groups: (1) LOOSE (n = 15)--instructed to "keep the ball away from the loose defender"; (2) TTF (n = 15) - instructed to "take the first option"; and (3) NI (control) (n = 16)--given no instructions. Gaze behaviour for a subset of participants (n = 20) was recorded. In the scenarios with an even number of attacking and defensive players, the decision-making accuracy of LOOSE was greater than TTF. This difference was most evident for lesser experienced performers, highlighting that lesser experienced performers are more affected by instructional foci than experienced performers. Gaze behaviour was not affected by instructional foci, but visual search rate was greater in scenarios of greater player number and complexity.

  17. The eye movement desensitization and reprocessing procedure prevents defensive processing in health persuasion.

    Science.gov (United States)

    Dijkstra, Arie; van Asten, Regine

    2014-01-01

    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a university sample (n = 124) listened to the persuasive message in a randomized laboratory experiment. In the EMDR condition, they were also instructed to follow with their eyes a dot on the computer screen. The dot constantly moved from one side of the screen to the other in 2 seconds. In addition, a self-affirmation procedure was applied in half of the participants. EMDR led to a significant increase in persuasion, only in recipients in whom the persuasive message could be expected to activate defensive self-regulation (in participants with a moderate health value and in participants with low self-esteem). In those with a moderate health value, EMDR increased persuasion, but only when recipients were not affirmed. In addition, EMDR increased persuasion only in recipients with low self-esteem, not in those with high self-esteem. These results showed that EMDR influenced persuasion and in some way lowered defensive reactions. The similarities and differences in effects of EMDR and self-affirmation further increased our insight into the psychology of defensiveness.

  18. Is Intellectual Property Theft? BI's Hidden Ideology...And Two Reactions [and] In Defense of the Bibliographic Process [and] In Defense of Instruction Librarians.

    Science.gov (United States)

    Duff, Alistair S.; And Others

    1995-01-01

    Discusses the "hidden" ideology in traditional bibliographic instruction's treatment of intellectual property rights and copyright laws, and suggests that protection of these rights constitutes a form of stealing thoughts and ideas that should belong to the public. Reactions from two librarians who defend the current bibliographic…

  19. Instructional Partners, Principals, Teachers, and Instructional Assistants.

    Science.gov (United States)

    Indiana State Dept. of Public Instruction, Indianapolis.

    This handbook examines various topics of interest and concern to teachers as they work with instructional assistants forming a classroom instructional partnership and functioning as a team. These topics include: (1) instructional assistant qualifications; (2) duties--instructional, classroom clerical, auxillary; (3) factors to be considered when…

  20. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  1. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  2. DOE Defense Program (DP) safety programs. Final report, Task 003

    International Nuclear Information System (INIS)

    1998-01-01

    The overall objective of the work on Task 003 of Subcontract 9-X52-W7423-1 was to provide LANL with support to the DOE Defense Program (DP) Safety Programs. The effort included the identification of appropriate safety requirements, the refinement of a DP-specific Safety Analysis Report (SAR) Format and Content Guide (FCG) and Comprehensive Review Plan (CRP), incorporation of graded approach instructions into the guidance, and the development of a safety analysis methodologies document. All tasks which were assigned under this Task Order were completed. Descriptions of the objectives of each task and effort performed to complete each objective is provided here

  3. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  4. Long multiplication by instruction sequences with backward jump instructions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.

    2013-01-01

    For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Backward jump instructions

  5. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  6. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  7. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  8. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  9. 48 CFR 215.403-5 - Instructions for submission of cost or pricing data or information other than cost or pricing data.

    Science.gov (United States)

    2010-10-01

    ... submission of cost or pricing data or information other than cost or pricing data. 215.403-5 Section 215.403... DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 215.403-5 Instructions for submission of cost or pricing data or information other than cost or pricing data. When the...

  10. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  11. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  12. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  13. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  14. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  15. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  16. Using Interactive Video Instruction To Enhance Public Speaking Instruction.

    Science.gov (United States)

    Cronin, Michael W.; Kennan, William R.

    Noting that interactive video instruction (IVI) should not and cannot replace classroom instruction, this paper offers an introduction to interactive video instruction as an innovative technology that can be used to expand pedagogical opportunities in public speaking instruction. The paper: (1) defines the distinctive features of IVI; (2) assesses…

  17. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  18. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  19. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  20. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  1. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  2. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  3. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  4. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  5. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  7. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  8. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  9. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  10. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  11. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  12. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  13. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  14. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  15. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  16. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  17. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  18. Inquiry-Oriented Instruction: A Conceptualization of the Instructional Principles

    Science.gov (United States)

    Kuster, George; Johnson, Estrella; Keene, Karen; Andrews-Larson, Christine

    2018-01-01

    Research has highlighted that inquiry-based learning (IBL) instruction leads to many positive student outcomes in undergraduate mathematics. Although this research points to the value of IBL instruction, the practices of IBL instructors are not well-understood. Here, we offer a characterization of a particular form of IBL instruction:…

  19. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  20. Motivational Measure of the Instruction Compared: Instruction Based on the ARCS Motivation Theory vs Traditional Instruction in Blended Courses

    Science.gov (United States)

    Colakoglu, Ozgur M.; Akdemir, Omur

    2012-01-01

    The ARCS Motivation Theory was proposed to guide instructional designers and teachers who develop their own instruction to integrate motivational design strategies into the instruction. There is a lack of literature supporting the idea that instruction for blended courses if designed based on the ARCS Motivation Theory provides different…

  1. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  2. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  4. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  5. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  6. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  7. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  8. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  9. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  10. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  11. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  12. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  13. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  14. The Instructional Capacitor

    Science.gov (United States)

    Walton, Elizabeth

    2012-01-01

    Many administrators are so overwhelmed by the basic responsibilities of their daily work that there seems to be little or no time left for providing quality leadership in instruction. Instead, schools employ department chairs, instructional specialists, and coordinators to provide instructional leadership. How can administrators find time in the…

  15. Strategy Instruction in Mathematics.

    Science.gov (United States)

    Goldman, Susan R.

    1989-01-01

    Experiments in strategy instruction for mathematics have been conducted using three models (direct instruction, self-instruction, and guided learning) applied to the tasks of computation and word problem solving. Results have implications for effective strategy instruction for learning disabled students. It is recommended that strategy instruction…

  16. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  17. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  18. Inclusive differentiated instruction

    Directory of Open Access Journals (Sweden)

    Jerković Ljiljana S.

    2017-01-01

    Full Text Available Inclusive differentiated instruction is a new model of didactic instruction, theoretically described and established in this paper for the first time, after being experimentally verified through teaching of the mother tongue (instruction in reading and literature. Inclusive individually planned instruction is based on a phenomenological and constructivist didactic instructional paradigm. This type of teaching is essentially developmental and person-oriented. The key stages of inclusive differentiated instruction of literature are: 1 recognition of individual students' potential and educational needs regarding reading and work on literary texts; 2 planning and preparation of inclusive individually planned instruction in reading and literature; 3 actual class teaching of lessons thus prepared; and 4 evaluation of the student achievement following inclusive differentiated instruction in reading and literature. A highly important element of the planning and preparation of inclusive differentiated instruction is the creation of student profiles and inclusive individualized syllabi. Individualized syllabi specify the following: 1. a brief student profile; 2. the student position on the continuum of the learning outcomes of instruction in the Serbian language; 3. reverse-engineered macro-plan stages of instruction in the Serbian language (3.1. identifying expected outcomes and fundamental qualities of learners' work, 3.2. defining acceptable proofs of their realisation, 3.3. planning learning and teaching experiences, and 3.4. providing material and technical requisites for teaching; 4 the contents and procedure of individualized lessons targeting the student; 5 a plan of syllabus implementation monitoring and evaluation. The continuum of the learning outcomes of inclusive differentiated instruction in literature exists at three main levels, A, B and C. The three levels are: A reading techniques and learning about the main literary theory concepts; B

  19. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  20. Improving Reading Instruction through Research-Based Instructional Strategies

    Science.gov (United States)

    Nash, Vickie Lynn

    2010-01-01

    The diverse population of students in grades 1- 3 at a suburban elementary school has created a challenge for teachers when differentiating instruction in reading. The purpose of this doctoral project study was to explore the lived experiences of these teachers as they have acquired research-based instructional strategies in reading that support…

  1. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  2. Content-Based Instruction Approach In Instructional Multimedia For English Learning

    OpenAIRE

    Farani, Rizki

    2016-01-01

    Content-based Instruction (CBI) is an approach in English learning that integrates certain topic and English learning objectives. This approach focuses on using English competencies as a “bridge” to comprehend certain topic or theme in English. Nowadays, this approach can be used in instructional multimedia to support English learning by using computer. Instructional multimedia with computer system refers to the sequential or simultaneous use of variety of media formats in a given presentatio...

  3. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  4. 32 CFR 10.5 - Construction.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Construction. 10.5 Section 10.5 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY COMMISSIONS MILITARY COMMISSION INSTRUCTIONS § 10.5 Construction. Military Commission Instructions shall be construed in a manner consistent...

  5. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  6. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  7. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  8. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  9. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  10. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  11. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  12. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  13. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  14. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  15. BIBLIOGRAPHY ON INDIVIDUALIZED INSTRUCTION.

    Science.gov (United States)

    Harvard Univ., Cambridge, MA. Graduate School of Education.

    THIS BIBLIOGRAPHY LISTS MATERIAL ON VARIOUS ASPECTS OF INDIVIDUALIZED INSTRUCTION. APPROXIMATELY 85 UNANNOTATED REFERENCES ARE PROVIDED TO DOCUMENTS DATING FROM 1958 TO 1966. JOURNALS, BOOKS, AND REPORT MATERIALS ARE LISTED. SUBJECT AREAS INCLUDED ARE PROGRAMED INSTRUCTION, TEACHING MACHINES, RESPONSE MODE, SELF-INSTRUCTION, AND COMPUTER-ASSISTED…

  16. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  17. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  18. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  19. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  20. Demonstrating Empathy: A Phenomenological Study of Instructional Designers Making Instructional Strategy Decisions for Adult Learners

    Science.gov (United States)

    Vann, Linda S.

    2017-01-01

    Instructional designers are tasked with making instructional strategy decisions to facilitate achievement of learning outcomes as part of their professional responsibilities. While the instructional design process includes learner analysis, that analysis alone does not embody opportunities to assist instructional designers with demonstrations of…

  1. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  2. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  3. Written instructions for the transport of hazardous materials: Accident management instruction sheets

    International Nuclear Information System (INIS)

    Ridder, K.

    1988-01-01

    In spite of the regulations and the safety provisions taken, accidents are not entirely avoidable in the transport of hazardous materials. For managing an accident and preventing further hazards after release of dangerous substances, the vehicle drivers must carry with them the accident management instruction sheets, which give instructions on immediate counter measures to be taken by the driver, and on information to be given to the police and the fire brigades. The article in hand discusses the purpose, the contents, and practice-based improvement of this collection of instruction sheets. Particular reference is given to the newly revised version of June 15, 1988 (Verkehrsblatt 1/88) of the 'Directives for setting up accident management instruction sheets - written instructions - for road transport of hazardous materials', as issued by the Federal Ministry of Transport. (orig./HP) [de

  4. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  5. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  6. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  7. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  8. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  9. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  10. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  11. Elementary Students' Retention of Environmental Science Knowledge: Connected Science Instruction versus Direct Instruction

    Science.gov (United States)

    Upadhyay, Bhaskar; DeFranco, Cristina

    2008-01-01

    This study compares 3rd-grade elementary students' gain and retention of science vocabulary over time in two different classes--"connected science instruction" versus "direct instruction." Data analysis yielded that students who received connected science instruction showed less gain in science knowledge in the short term compared to students who…

  12. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  13. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  14. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  15. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  16. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  17. 30 CFR 48.25 - Training of new miners; minimum courses of instruction; hours of instruction.

    Science.gov (United States)

    2010-07-01

    ...; minimum courses of instruction; hours of instruction. (a) Each new miner shall receive no less than 24...: Provided, That no less than 8 hours of training shall in all cases be given to new miners before they are... instruction; hours of instruction. 48.25 Section 48.25 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION...

  18. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  19. Impact of supplemental instruction leader on the success of supplemental instruction model

    Science.gov (United States)

    Mahabaduge, Hasitha; Haslam, Jeanne

    Supplemental instruction utilizes peer-assisted study sessions to provide review sessions on course material and an opportunity to discuss and work out problems. The impact of supplemental instruction on student performance is well researched and used in a large number of universities around the world due to its proven success. However, the impact of the student leader who plays a significant role in this model is rarely discussed in the literature. We present a case study on the impact of student leader on the success of supplemental instruction model. This case study was done for an Introductory Physics course correlating student performance and the supplemental instruction sessions they attended. Further analysis revealed that the academic performance and work ethics of the student leader has a significant impact on the success of the supplemental instruction model. Important factors to consider when selecting a student leader, the challenges and possible remedies will also be discussed.

  20. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  1. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  2. The impact of inquiry-based instructional professional development upon instructional practice: An action research study

    Science.gov (United States)

    Broom, Frances A.

    This mixed method case study employs action research, conducted over a three month period with 11 elementary math and science practitioners. Inquiry as an instructional practice is a vital component of math and science instruction and STEM teaching. Teachers examined their beliefs and teaching practices with regard to those instructional factors that influence inquiry instruction. Video-taped lessons were compared to a rubric and pre and post questionnaires along with two interviews which informed the study. The results showed that while most beliefs were maintained, teachers implemented inquiry at a more advanced level after examining their teaching and reflecting on ways to increase inquiry practices. Because instructional practices provide only one component of inquiry-based instruction, other components need to be examined in a future study.

  3. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  4. The Instructional Network: Using Facebook to Enhance Undergraduate Mathematics Instruction

    Science.gov (United States)

    Gregory, Peter; Gregory, Karen; Eddy, Erik

    2014-01-01

    Facebook is a website with over one billion users worldwide that is synonymous with social-networking. However, in this study, Facebook is used as an "instructional network". Two sections of an undergraduate calculus course were used to study the effects of participating in a Facebook group devoted solely to instruction. One section was…

  5. Instructed Pragmatics at a Glance: Where Instructional Studies Were, Are, and Should Be Going

    Science.gov (United States)

    Taguchi, Naoko

    2015-01-01

    This paper brings together the research and developments of instructed pragmatics over the past three decades by reporting the synthesis findings of instructional intervention studies in interlanguage pragmatics. Two questions have guided this investigation: (1) is instruction effective in learning pragmatics?; and (2) what methods are most…

  6. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  7. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  8. Generating and executing programs for a floating point single instruction multiple data instruction set architecture

    Science.gov (United States)

    Gschwind, Michael K

    2013-04-16

    Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

  9. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  10. Programmed Instruction Revisited.

    Science.gov (United States)

    Skinner, B. F.

    1986-01-01

    Discusses the history and development of teaching machines, invented to restore the important features of personalized instruction as public school class size increased. Examines teaching and learning problems over the past 50 years, including motivation, attention, appreciation, discovery, and creativity in relation to programmed instruction.…

  11. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  12. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  13. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  14. Motivational elements in user instructions

    NARCIS (Netherlands)

    Loorbach, N.R.

    2013-01-01

    Concerning the design of user instructions, two view can be distinguished. The traditional view considers instructions as purely instrumental documents. The more and more emerging affective view still assumes that above all, instructions should enable readers to perform tasks. But in order to

  15. Intelligent Instructional Systems in Military Training.

    Science.gov (United States)

    Fletcher, J.D.; Zdybel, Frank

    Intelligent instructional systems can be distinguished from more conventional approaches by the automation of instructional interaction and choice of strategy. This approach promises to reduce the costs of instructional materials preparation and to increase the adaptability and individualization of the instruction delivered. Tutorial simulation…

  16. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  17. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  18. Intelligent Frameworks for Instructional Design.

    Science.gov (United States)

    Spector, J. Michael; And Others

    1992-01-01

    Presents a taxonomy describing various uses of artificial intelligence techniques in automated instructional development systems. Instructional systems development is discussed in relation to the design of computer-based instructional courseware; two systems being developed at the Air Force Armstrong Laboratory are reviewed; and further research…

  19. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  20. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  1. Designing Preclinical Instruction of Psychomotor Skills (IV)--Instructional Engineering: Evaluation Phase.

    Science.gov (United States)

    Guenzel, Pamela J.; And Others

    1995-01-01

    The fourth article in a four-part series on instructional design discusses evaluation of a psychomotor skills unit taught in preclinical dental education. Issues examined include piloting of instructional materials, analysis and revision of materials based on student performance, syllabus design and content, influence of faculty characteristics,…

  2. Instructable autonomous agents. Ph.D. Thesis

    Science.gov (United States)

    Huffman, Scott Bradley

    1994-01-01

    In contrast to current intelligent systems, which must be laboriously programmed for each task they are meant to perform, instructable agents can be taught new tasks and associated knowledge. This thesis presents a general theory of learning from tutorial instruction and its use to produce an instructable agent. Tutorial instruction is a particularly powerful form of instruction, because it allows the instructor to communicate whatever kind of knowledge a student needs at whatever point it is needed. To exploit this broad flexibility, however, a tutorable agent must support a full range of interaction with its instructor to learn a full range of knowledge. Thus, unlike most machine learning tasks, which target deep learning of a single kind of knowledge from a single kind of input, tutorability requires a breadth of learning from a broad range of instructional interactions. The theory of learning from tutorial instruction presented here has two parts. First, a computational model of an intelligent agent, the problem space computational model, indicates the types of knowledge that determine an agent's performance, and thus, that should be acquirable via instruction. Second, a learning technique, called situated explanation specifies how the agent learns general knowledge from instruction. The theory is embodied by an implemented agent, Instructo-Soar, built within the Soar architecture. Instructo-Soar is able to learn hierarchies of completely new tasks, to extend task knowledge to apply in new situations, and in fact to acquire every type of knowledge it uses during task performance - control knowledge, knowledge of operators' effects, state inferences, etc. - from interactive natural language instructions. This variety of learning occurs by applying the situated explanation technique to a variety of instructional interactions involving a variety of types of instructions (commands, statements, conditionals, etc.). By taking seriously the requirements of flexible

  3. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  4. A Performance-Based Instructional Theory

    Science.gov (United States)

    Lawson, Tom E.

    1974-01-01

    The rationale for a performanced- based instructional theory has arisen from significant advances during the past several years in instructional psychology. Four major areas of concern are: analysis of subject-matter content in terms of performance competencies, diagnosis of pre-instructional behavior, formulation of an instructional…

  5. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  6. The Mere Exposure Instruction Effect.

    Science.gov (United States)

    Van Dessel, Pieter; Mertens, Gaëtan; Smith, Colin Tucker; De Houwer, Jan

    2017-09-01

    The mere exposure effect refers to the well-established finding that people evaluate a stimulus more positively after repeated exposure to that stimulus. We investigated whether a change in stimulus evaluation can occur also when participants are not repeatedly exposed to a stimulus, but are merely instructed that one stimulus will occur frequently and another stimulus will occur infrequently. We report seven experiments showing that (1) mere exposure instructions influence implicit stimulus evaluations as measured with an Implicit Association Test (IAT), personalized Implicit Association Test (pIAT), or Affect Misattribution Procedure (AMP), but not with an Evaluative Priming Task (EPT), (2) mere exposure instructions influence explicit evaluations, and (3) the instruction effect depends on participants' memory of which stimulus will be presented more frequently. We discuss how these findings inform us about the boundary conditions of mere exposure instruction effects, as well as the mental processes that underlie mere exposure and mere exposure instruction effects.

  7. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  8. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. Instructional Leadership Practices in Singapore

    Science.gov (United States)

    Ng, Foo Seong David; Nguyen, Thanh Dong; Wong, Koon Siak Benjamin; Choy, Kim Weng William

    2015-01-01

    This paper presents a review of the literature on principal instructional leadership in Singapore. The authors investigated the dimensions of instructional leadership in the practices of Singapore principals and highlighted the strategies these leaders adopt to enact their instructional roles. Singapore principals were found to play an active role…

  15. Putting instruction sequences into effect

    NARCIS (Netherlands)

    Bergstra, J.A.

    2011-01-01

    An attempt is made to define the concept of execution of an instruction sequence. It is found to be a special case of directly putting into effect of an instruction sequence. Directly putting into effect of an instruction sequences comprises interpretation as well as execution. Directly putting into

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  18. Very Long Instruction Word Processors

    Indian Academy of Sciences (India)

    Explicitly Parallel Instruction Computing (EPIC) is an instruction processing paradigm that has been in the spot- light due to its adoption by the next generation of Intel. Processors starting with the IA-64. The EPIC processing paradigm is an evolution of the Very Long Instruction. Word (VLIW) paradigm. This article gives an ...

  19. The Measurement of Instructional Accomplishments.

    Science.gov (United States)

    Fraley, Lawrence E.; Vargas, Ernest A.

    Instructional System Technology in recent years has been characterized by an increase in individualized instruction and the modularization of the curriculum. In traditional systems the learners are forced to take blocks of instruction the size of entire courses and these are much too large. The courses can now be broken down into conceptual…

  20. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  1. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  2. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  3. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  4. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  5. Interactive Instruction in Bayesian Inference

    DEFF Research Database (Denmark)

    Khan, Azam; Breslav, Simon; Hornbæk, Kasper

    2018-01-01

    An instructional approach is presented to improve human performance in solving Bayesian inference problems. Starting from the original text of the classic Mammography Problem, the textual expression is modified and visualizations are added according to Mayer’s principles of instruction. These pri......An instructional approach is presented to improve human performance in solving Bayesian inference problems. Starting from the original text of the classic Mammography Problem, the textual expression is modified and visualizations are added according to Mayer’s principles of instruction....... These principles concern coherence, personalization, signaling, segmenting, multimedia, spatial contiguity, and pretraining. Principles of self-explanation and interactivity are also applied. Four experiments on the Mammography Problem showed that these principles help participants answer the questions...... that an instructional approach to improving human performance in Bayesian inference is a promising direction....

  6. Instructional skills evaluation in nuclear industry training

    International Nuclear Information System (INIS)

    Mazour, T.J.; Ball, F.M.

    1985-11-01

    This report provides information to nuclear power plant training managers and their staffs concerning the job performance requirements of instructional personnel to implement prformance-based training programs (also referred to as the Systems Approach Training). The information presented in this report is a compilation of information and lessons learned in the nuclear power industry and in other industries using performance-based training programs. The job performance requirements in this report are presented as instructional skills objectives. The process used to develop the instructional skills objectives is described. Each objective includes an Instructional Skills Statement describing the behavior that is expected and an Instructional Skills Standard describing the skills/knowledge that the individual should possess in order to have achieved mastery. The instructional skills objectives are organized according to the essential elements of the Systems Approach to Training and are cross-referenced to three categories of instructional personnel: developers of instruction, instructors, and instructional managers/supervisors. Use of the instructional skills objectives is demonstrated for reviewing instructional staff training and qualification programs, developing criterion-tests, and reviewing the performance and work products of individual staff members. 22 refs

  7. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  8. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  9. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  10. Comparing Two Modes of Instruction in English Passive Structures (Processing and Meaning-Based Output Instruction

    Directory of Open Access Journals (Sweden)

    Asma Dabiri

    2018-04-01

    Full Text Available This research compared the effects of two types of instruction: Processing Instruction (PI and Meaning-based Output Instruction (MOI on the interpretation and production of English passive structures.  Ninety EFL intermediate tertiary level female students (PI group= 30, MOI group= 30 and control group = 30 participated in this study. The instruments were a proficiency test, a test to assess English passive structures and two instructional materials (PI and MOI. The data were analyzed by running one-way analysis of variance (ANOVA and mixed between-within ANOVA. The study indicated the effectiveness of PI and MOI on English passive structures. PI had considerable enhancement on interpretation tasks all the time. It supported the use of PI rather than the use of traditional instructions in which mechanical components were emphasized. Also, the PI and MOI had long term effects on the interpretation and production of English passive sentences.  This study supported the use of PI and MOI rather than the use of traditional instruction (TI in EFL settings. The implication for particularly classroom teaching is that successful grammar instruction has to related to ultimate learning outcomes. Also, creating communicative tasks to offer opportunities for teaching grammar can lead to long-lasting learning effects.

  11. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  12. Editorial - Instructions

    DEFF Research Database (Denmark)

    Kastberg, Peter; Grinsted, Annelise

    2007-01-01

    Why you may wonder - have we chosen a topic which at first glance may seem trivial, and even a bit dull? Well, looks can be deceiving, and in this case they are! There are many good reasons for taking a closer look at instructions.......Why you may wonder - have we chosen a topic which at first glance may seem trivial, and even a bit dull? Well, looks can be deceiving, and in this case they are! There are many good reasons for taking a closer look at instructions....

  13. Teaching about teaching and instruction on instruction: a challenge for health sciences library education.

    Science.gov (United States)

    Detlefsen, Ellen Gay

    2012-10-01

    This is a review of the master's-level curricula of the fifty-eight America Library Association-accredited library and information science programs and iSchools for evidence of coursework and content related to library instruction. Special emphasis is placed on the schools and programs that also offer coursework in medical or health sciences librarianship. Fifty-eight school and program websites were reviewed. Course titles and course descriptions for seventy-three separate classes were analyzed. Twenty-three syllabi were examined. All North American library education programs offer at least one course in the general area of library instruction; some programs offer multiple courses. No courses on instruction, however, are focused directly on the specialized area of health sciences librarianship. Master's degree students can take appropriate classes on library instruction, but the medical library profession needs to offer continuing education opportunities for practitioners who want to have specific instruction for the specialized world of the health sciences.

  14. Computer Assisted Instructional Design for Computer-Based Instruction. Final Report. Working Papers.

    Science.gov (United States)

    Russell, Daniel M.; Pirolli, Peter

    Recent advances in artificial intelligence and the cognitive sciences have made it possible to develop successful intelligent computer-aided instructional systems for technical and scientific training. In addition, computer-aided design (CAD) environments that support the rapid development of such computer-based instruction have also been recently…

  15. Universal Design for Instruction: Extending the Universal Design Paradigm to College Instruction

    Science.gov (United States)

    McGuire, Joan M.; Scott, Sally S.

    2006-01-01

    Universal design for instruction (UDI) represents the systematic application of universal design, the construct from architecture and product development, to instructional practices in higher education. In addition to a description of the deliberative process by which UDI was developed, this article provides confirmatory evidence of the validity…

  16. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  17. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  18. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  19. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  20. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  1. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  2. ARS-Media for excel instruction manual

    Science.gov (United States)

    ARS-Media for Excel Instruction Manual is the instruction manual that explains how to use the Excel spreadsheet ARS-Media for Excel application. ARS-Media for Excel Instruction Manual is provided as a pdf file....

  3. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  4. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  5. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  6. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  7. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  8. A comparison of video modeling, text-based instruction, and no instruction for creating multiple baseline graphs in Microsoft Excel.

    Science.gov (United States)

    Tyner, Bryan C; Fienup, Daniel M

    2015-09-01

    Graphing is socially significant for behavior analysts; however, graphing can be difficult to learn. Video modeling (VM) may be a useful instructional method but lacks evidence for effective teaching of computer skills. A between-groups design compared the effects of VM, text-based instruction, and no instruction on graphing performance. Participants who used VM constructed graphs significantly faster and with fewer errors than those who used text-based instruction or no instruction. Implications for instruction are discussed. © Society for the Experimental Analysis of Behavior.

  9. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  10. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  11. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  12. Exploring the Amount and Type of Writing Instruction during Language Arts Instruction in Kindergarten Classrooms

    Science.gov (United States)

    Puranik, Cynthia S.; Al Otaiba, Stephanie; Sidler, Jessica Folsom; Greulich, Luana

    2014-01-01

    The objective of this exploratory investigation was to examine the nature of writing instruction in kindergarten classrooms and to describe student writing outcomes at the end of the school year. Participants for this study included 21 teachers and 238 kindergarten children from nine schools. Classroom teachers were videotaped once each in the fall and winter during the 90 minute instructional block for reading and language arts to examine time allocation and the types of writing instructional practices taking place in the kindergarten classrooms. Classroom observation of writing was divided into student-practice variables (activities in which students were observed practicing writing or writing independently) and teacher-instruction variables (activities in which the teacher was observed providing direct writing instruction). In addition, participants completed handwriting fluency, spelling, and writing tasks. Large variability was observed in the amount of writing instruction occurring in the classroom, the amount of time kindergarten teachers spent on writing and in the amount of time students spent writing. Marked variability was also observed in classroom practices both within and across schools and this fact was reflected in the large variability noted in kindergartners’ writing performance. PMID:24578591

  13. Exploring the Amount and Type of Writing Instruction during Language Arts Instruction in Kindergarten Classrooms.

    Science.gov (United States)

    Puranik, Cynthia S; Al Otaiba, Stephanie; Sidler, Jessica Folsom; Greulich, Luana

    2014-02-01

    The objective of this exploratory investigation was to examine the nature of writing instruction in kindergarten classrooms and to describe student writing outcomes at the end of the school year. Participants for this study included 21 teachers and 238 kindergarten children from nine schools. Classroom teachers were videotaped once each in the fall and winter during the 90 minute instructional block for reading and language arts to examine time allocation and the types of writing instructional practices taking place in the kindergarten classrooms. Classroom observation of writing was divided into student-practice variables (activities in which students were observed practicing writing or writing independently) and teacher-instruction variables (activities in which the teacher was observed providing direct writing instruction). In addition, participants completed handwriting fluency, spelling, and writing tasks. Large variability was observed in the amount of writing instruction occurring in the classroom, the amount of time kindergarten teachers spent on writing and in the amount of time students spent writing. Marked variability was also observed in classroom practices both within and across schools and this fact was reflected in the large variability noted in kindergartners' writing performance.

  14. Cybersecurity Activities Support to DoD Information Network Operations

    Science.gov (United States)

    2016-03-07

    b. Employs malware detection mechanisms at DoDIN entry and exit points (e.g., firewalls , email servers, Web servers, proxy servers, remote...Vulnerability assessment and analysis. DoDI 8530.01, March 7, 2016 3 (2) Vulnerability management. (3) Malware protection. (4...27 VULNERABILITY MANAGEMENT PROGRAM ...............................................................28 MALWARE PROTECTION PROCESS

  15. Technology Use in Higher Education Instruction

    Science.gov (United States)

    Elzarka, Sammy

    2012-01-01

    The significance of integrating technology use in higher education instruction is undeniable. The benefits include those related to access to instruction by underserved populations, adequately preparing students for future careers, capitalizing on best instructional practices, developing higher order thinking activities, and engaging students…

  16. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  17. Fashions in Instructional Development.

    Science.gov (United States)

    Knapper, Christopher K.

    This paper on instructional development notes the trend toward teaching improvement efforts, classifies instructional development centers in terms of their differing philosophies of operation, and identifies some general problems that have been encountered in institutional efforts to improve teaching and learning. Centers in North America, Europe,…

  18. Facility transition instruction

    International Nuclear Information System (INIS)

    Morton, M.R.

    1997-01-01

    The Bechtel Hanford, Inc. facility transition instruction was initiated in response to the need for a common, streamlined process for facility transitions and to capture the knowledge and experience that has accumulated over the last few years. The instruction serves as an educational resource and defines the process for transitioning facilities to long-term surveillance and maintenance (S and M). Generally, these facilities do not have identified operations missions and must be transitioned from operational status to a safe and stable configuration for long-term S and M. The instruction can be applied to a wide range of facilities--from process canyon complexes like the Plutonium Uranium Extraction Facility or B Plant, to stand-alone, lower hazard facilities like the 242B/BL facility. The facility transition process is implemented (under the direction of the US Department of Energy, Richland Operations Office [RL] Assistant Manager-Environmental) by Bechtel Hanford, Inc. management, with input and interaction with the appropriate RL division and Hanford site contractors as noted in the instruction. The application of the steps identified herein and the early participation of all organizations involved are expected to provide a cost-effective, safe, and smooth transition from operational status to deactivation and S and M for a wide range of Hanford Site facilities

  19. Review of Instructional Approaches in Ethics Education.

    Science.gov (United States)

    Mulhearn, Tyler J; Steele, Logan M; Watts, Logan L; Medeiros, Kelsey E; Mumford, Michael D; Connelly, Shane

    2017-06-01

    Increased investment in ethics education has prompted a variety of instructional objectives and frameworks. Yet, no systematic procedure to classify these varying instructional approaches has been attempted. In the present study, a quantitative clustering procedure was conducted to derive a typology of instruction in ethics education. In total, 330 ethics training programs were included in the cluster analysis. The training programs were appraised with respect to four instructional categories including instructional content, processes, delivery methods, and activities. Eight instructional approaches were identified through this clustering procedure, and these instructional approaches showed different levels of effectiveness. Instructional effectiveness was assessed based on one of nine commonly used ethics criteria. With respect to specific training types, Professional Decision Processes Training (d = 0.50) and Field-Specific Compliance Training (d = 0.46) appear to be viable approaches to ethics training based on Cohen's d effect size estimates. By contrast, two commonly used approaches, General Discussion Training (d = 0.31) and Norm Adherence Training (d = 0.37), were found to be considerably less effective. The implications for instruction in ethics training are discussed.

  20. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  1. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  2. Envisioning Instructional Communication Research as a Multi-Paradigmatic Response to Neoliberalism's Effect on Instruction. Forum: The Future of Instructional Communication

    Science.gov (United States)

    Kahl, David H., Jr.

    2017-01-01

    Throughout its history, instructional communication research has played an important role in the discipline of Communication. In tracing its lineage, Myers (2010) explains that instructional communication research has focused on communicative behaviors that instructors use with their students to better understand and facilitate affective and…

  3. Systematic Instruction for Retarded Children: The Illinois Program - Experimental Edition. Part IV: Motor Performance and Recreation Instruction.

    Science.gov (United States)

    Linford, Anthony G.; Jeanrenaud, Claudine Y.

    The manual of programed instruction for motor skills and recreational activities for trainable mentally handicapped children includes guidelines on basic recreation movements, rhythm in music, handicrafts, and miscellaneous activities. The guidelines employ principles of behavior change and direct instruction. Detailed programed instruction lists…

  4. Piano instruction for nursery school trainees

    OpenAIRE

    新海, 節; Makoto, SHINKAI; 藤女子大学人間生活学部保育学科

    2012-01-01

    It is important piano instruction in childcare training schools be viewed primarily as "music for childcare". To this end,it is also important that the view of piano instruction for nursery school trainees be switched from one mainly focused on the technical aspects of performance using many etudes to a form of instruction based on developing the musicality of the trainees and their ability to display emotion through music. Further, through this instruction, the trainees need to develop the a...

  5. Using Principles of Programmed Instruction

    Science.gov (United States)

    Huffman, Harry

    1971-01-01

    Although programmed instruction in accounting is available, it is limited in scope and in acceptance. Teachers, however, may apply principles of programming to the individualizing of instruction. (Author)

  6. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  7. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  8. Effective Instruction: A Mathematics Coach's Perspective

    Science.gov (United States)

    Nebesniak, Amy L.

    2012-01-01

    Effective instruction is multifaceted, dependent largely on the context and, consequently, on numerous variables. Although "effective instruction" is difficult to define, in the author's experience--and as the work of mathematics education specialists and researchers indicates--three key features of quality instruction stand out: (1) Teaching…

  9. Only reappraisers profit from reappraisal instructions: Effects of instructed and habitual reappraisal on stress responses during interpersonal conflicts.

    Science.gov (United States)

    Mauersberger, Heidi; Hoppe, Annekatrin; Brockmann, Gudrun; Hess, Ursula

    2018-04-22

    Conflicts are an undesirable yet common aspect of daily interactions with wide-ranging negative consequences. The present research aimed to examine the buffering effect of experimentally instructed reappraisal on self-reported, physiological and behavioral stress indices during interpersonal conflicts, taking into account habitual emotion regulation strategies. For this, 145 participants experienced a standardized laboratory conflict with the instruction to either reappraise (n = 48), to suppress (n = 50), or with no instruction (n = 47) while cardiovascular and neuroendocrine measures were taken. Participants were allowed to eat sweet and salty snacks during the conflict situation. Prior to as well as after the conflict, participants reported on their subjective stress level. Reappraisal instructions were only effective for high habitual reappraisers who exhibited lower cardiovascular and cortisol reactivity and demonstrated fewer snack-eating behaviors under reappraisal instructions than under suppression or no instructions. The opposite pattern emerged for low habitual reappraisers. Neither experimentally instructed nor habitual reappraisal by itself reduced the negative effects of conflicts. Our findings complement the literature on the diverging effects of instructed reappraisal in tense social interactions. © 2018 Society for Psychophysiological Research.

  10. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  11. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  12. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  13. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  14. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  15. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  16. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  17. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  18. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  19. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  20. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  1. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  2. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  3. The Multimodal Possibilities of Online Instructions

    DEFF Research Database (Denmark)

    Kampf, Constance

    2006-01-01

    The WWW simplifies the process of delivering online instructions through multimodal channels because of the ease of use for voice, video, pictures, and text modes of communication built into it.  Given that instructions are being produced in multimodal format for the WWW, how do multi-modal analy......The WWW simplifies the process of delivering online instructions through multimodal channels because of the ease of use for voice, video, pictures, and text modes of communication built into it.  Given that instructions are being produced in multimodal format for the WWW, how do multi...

  4. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  5. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  6. Improve Student Understanding Ability Through Gamification in Instructional Media Based Explicit Instruction

    Science.gov (United States)

    Firdausi, N.; Prabawa, H. W.; Sutarno, H.

    2017-02-01

    In an effort to maximize a student’s academic growth, one of the tools available to educators is the explicit instruction. Explicit instruction is marked by a series of support or scaffold, where the students will be guided through the learning process with a clear statement of purpose and a reason for learning new skills, a clear explanation and demonstration of learning targets, supported and practiced with independent feedback until mastery has been achieved. The technology development trend of todays, requires an adjustment in the development of learning object that supports the achievement of explicit instruction targets. This is where the gamification position is. In the role as a pedagogical strategy, the use of gamification preformance study class is still relatively new. Gamification not only use the game elements and game design techniques in non-game contexts, but also to empower and engage learners with the ability of motivation on learning approach and maintains a relaxed atmosphere. With using Reseach and Development methods, this paper presents the integration of technology (which in this case using the concept of gamification) in explicit instruction settings and the impact on the improvement of students’ understanding.

  7. The nature of instructional effects in color constancy.

    Science.gov (United States)

    Radonjić, Ana; Brainard, David H

    2016-06-01

    The instructions subjects receive can have a large effect on experimentally measured color constancy, but the nature of these effects and how their existence should inform our understanding of color perception remains unclear. We used a factorial design to measure how instructional effects on constancy vary with experimental task and stimulus set. In each of 2 experiments, we employed both a classic adjustment-based asymmetric matching task and a novel color selection task. Four groups of naive subjects were instructed to make adjustments/selections based on (a) color (neutral instructions); (b) the light reaching the eye (physical spectrum instructions); (c) the actual surface reflectance of an object (objective reflectance instructions); or (d) the apparent surface reflectance of an object (apparent reflectance instructions). Across the 2 experiments we varied the naturalness of the stimuli. We find clear interactions between instructions, task, and stimuli. With simplified stimuli (Experiment 1), instructional effects were large and the data revealed 2 instruction-dependent patterns. In 1 (neutral and physical spectrum instructions) constancy was low, intersubject variability was also low, and adjustment-based and selection-based constancy were in agreement. In the other (reflectance instructions) constancy was high, intersubject variability was large, adjustment-based constancy deviated from selection-based constancy and for some subjects selection-based constancy increased across sessions. Similar patterns held for naturalistic stimuli (Experiment 2), although instructional effects were smaller. We interpret these 2 patterns as signatures of distinct task strategies-1 is perceptual, with judgments based primarily on the perceptual representation of color; the other involves explicit instruction-driven reasoning. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  8. Scaffolding in Assisted Instruction

    Directory of Open Access Journals (Sweden)

    2007-01-01

    Full Text Available On-The-Job Training, developed as direct instruction, is one of the earliest forms of training. This method is still widely in use today because it requires only a person who knows how to do the task, and the tools the person uses to do the task. This paper is intended to be a study of the methods used in education in Knowledge Society, with more specific aspects in training the trainers; as a result of this approach, it promotes scaffolding in assisted instruction as a reflection of the digital age for the learning process. Training the trainers in old environment with default techniques and designing the learning process in assisted instruction, as an application of the Vygotskian concept of the zone of proximal development (ZPD to the area of computer literacy for the younger users, generate diversity in educational communities and requires standards for technology infrastructure, standards for the content, developed as a concepts map, and applications for personalized in-struction, based on ZPD theory.

  9. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  10. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  11. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  12. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  13. 32 CFR Appendix to Part 352a - Delegations of Authority

    Science.gov (United States)

    2010-07-01

    ...) ORGANIZATIONAL CHARTERS DEFENSE FINANCE AND ACCOUNTING SERVICE (DFAS) Pt. 352a, App. Appendix to Part 352a..., Directives, and Instructions, the Director, Defense Finance and Accounting Service (DFAS), or in the absence... promulgation of common accounting and finance regulations, instructions, and reference documents, and changes...

  14. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  15. Instructional leaders for all? High school science department heads and instructional leadership across all science disciplines

    Science.gov (United States)

    Sanborn, Stephen

    Many high school science departments are responding to changes in state standards with respect to both curricular content and instructional practices. In the typical American high school organization, the academic department head is ideally positioned to influence change in the instructional practices of teachers within the department. Even though science department heads are well situated to provide leadership during this period of transition, the literature has not addressed the question of how well science department heads believe they can provide instructional leadership for all of the teachers in their department, whether they are teaching within and outside of the head's own sub-discipline. Nor is it known how science department heads view the role of pedagogical content knowledge in teaching different science disciplines. Using an online survey comprised of 26 objective questions and one open response question, a 54-respondent sample of science department heads provided no strong consensus regarding their beliefs about the role of pedagogical content knowledge in science instruction. However, science department heads expressed a significant difference in their views about their capacity to provide instructional leadership for teachers sharing their science content area compared to teachers instructing other science content areas. Given wide-spread science education reform efforts introduced in response to the Next Generation Science Standards, these findings may serve to provide some direction for determining how to best support the work of science department heads as they strive to provide instructional leadership for the teachers in their departments.

  16. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  17. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  18. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  19. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  20. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  1. Evaluation of a Theory of Instructional Sequences for Physics Instruction

    Science.gov (United States)

    Wackermann, Rainer; Trendel, Georg; Fischer, Hans E.

    2010-05-01

    The background of the study is the theory of basis models of teaching and learning, a comprehensive set of models of learning processes which includes, for example, learning through experience and problem-solving. The combined use of different models of learning processes has not been fully investigated and it is frequently not clear under what circumstances a particular model should be used by teachers. In contrast, the theory under investigation here gives guidelines for choosing a particular model and provides instructional sequences for each model. The aim is to investigate the implementation of the theory applied to physics instruction and to show if possible effects for the students may be attributed to the use of the theory. Therefore, a theory-oriented education programme for 18 physics teachers was developed and implemented in the 2005/06 school year. The main features of the intervention consisted of coaching physics lessons and video analysis according to the theory. The study follows a pre-treatment-post design with non-equivalent control group. Findings of repeated-measures ANOVAs show large effects for teachers' subjective beliefs, large effects for classroom actions, and small to medium effects for student outcomes such as perceived instructional quality and student emotions. The teachers/classes that applied the theory especially well according to video analysis showed the larger effects. The results showed that differentiating between different models of learning processes improves physics instruction. Effects can be followed through to student outcomes. The education programme effect was clearer for classroom actions and students' outcomes than for teachers' beliefs.

  2. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  3. Teachers' Beliefs, Instructional Behaviors, and Students' Engagement in Learning from Texts with Instructional Pictures

    Science.gov (United States)

    Schroeder, Sascha; Richter, Tobias; McElvany, Nele; Hachfeld, Axinja; Baumert, Jurgen; Schnotz, Wolfgang; Horz, Holger; Ullrich, Mark

    2011-01-01

    This study investigated the relations between teachers' pedagogical beliefs and students' self-reported engagement in learning from texts with instructional pictures. Participants were the biology, geography, and German teachers of 46 classes (Grades 5-8) and their students. Teachers' instructional behaviors and students' engagement in learning…

  4. Instructional Design as Knowledge Management: A Knowledge-in-Practice Approach to Choosing Instructional Methods

    Science.gov (United States)

    McIver, Derrick; Fitzsimmons, Stacey; Flanagan, David

    2016-01-01

    Decisions about instructional methods are becoming more complex, with options ranging from problem sets to experiential service-learning projects. However, instructors not trained in instructional design may make these important decisions based on convenience, comfort, or trends. Instead, this article draws on the knowledge management literature…

  5. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  7. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  8. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  9. Self-Paced Instruction: Hello, Education

    Science.gov (United States)

    Leuba, Richard J.; Flammer, Gordon H.

    1975-01-01

    Answers criticisms of self-paced instruction (SPI) by citing advantages of SPI over lecture methods. Concludes that criticisms of SPI are useful since they indicate in which areas further research should be conducted to improve this method of instruction. (MLH)

  10. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  11. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  12. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  13. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  14. Computer-based instruction system DIDAK and its application

    International Nuclear Information System (INIS)

    Gvozdjak, L.; Hanulova, L.; Jankovicova, A.; Scepanek, L.

    1983-01-01

    The DIDAK system has been developed for the instruction and training of specialized personnel of nuclear power plants. The structure of the instruction system comprises three processes: the author process, the instruction process and the administration process. Author processes provide the didactic data structure with instruction texts. In the text data base the instruction material is stored in 6 direct access nonformatted files. The instruction system receives information from the text data base and presents it to the student. According to the student's response it creates the preconditions for the further operation of the system which it stores in the data base for administration of instruction. This base contains data on the identification of students, on the instruction process of the individual and the instruction process as a whole. Administrative processes take place in the final stage. They provide information on the general course of instruction and make final evaluations. From the data base of products of the instruction process the said administrative processes produce output information for the teacher. The subject matter of each subject is divided into a finite number of elementary units of subject matter. Each elementary unit provides basic information on the explained subject matter and is followed by a check of the student's knowledge. In dependence on the results of this check the student either advances to a higher level elementary unit or proceeds to an alternative branch of the initial unit. (E.S.)

  15. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  16. Preparing for Further Introduction of Computing Technology in Vancouver Community College Instruction. Report of the Instructional Computing Committee.

    Science.gov (United States)

    Vancouver Community Coll., British Columbia.

    After examining the impact of changing technology on postsecondary instruction and on the tools needed for instruction, this report analyzes the status and offers recommendations concerning the future of instructional computing at Vancouver Community College (VCC) in British Columbia. Section I focuses on the use of computers in community college…

  17. Explicit Instruction Elements in Core Reading Programs

    Science.gov (United States)

    Child, Angela R.

    2012-01-01

    Classroom teachers are provided instructional recommendations for teaching reading from their adopted core reading programs (CRPs). Explicit instruction elements or what is also called instructional moves, including direct explanation, modeling, guided practice, independent practice, discussion, feedback, and monitoring, were examined within CRP…

  18. 21 CFR 1309.03 - Information; special instructions.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Information; special instructions. 1309.03 Section... MANUFACTURERS, DISTRIBUTORS, IMPORTERS AND EXPORTERS OF LIST I CHEMICALS General Information § 1309.03 Information; special instructions. Information regarding procedures under these rules and instructions...

  19. 21 CFR 1301.03 - Information; special instructions.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Information; special instructions. 1301.03 Section... MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES General Information § 1301.03 Information; special instructions. Information regarding procedures under these rules and instructions supplementing...

  20. How can we make user instructions motivational?

    NARCIS (Netherlands)

    Steehouder, M.F.; Loorbach, N.R.

    2004-01-01

    Good technical instructions are often viewed as 'cool, concise and professional', but there are good arguments to pay attention to their persuasive and motivational aspects as well. Until now, only analyses of existing instructions have been published, while guidelines for making instructions

  1. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  2. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  3. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  4. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  5. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  6. Active Learning through Online Instruction

    Science.gov (United States)

    Gulbahar, Yasemin; Kalelioglu, Filiz

    2010-01-01

    This article explores the use of proper instructional techniques in online discussions that lead to meaningful learning. The research study looks at the effective use of two instructional techniques within online environments, based on qualitative measures. "Brainstorming" and "Six Thinking Hats" were selected and implemented…

  7. Physics Instruction for Radiologic Technologists

    Science.gov (United States)

    Chaney, Edward L.; And Others

    1974-01-01

    Discusses the Denver collaborative training program in radiologic technology with emphasis upon identification of core topics, preparation of quality instructional materials, and use of innovative teaching techniques, such as computer-assisted instruction and video tape presentations. Included is a 10-week course outline. (CC)

  8. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  9. Universal Design for Instruction: The Paradigm, Its Principles, and Products for Enhancing Instructional Access

    Science.gov (United States)

    McGuire, Joan M.; Scott, Sally S.; Shaw, Stan F.

    2003-01-01

    Universal Design for Instruction (UDI), a construct that serves as the foundation for the work of a federally funded project at the University of Connecticut, offers an approach to inclusive instruction that is responsive to the diverse learning needs of a changing postsecondary population. In this article elements relating to the implementation…

  10. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  11. A Methodological Study Evaluating a Pretutorial Computer-Compiled Instructional Program in High School Physics Instruction Initiated from Student-Teacher Selected Instructional Objectives. Final Report.

    Science.gov (United States)

    Leonard, B. Charles; Denton, Jon J.

    A study sought to develop and evaluate an instructional model which utilized the computer to produce individually prescribed instructional guides to account for the idiosyncratic variations among students in physics classes at the secondary school level. The students in the treatment groups were oriented toward the practices of selecting…

  12. Modifying ADDIE: Incorporating New Technologies in Library Instruction

    Science.gov (United States)

    Campbell, Paul Clayton

    2014-01-01

    There are many instructional design theories to assist librarians in creating effective instructional modules for student learning. ADDIE is a generic instructional design model that has been in existence for more than 30 years and is known for its flexibility in application (Molenda, 2003). Using instructional design theories such as ADDIE helps…

  13. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  14. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  15. Effects of Instruction and Stage-Fright on Intelligence Testing

    Science.gov (United States)

    Meijer, Joost; Oostdam, Ron

    2011-01-01

    In the present research, it was tried to unravel the influence of various types of instruction on test anxiety levels and, in turn, its influence on intelligence test performance. Three types of instruction were compared: a stressful, achievement-orientated instruction; a reassuring, task-orientated instruction; and an ambiguous instruction.…

  16. Changing Student Teachers' Views of Comprehension Instruction ...

    African Journals Online (AJOL)

    At the same time research shows that little, if any, explicit and continuous strategy instruction takes place in classrooms. Reasons seem ... This article reports on the effect of a reading comprehension instruction course on university student teachers' lesson planning, strategy use and views about comprehension instruction.

  17. Principals' Perceptions of Instructional Leadership Development

    Science.gov (United States)

    Brabham, Carla E.

    2017-01-01

    Instructional leadership is an important aspect of student achievement and the overall success of schools. Principals, as instructional leaders, need continual reflection on their competency. Job-embedded professional development (JEPD) for teachers is implemented and monitored by instructional leaders. The purpose of this case study was to…

  18. On the Practice Architectures of Instructional Leadership

    Science.gov (United States)

    Salo, Petri; Nylund, Jan; Stjernstrøm, Else

    2015-01-01

    This paper explores the concept of instructional leadership and principals' perceptions of the practices of instructional leadership. Despite the emphasis on the effects of school leadership regarding teaching practices and learning outcomes, research on direct instructional leadership is scarce. It is focused either on identifying overall…

  19. Four Practical Principles for Enhancing Vocabulary Instruction

    Science.gov (United States)

    Manyak, Patrick C.; Von Gunten, Heather; Autenrieth, David; Gillis, Carolyn; Mastre-O'Farrell, Julie; Irvine-McDermott, Elizabeth; Baumann, James F.; Blachowicz, Camille L. Z.

    2014-01-01

    This article presents four practical principles that lead to enhanced word-meaning instruction in the elementary grades. The authors, a collaborative team of researchers and classroom teachers, identified and developed these principles and related instructional activities during a three-year vocabulary instruction research project. The principles…

  20. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  1. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  2. How faculty learn about and implement research-based instructional strategies: The case of Peer Instruction

    Science.gov (United States)

    Dancy, Melissa; Henderson, Charles; Turpen, Chandra

    2016-06-01

    [This paper is part of the Focused Collection on Preparing and Supporting University Physics Educators.] The lack of knowledge about how to effectively spread and sustain the use of research-based instructional strategies is currently a significant barrier to the improvement of undergraduate physics education. In this paper we address this lack of knowledge by reporting on an interview study of 35 physics faculty, of varying institution types, who were self-reported users of, former users of, or knowledgeable nonusers of the research-based instructional strategy Peer Instruction. Interview questions included in this analysis focused on the faculty's experiences, knowledge, and use of Peer Instruction, along with general questions about current and past teaching methods used by the interviewee. The primary findings include the following: (i) Faculty self-reported user status is an unreliable measure of their actual practice. (ii) Faculty generally modify specific instructional strategies and may modify out essential components. (iii) Faculty are often unaware of the essential features of an instructional strategy they claim to know about or use. (iv) Informal social interactions provide a significant communication channel in the dissemination process, in contrast to the formal avenues of workshops, papers, websites, etc., often promoted by change agents, and (v) experience with research-based strategies as a graduate student or through curriculum development work may be highly impactful. These findings indicate that educational transformation can be better facilitated by improving communication with faculty, supporting effective modification by faculty during implementation, and acknowledging and understanding the large impact of informal social interactions as a mode of dissemination.

  3. Instructional Uses of Web-Based Survey Software

    Directory of Open Access Journals (Sweden)

    Concetta A. DePaolo, Ph.D.

    2006-07-01

    Full Text Available Recent technological advances have led to changes in how instruction is delivered. Such technology can create opportunities to enhance instruction and make instructors more efficient in performing instructional tasks, especially if the technology is easy to use and requires no training. One such technology, web-based survey software, is extremely accessible for anyone with basic computer skills. Web-based survey software can be used for a variety of instructional purposes to streamline instructor tasks, as well as enhance instruction and communication with students. Following a brief overview of the technology, we discuss how Web Forms from nTreePoint can be used to conduct instructional surveys, collect course feedback, conduct peer evaluations of group work, collect completed assignments, schedule meeting times among multiple people, and aid in pedagogical research. We also discuss our experiences with these tasks within traditional on-campus courses and how they were enhanced or expedited by the use of web-based survey software.

  4. Designing Instructional Materials: Some Guidelines.

    Science.gov (United States)

    Burbank, Lucille; Pett, Dennis

    Guidelines for the design of instructional materials are outlined in this paper. The principles of design are presented in five major categories: (1) general design (structural appeal and personal appeal); (2) instructional design (attention, memory, concept learning, and attitude change); (3) visual design (media considerations, pictures, graphs…

  5. Adaptive instruction and pupil achievement

    NARCIS (Netherlands)

    Houtveen, A.A M; Booy, N; de Jong, Robert (Rob); van de Grift, W.J C M

    In this article the results are reported of a quasi-experiment on effects of adaptive instruction on reading results of children in the first year of reading instruction in Dutch primary schools. The research involved 456 pupils from 23 schools (12 experimental and 11 control group schools).

  6. Instructional Theory for Teaching Statistics.

    Science.gov (United States)

    Atwood, Jan R.; Dinham, Sarah M.

    Metatheoretical analysis of Ausubel's Theory of Meaningful Verbal Learning and Gagne's Theory of Instruction using the Dickoff and James paradigm produced two instructional systems for basic statistics. The systems were tested with a pretest-posttest control group design utilizing students enrolled in an introductory-level graduate statistics…

  7. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  8. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  9. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  10. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  11. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  12. Evaluating the Instructional Architecture of Web-Based Learning Tools (WBLTs): Direct Instruction vs. Constructivism Revisited

    Science.gov (United States)

    Kay, Robin

    2013-01-01

    Web-based learning tools (WBLTs), also known as learning objects, have been evaluated with a wide range of metrics, but rarely with respect to pedagogical design. The current study evaluated the impact of instructional architecture (direct instruction vs. constructive-based) on middle (n = 333)

  13. Effective instruction for English learners.

    Science.gov (United States)

    Calderón, Margarita; Slavin, Robert; Sánchez, Marta

    2011-01-01

    The fastest-growing student population in U.S. schools today is children of immigrants, half of whom do not speak English fluently and are thus labeled English learners. Although the federal government requires school districts to provide services to English learners, it offers states no policies to follow in identifying, assessing, placing, or instructing them. Margarita Calderón, Robert Slavin, and Marta Sánchez identify the elements of effective instruction and review a variety of successful program models. During 2007-08, more than 5.3 million English learners made up 10.6 percent of the nation's K-12 public school enrollment. Wide and persistent achievement disparities between these English learners and English-proficient students show clearly, say the authors, that schools must address the language, literacy, and academic needs of English learners more effectively. Researchers have fiercely debated the merits of bilingual and English-only reading instruction. In elementary schools, English learners commonly receive thirty minutes of English as a Second Language (ESL) instruction but attend general education classes for the rest of the day, usually with teachers who are unprepared to teach them. Though English learners have strikingly diverse levels of skills, in high school they are typically lumped together, with one teacher to address their widely varying needs. These in-school factors contribute to the achievement disparities. Based on the studies presented here, Calderón, Slavin, and Sánchez assert that the quality of instruction is what matters most in educating English learners. They highlight comprehensive reform models, as well as individual components of these models: school structures and leadership; language and literacy instruction; integration of language, literacy, and content instruction in secondary schools; cooperative learning; professional development; parent and family support teams; tutoring; and monitoring implementation and outcomes

  14. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  15. Instructional Cost Analysis: History and Present Inadequacies.

    Science.gov (United States)

    Humphrey, David A.

    The cost analysis of instruction is conducted according to principles of teaching and learning that have often become historically dated. Using today's costing systems prevents determination of whether cost effectiveness actually exists. The patterns of instruction in higher education and the systems employed for instructional cost analysis are…

  16. Rapid Prototyping: An Alternative Instructional Design Strategy.

    Science.gov (United States)

    Tripp, Steven D.; Bichelmeyer, Barbara

    1990-01-01

    Discusses the nature of instructional design and describes rapid prototyping as a feasible model for instructional system design (ISD). The use of prototyping in software engineering is described, similarities between software design and instructional design are discussed, and an example is given which uses rapid prototyping in designing a…

  17. 32 CFR 636.32 - Miscellaneous instructions.

    Science.gov (United States)

    2010-07-01

    ... National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND... that housing area streets are extremely dangerous and that playing in the street is prohibited. (2) Bus... actually in the roadway while awaiting arrival of the school bus. (3) Complaints received by the MP desk...

  18. Instruction timing for the CDC 7600 computer

    International Nuclear Information System (INIS)

    Lipps, H.

    1975-01-01

    This report provides timing information for all instructions of the Control Data 7600 computer, except for instructions of type 01X, to enable the optimization of 7600 programs. The timing rules serve as background information for timing charts which are produced by a program (TIME76) of the CERN Program Library. The rules that co-ordinate the different sections of the CPU are stated in as much detail as is necessary to time the flow of instructions for a given sequence of code. Instruction fetch, instruction issue, and access to small core memory are treated at length, since details are not available from the computer manuals. Annotated timing charts are given for 24 examples, chosen to display the full range of timing considerations. (Author)

  19. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  20. BASIC Instructional Program: System Documentation.

    Science.gov (United States)

    Dageforde, Mary L.

    This report documents the BASIC Instructional Program (BIP), a "hands-on laboratory" that teaches elementary programming in the BASIC language, as implemented in the MAINSAIL language, a machine-independent revision of SAIL which should facilitate implementation of BIP on other computing systems. Eight instructional modules which make up…

  1. Modelling Web-Based Instructional Systems

    NARCIS (Netherlands)

    Retalis, Symeon; Avgeriou, Paris

    2002-01-01

    The size and complexity of modern instructional systems, which are based on the World Wide Web, bring about great intricacy in their crafting, as there is not enough knowledge or experience in this field. This imposes the use of new instructional design models in order to achieve risk-mitigation,

  2. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  3. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  4. 30 CFR 48.5 - Training of new miners; minimum courses of instruction; hours of instruction.

    Science.gov (United States)

    2010-07-01

    ... avoidance of electrical hazards. (11) First aid. The course shall include instruction in first aid methods... use, care, and maintenance of self-rescue and respiratory devices used at the mine; (ii) Hands-on...; escapeways; emergency evacuation; barricading. The program of instruction for mine emergency evacuation and...

  5. Students and Instructors Opinions about Piano Instruction

    Science.gov (United States)

    Kilic, Deniz Beste Çevik

    2016-01-01

    This study examined the opinions of the students and piano instructors in the Turkish Education Faculties' Fine Arts Instruction Departments' music instruction programs about piano instruction. The study data were collected using a questionnaire administered to the piano instructors and the students who took lessons from them. The study results…

  6. Virtual tutor systems for robot-assisted instruction

    Science.gov (United States)

    Zhao, Zhijing; Zhao, Deyu; Zhang, Zizhen; Wei, Yongji; Qi, Bingchen; Okawa, Yoshikuni

    2004-03-01

    Virtual Reality technology belongs to advanced computer technology, it has been applied in instruction field and gains obvious effect. At the same time, robot assisted instruction comes true with the continuous development of Robot technology and artificial intelligence technology. This paper introduces a virtual tutor system for robot assisted instruction.

  7. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  8. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  9. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  10. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  11. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  12. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  13. Teacher’s Instructional Behaviour in Instructional Management at Elementary School Reviewed from Piaget’s Cognitive Development Theory

    OpenAIRE

    Eni Astuti Ni Putu

    2018-01-01

    This writing aimed at (1) describing the importance of teacher to review instructional management at elementary school based on Piaget’s cognitive development theory; and (2) describing teacher’s instructional behavior in managing instructional at elementary school reviewed from Piaget’s cognitive development theory. In general, Piaget’ cognitive development theory divides children’ cognitive development into four stages. In the elementary school ages of 7 to 11 or 12 years old, Piaget classi...

  14. PLE-based instruction concept

    Science.gov (United States)

    Javorcik, Tomas

    2017-11-01

    The paper is aimed at the description of a PLE (Personal Learning Environment)-based teaching model suitable for implementation in the instruction of upper primary school students. The paper describes the individual stages of the model and its use of ICT (Information and Communication Technologies) tools. The Personal Learning Environment is a form of instruction which allows for the meaningful use of information and communication technologies (including mobile technologies) in their entirety.

  15. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  16. Cognitive Approaches to Automated Instruction.

    Science.gov (United States)

    Regian, J. Wesley, Ed.; Shute, Valerie J., Ed.

    This book contains a snapshot of state-of-the-art research on the design of automated instructional systems. Selected cognitive psychologists were asked to describe their approach to instruction and cognitive diagnosis, the theoretical basis of the approach, its utility and applicability, and the knowledge engineering or task analysis methods…

  17. Differentiating Science Instruction: Secondary science teachers' practices

    Science.gov (United States)

    Maeng, Jennifer L.; Bell, Randy L.

    2015-09-01

    This descriptive study investigated the implementation practices of secondary science teachers who differentiate instruction. Participants included seven high school science teachers purposefully selected from four different schools located in a mid-Atlantic state. Purposeful selection ensured participants included differentiated instruction (DI) in their lesson implementation. Data included semi-structured interviews and field notes from a minimum of four classroom observations, selected to capture the variety of differentiation strategies employed. These data were analyzed using a constant-comparative approach. Each classroom observation was scored using the validated Differentiated Instruction Implementation Matrix-Modified, which captured both the extent to which critical indicators of DI were present in teachers' instruction and the performance levels at which they engaged in these components of DI. Results indicated participants implemented a variety of differentiation strategies in their classrooms with varying proficiency. Evidence suggested all participants used instructional modifications that required little advance preparation to accommodate differences in students' interests and learning profile. Four of the seven participants implemented more complex instructional strategies that required substantial advance preparation by the teacher. Most significantly, this study provides practical strategies for in-service science teachers beginning to differentiate instruction and recommendations for professional development and preservice science teacher education.

  18. Direct Reading Instruction and the NYS ELA

    Science.gov (United States)

    Jones-Carey, Margaret H.

    2013-01-01

    This study analyzed the impact of classroom based reading instruction ("direct instruction") on the standardized test scores of 6th grade students as measured by the New York State English Language Arts assessment (NYS ELA). It was hypothesized that the implementation of direct instruction in reading in grade 6 would improve NYS ELA…

  19. Home

    Science.gov (United States)

    AF Branding & Trademark Licensing Join the Air Force Home About Us The Air Force Symbol Display Resources Document Library TM Connect Search AF Branding and Trademark Licensing Program: important links Legal Documents 10 U.S.C. § 2260 15 U.S.C. § 167;167; 1114-1125 DODI 5535.12, DoD Branding and

  20. Multiple Representation Instruction First versus Traditional Algorithmic Instruction First: Impact in Middle School Mathematics Classrooms

    Science.gov (United States)

    Flores, Raymond; Koontz, Esther; Inan, Fethi A.; Alagic, Mara

    2015-01-01

    This study examined the impact of the order of two teaching approaches on students' abilities and on-task behaviors while learning how to solve percentage problems. Two treatment groups were compared. MR first received multiple representation instruction followed by traditional algorithmic instruction and TA first received these teaching…

  1. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  2. Espoused Theory and Theory-in-Use of Instructional Designers in the Use of Constructivism in Online Writing Instruction Programs

    Science.gov (United States)

    Merrell, Cheryl

    2013-01-01

    Online Writing Instruction (OWI) has become a viable educational alternative in online instruction in the K-12 educational community. To continue to effectively compete in a global society, educators have identified a necessity for instruction that replicates real-world situations and problem-solving tasks which is consistent with constructivism.…

  3. A Comparison of Video Modeling, Text-Based Instruction, and No Instruction for Creating Multiple Baseline Graphs in Microsoft Excel

    Science.gov (United States)

    Tyner, Bryan C.; Fienup, Daniel M.

    2015-01-01

    Graphing is socially significant for behavior analysts; however, graphing can be difficult to learn. Video modeling (VM) may be a useful instructional method but lacks evidence for effective teaching of computer skills. A between-groups design compared the effects of VM, text-based instruction, and no instruction on graphing performance.…

  4. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  5. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  6. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  7. Student-Centered Instruction and Academic Achievement: Linking Mechanisms of Educational Inequality to Schools’ Instructional Strategy

    DEFF Research Database (Denmark)

    Andersen, Ida Gran; Andersen, Simon Calmar

    2017-01-01

    educational inequality. We analyze whether the impact of student-centered instructional strategies on academic achievement differs for students with different socioeconomic backgrounds. Results suggest that a student-centered instructional strategy has a negative impact on academic achievement in general......, and for students with low parental education in particular. Our findings support the argument that the instructional strategy of schools is an important mechanism in generating educational inequality through the stratification of learning opportunities.......Research in the sociology of education argues that the educational system provides different learning opportunities for students with different socioeconomic backgrounds and that this circumstance makes the educational process an important institutional context for the reproduction of educational...

  8. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  9. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  10. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  11. Increasing instruction time in school does increase learning

    DEFF Research Database (Denmark)

    Andersen, Simon Calmar; Humlum, Maria; Nandrup, Anne Brink

    2016-01-01

    Increasing instruction time in school is a central element in the attempts of many governments to improve student learning, but prior research—mainly based on observational data—disputes the effect of this approach and points out the potential negative effects on student behavior. Based on a large......-scale, cluster-randomized trial, we find that increasing instruction time increases student learning and that a general increase in instruction time is at least as efficient as an expert-developed, detailed teaching program that increases instruction with the same amount of time. These findings support the value...... of increased instruction time....

  12. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  13. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  14. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  15. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  16. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  17. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  18. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  19. Beyond the Initiatives: Developing instructional leadership in school principals as a system-wide effort to improve the quality of classroom instruction.

    OpenAIRE

    Aguilera, Sondra Denise

    2016-01-01

    This design research effort implemented a series of intervention activities designed to support a small group of elementary school principals improve their instructional leadership practices. The purpose of this research was to improve the skills of principals to lead instructional improvements identified through classroom observations, work with their school-level Instructional Leadership Team (ILT) to create teacher professional development that addresses the instructional improvement, and ...

  20. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  1. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  2. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  3. Poster session in instructional technology course

    Science.gov (United States)

    Diniaty, Artina; Fauzi'ah, Lina; Wulan Febriana, Beta; Arlianty, Widinda Normalia

    2017-12-01

    Instructional technology course must be studied by students in order to 1) understand the role of technology in learning, 2) capable of analyzing advantages and disadvantages of using technology in teaching, 3) capable of performing technology in teaching. A poster session in instructional technology course was performed to 1) enhance students' interest in this course and develop students' creativity. The step of this research includes: planning, implementation, and evaluation. The result showed that students' responses towards poster session in instructional technology course were good.

  4. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  5. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  6. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  7. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  8. 32 CFR 1285.4 - Responsibilities.

    Science.gov (United States)

    2010-07-01

    ... Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS DEFENSE LOGISTICS AGENCY FREEDOM OF INFORMATION ACT PROGRAM § 1285.4 Responsibilities. (a) The Staff Director... program, providing guidance and instructions to PLFA's and PSE's. (2) Designates a FOIA manager to...

  9. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  10. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  11. Multimodal versus Unimodal Instruction in a Complex Learning Context.

    Science.gov (United States)

    Gellevij, Mark; van der Meij, Hans; de Jong, Ton; Pieters, Jules

    2002-01-01

    Compared multimodal instruction with text and pictures with unimodal text-only instruction as 44 college students used a visual or textual manual to learn a complex software application. Results initially support dual coding theory and indicate that multimodal instruction led to better performance than unimodal instruction. (SLD)

  12. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  13. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  14. Completion processing for data communications instructions

    Science.gov (United States)

    Blocksome, Michael A; Kumar, Sameer; Parker, Jeffrey J

    2014-05-20

    Completion processing of data communications instructions in a distributed computing environment, including receiving, in an active messaging interface (`AMI`) data communications instructions, at least one instruction specifying a callback function; injecting into an injection FIFO buffer of a data communication adapter, an injection descriptor, each slot in the injection FIFO buffer having a corresponding slot in a pending callback list; listing in the pending callback list any callback function specified by an instruction, incrementing a pending callback counter for each listed callback function; transferring payload data as per each injection descriptor, incrementing a transfer counter upon completion of each transfer; determining from counter values whether the pending callback list presently includes callback functions whose data transfers have been completed; calling by the AMI any such callback functions from the pending callback list, decrementing the pending callback counter for each callback function called.

  15. Collaboration Mechanism for Equipment Instruction of Multiple Energy Systems

    Science.gov (United States)

    Wang, Dong; Wang, Tuo; Wang, Qi; Zhang, Zhao; Zhao, Mingyu; Wang, Yinghui

    2018-01-01

    When multiple energy systems execute optimization instructions simultaneously, and the same equipment is Shared, the instruction conflict may occur. Aiming at the above problems, taking into account the control objectives of each system, the characteristics of different systems, such as comprehensive clean energy, energy efficiency, and peak filling, etc., designed the instruction coordination mechanism for the daemon. This mechanism mainly acts on the main station of the system, and form a final optimization instruction. For some specific scenarios, the collaboration mechanism of unlocking the terminal is supplemented. The mechanism determines the specific execution instructions based on the arrival time of the instruction. Finally, the experiment in Tianjin eco-city shows that this algorithm can meet the instruction and collaboration requirements of multi-energy systems, and ensure the safe operation of the equipment.

  16. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  17. Computer-Supported Instruction in Enhancing the Performance of Dyscalculics

    Science.gov (United States)

    Kumar, S. Praveen; Raja, B. William Dharma

    2010-01-01

    The use of instructional media is an essential component of teaching-learning process which contributes to the efficiency as well as effectiveness of the teaching-learning process. Computer-supported instruction has a very important role to play as an advanced technological instruction as it employs different instructional techniques like…

  18. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  19. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  20. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  1. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  2. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  3. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  4. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  5. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  6. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  7. Teacher’s Instructional Behaviour in Instructional Management at Elementary School Reviewed from Piaget’s Cognitive Development Theory

    Directory of Open Access Journals (Sweden)

    Eni Astuti Ni Putu

    2018-01-01

    Full Text Available This writing aimed at (1 describing the importance of teacher to review instructional management at elementary school based on Piaget’s cognitive development theory; and (2 describing teacher’s instructional behavior in managing instructional at elementary school reviewed from Piaget’s cognitive development theory. In general, Piaget’ cognitive development theory divides children’ cognitive development into four stages. In the elementary school ages of 7 to 11 or 12 years old, Piaget classified the cognitive development into concrete operational marked by the use of clear and logic rules. The children implement logic thinking on concrete object, yet abstract or hypothetical. Although the intelligence of this step has been advanced, the way of thinking of the children is still limited because still based on concrete object. Therefore, teacher should comprehend the importance of concrete operational instructional at elementary school so the children could maximally achieve the learning goal in accordance to their thinking level that they acquire. The suggestion that can be proposed is that the teacher should synergize the characteristics of elementary school students in concrete operational stage with the instructional readiness in the steps of planning, implementation and evaluation.

  8. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  9. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  10. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  11. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  12. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  13. Using assessment to individualize early mathematics instruction.

    Science.gov (United States)

    Connor, Carol McDonald; Mazzocco, Michèle M M; Kurz, Terri; Crowe, Elizabeth C; Tighe, Elizabeth L; Wood, Taffeta S; Morrison, Frederick J

    2018-02-01

    Accumulating evidence suggests that assessment-informed personalized instruction, tailored to students' individual skills and abilities, is more effective than more one-size-fits-all approaches. In this study, we evaluate the efficacy of Individualizing Student Instruction in Mathematics (ISI-Math) compared to Reading (ISI-Reading) where classrooms were randomly assigned to ISI-Math or ISI-Reading. The literature on child characteristics X instruction or skill X treatment interaction effects point to the complexities of tailoring instruction for individual students who present with constellations of skills. Second graders received mathematics instruction in small flexible learning groups based on their assessed learning needs. Results of the study (n=32 teachers, 370 students) revealed significant treatment effects on standardized mathematics assessments. With effect sizes (d) of 0.41-0.60, we show that we can significantly improve 2nd graders' mathematics achievement, including for children living in poverty, by using assessment data to individualize the mathematics instruction they receive. The instructional regime, ISI-Math, was implemented by regular classroom teachers and it led to about a 4-month achievement advantage on standardized mathematics tests when compared to students in control classrooms. These results were realized within one school year. Moreover, treatment effects were the same regardless of school-level poverty and students' gender, initial mathematics or vocabulary scores. Copyright © 2017 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  14. Technology for Early Braille Literacy: Comparison of Traditional Braille Instruction and Instruction with an Electronic Notetaker

    Science.gov (United States)

    Bickford, James O.; Falco, Ruth A.

    2012-01-01

    Introduction: The study reported here evaluated whether there was a difference in students' outcomes for braille fluency when instruction was provided with traditional braille media or refreshable braille. Students' and teachers' perceptions of the efficacy of the use of the different instructional media were analyzed. Methods: Nine students from…

  15. Case-Based Instructional Practices: A Multiple-Case Study from Torts, Marketing, and Online Instructional Design Classes

    Science.gov (United States)

    Jung, Ji yoon

    2017-01-01

    The purpose of this study is to provide a comprehensive account on case-based instructional practices. Semester-long participant observation records in torts, marketing, and online instructional design classes, instructor interviews, course syllabi and teaching materials were used to describe the within-class complexity of the practices in terms…

  16. 30 CFR 48.28 - Annual refresher training of miners; minimum courses of instruction; hours of instruction.

    Science.gov (United States)

    2010-07-01

    ... in accident prevention in the work environment. (8) Health. The course shall include instruction on... night work. The course shall include, where applicable, a review and instruction on the highwall and... hazards, pits, and spoil banks; the illumination of work areas; and safe work procedures during hours of...

  17. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  18. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  19. Instructional Coaching Implementation: Considerations for K-12 Administrators

    Science.gov (United States)

    Johnson, Kelly Gomez

    2016-01-01

    Instructional coaching is a reality in many schools today, yet administrators often lack experience or background on how to utilize this professional development model effectively. Instructional coaching can help administrators balance the managerial and instructional leadership responsibilities required of their role. As districts adopt the…

  20. Description of Success: A Four-Teacher Instructional Model.

    Science.gov (United States)

    Reed, Dianne

    This study described a four-teacher instructional model in operation at an elementary school, noting the perceptions of fourth grade students, parents, and teachers regarding the model. The model encompassed teaming, block scheduling, departmentalization of subjects, integrated/interdisciplinary instruction, and in-depth instruction in each…

  1. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  2. Instructional Partnerships: A Pathway to Leadership

    Science.gov (United States)

    Moreillon, Judi, Ed.; Ballard, Susan, Ed.

    2013-01-01

    In this Best of "Knowledge Quest" monograph, the editors have collected seminal articles to support pre-service and in-service school librarians in developing and strengthening the instructional partner role. "Instructional Partnerships: A Pathway to Leadership" provides readers with background knowledge, research-based…

  3. Motivational Design in Information Literacy Instruction

    Science.gov (United States)

    Hess, Amanda Nichols

    2015-01-01

    Motivational design theory complements instructional design theory and, when used together, both principles can affect learning, knowledge acquisition, and knowledge retention. In information literacy instruction, motivational design exists throughout the appropriate standards documents. However, there is limited current research on the best…

  4. Multimedia Instruction Initiative: Building Faculty Competence.

    Science.gov (United States)

    Haile, Penelope J.

    Hofstra University began a university-wide initiative to enhance classroom instruction with multimedia technology and foster collaborative approaches to learning. The Multimedia Instruction Initiative emphasized teamwork among faculty, students, and computer center support staff to develop a technology-enriched learning environment supported by…

  5. Investigating Comprehension in Real World Tasks: Understanding Jury Instructions.

    Science.gov (United States)

    Charrow, Veda R.; Charrow, Robert

    This paper discusses the results of part of an ongoing project studying an aspect of real world language usage, the comprehension of standard jury instructions. Problems in the comprehension of these instructions include the memory load that they impose, the fact that most instructions are read only once, and the fact that instructions are written…

  6. CCP-NAP operator instructions at ANL

    International Nuclear Information System (INIS)

    Tantillo, V.V.

    1986-03-01

    CCP-NAP Operator Instructions at ANL (ANL/TM 435) supplements the CCPGUIDE (Category 26) prepared by the National Magnetic Fusion Energy Computer Center (NMFECC), Lawrence Livermore National Laboratory. The instructions in CCP-NAP Operator Instructions at ANL serve as a reference guide for Computing Services operators when operator intervention is necessary for ANL's MFEnet Nodes located in Building 221, Room A-134. Use this document in conjunction with the CCPGUIDE. The CCPGUIDE, a guide for network operators, outlines the procedures for loading the Communications Control Processor (CCP) and monitoring its activity. The CCPGUIDE contains detailed information on Software Loading, System Status, System Monitoring, Command Summary, etc. The material in this document is the result of additional information provided by Jim Morton and Jim Gigliaridi (NMFECC) when our Argonne National Laboratory/Computing Services MFEnet Nodes were installed. This document provides two formats: QUICK instructions and procedures, and detailed general text

  7. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  8. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  9. Effective Multicultural Instruction

    Directory of Open Access Journals (Sweden)

    Franklin T. Thompson

    2014-02-01

    Full Text Available The reason why the Trayvon Martin murder trial and similar court cases create a philosophical rift in our nation is due in part to flaws in the delivery of multicultural education. Traditional multicultural instruction does not prepare citizens for the subtleties and complexities of race relations. This study investigates critical strategies and practices that address multicultural missing gaps. I also seek to fill a void in the literature created by a lack of student input regarding teaching strategies that encourage lifelong learning. Students (N = 337 enrolled at a Midwestern university were asked to rate the efficacy of selected instructional strategies. Utilizing a 9-point Likert-type scale, students gave themselves a personal growth rating of 7.15 (SD = 1.47. Variables important to predicting that growth (R2 = .56, p < .0005 were a six-factor variable known as a non-color-blind instructional approach (t = 10.509, p ≤ .0005, allowing students an opportunity to form their own opinions apart from the instructor (t = 4.797, p ≤ .0005, and a state law that mandated multicultural training (t = 3.234, p = .001. Results demonstrated that utilizing a 35% traditional and 65% critical pedagogy mixture when teaching multicultural education helped promote win/win scenarios for education candidates hoping to become difference makers.

  10. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  11. Connecting Effective Instruction and Technology. Intel-elebration: Safari.

    Science.gov (United States)

    Burton, Larry D.; Prest, Sharon

    Intel-ebration is an attempt to integrate the following research-based instructional frameworks and strategies: (1) dimensions of learning; (2) multiple intelligences; (3) thematic instruction; (4) cooperative learning; (5) project-based learning; and (6) instructional technology. This paper presents a thematic unit on safari, using the…

  12. 10 CFR 71.111 - Instructions, procedures, and drawings.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Instructions, procedures, and drawings. 71.111 Section 71... MATERIAL Quality Assurance § 71.111 Instructions, procedures, and drawings. The licensee, certificate..., procedures, or drawings of a type appropriate to the circumstances and shall require that these instructions...

  13. Textual motivational elements in cell phone user instructions

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Torrance, M.; Alamargot, D.

    2012-01-01

    For a long time, user instructions were considered as purely instrumental documents: Instructions had to enable readers to perform tasks with an accompanying device. And even though this still remains the main purpose of user instructions, views on how to accomplish this have changed over the years.

  14. Millennial Instructional Preferences in Post-Secondary Business Programs

    Science.gov (United States)

    West, Cynthia Elaine

    2017-01-01

    The purpose of this mixed method study was to examine the instructional preferences of millennial learners and how their instructional preferences affect their choice in post-secondary business programs. The instructional preferences of millennial learners are an important question for post-secondary business programs enrolling learners from…

  15. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  16. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  17. The Effectiveness of Web-Based Instruction: An Initial Inquiry

    Directory of Open Access Journals (Sweden)

    Tatana M. Olson

    2002-10-01

    Full Text Available As the use of Web-based instruction increases in the educational and training domains, many people have recognized the importance of evaluating its effects on student outcomes such as learning, performance, and satisfaction. Often, these results are compared to those of conventional classroom instruction in order to determine which method is “better.” However, major differences in technology and presentation rather than instructional content can obscure the true relationship between Web-based instruction and these outcomes. Computer-based instruction (CBI, with more features similar to Web-based instruction, may be a more appropriate benchmark than conventional classroom instruction. Furthermore, there is little consensus as to what variables should be examined or what measures of learning are the most appropriate, making comparisons between studies difficult and inconclusive. In this article, we review the historical findings of CBI as an appropriate benchmark to Web-based instruction. In addition, we review 47 reports of evaluations of Web-based courses in higher education published between 1996 and 2002. A tabulation of the documented findings into eight characteristics is offered, along with our assessments of the experimental designs, effect sizes, and the degree to which the evaluations incorporated features unique to Web-based instruction.

  18. Storytelling as an Instructional Method: Research Perspectives (Modeling and Simulations for Learning and Instruction)

    Science.gov (United States)

    2010-01-01

    told. In fact, storytelling does not stop in the classroom or in a formal training setting. Much of the culture and tradition of the military is passed...2010 2. REPORT TYPE Book 3. DATES COVERED 08-11-2006 to 31-12-2009 4. TITLE AND SUBTITLE Storytelling as an Instructional Method Research...better instructional storytelling because military instructors have historically relied heavily on that technique. One of the workshops major goals was

  19. Direct Vocabulary Instruction in Preschool: A Comparison of Extended Instruction, Embedded Instruction, and Incidental Exposure

    Science.gov (United States)

    Loftus-Rattan, Susan M.; Mitchell, Alison M.; Coyne, Michael D.

    2016-01-01

    Based on its coincidence with a significant period in language development for children, preschool provides a favorable setting to foster vocabulary growth. The purpose of this study was to evaluate the effectiveness of two instructional conditions and an incidental exposure condition for teaching targeted vocabulary words to preschool students…

  20. Special Plans and Operations: Assessment of Allegations Concerning Traumatic Brain Injury Research Integrity in Iraq

    Science.gov (United States)

    2011-03-31

    agency-specific (DoDI 3210.7) defmitions of research misconduct which include falsification, fabrication and plagiarism . Our Response We acknowledge...Research Education, and Research Misconduct," June 25, 2009, dermes research misconduct as the "fabrication, falsification, or plagiarism in proposing...research ethics have developed from diverse historical sources, but coalesce around four general areas of academic professional commitment: l.a

  1. How Instructional Systems Will Manage Learning

    Science.gov (United States)

    Flanagan, John C.

    1970-01-01

    Discusses trends toward the systems approach in education including the development of effective instructional systems in government and industry; the introduction of teaching machines, programed learning, and computer- assisted instruction; and the increase in both the amount and sophistication of educational research and development. (JF)

  2. Thread extraction for polyadic instruction sequences

    NARCIS (Netherlands)

    Bergstra, J.; Middelburg, C.

    2011-01-01

    In this paper, we study the phenomenon that instruction sequences are split into fragments which somehow produce a joint behaviour. In order to bring this phenomenon better into the picture, we formalize a simple mechanism by which several instruction sequence fragments can produce a joint

  3. Instructional Strategy: Administration of Injury Scripts

    Science.gov (United States)

    Schilling, Jim

    2016-01-01

    Context: Learning how to form accurate and efficient clinical examinations is a critical factor in becoming a competent athletic training practitioner, and instructional strategies differ for this complex task. Objective: To introduce an instructional strategy consistent with complex learning to encourage improved efficiency by minimizing…

  4. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  5. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  6. Influence of verbal instructions on effect-based action control.

    Science.gov (United States)

    Eder, Andreas B; Dignath, David

    2017-03-01

    According to ideomotor theory, people use bidirectional associations between movements and their effects for action selection and initiation. Our experiments examined how verbal instructions of action effects influence response selection without prior experience of action effects in a separate acquisition phase. Instructions for different groups of participants specified whether they should ignore, attend, learn, or intentionally produce acoustic effects produced by button presses. Results showed that explicit instructions of action-effect relations trigger effect-congruent action tendencies in the first trials following the instruction; in contrast, no evidence for effect-based action control was observed in these trials when instructions were to ignore or to attend to the action effects. These findings show that action-effect knowledge acquired through verbal instruction and direct experience is similarly effective for effect-based action control as long as the relation between the movement and the effect is clearly spelled out in the instruction.

  7. Tritium control and accountability instructions

    International Nuclear Information System (INIS)

    Wall, W.R.; Cruz, S.L.

    1985-08-01

    This instruction describes the tritium accountability procedures practiced by the Tritium Research Laboratory, at Sandia National Laboratories, Livermore. The accountability procedures are based upon the Sandia National Laboratories, Livermore, Nuclear Materials Operations Manual, SAND83-8036. The Nuclear Materials Operations Manual describes accountability techniques which are in compliance with the Department of Energy 5630 series Orders, Code of Federal Regulations, and Sandia National Laboratories Instructions

  8. Tritium control and accountability instructions

    International Nuclear Information System (INIS)

    Wall, W.R.

    1981-03-01

    This instruction describes the tritium accountability procedures practiced by the Tritium Research Laboratory, Building 968 at Sandia National Laboratories, Livermore. The accountability procedures are based upon the Sandia National Laboratories, Livermore, Nuclear Materials Operations Manual, SAND78-8018. The Nuclear Materials Operations Manual describes accountability techniques which are in compliance with the Department of Energy Manual, Code of Federal Regulations, and Sandia National Laboratories Instructions

  9. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  10. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  11. 10 CFR 72.150 - Instructions, procedures, and drawings.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Instructions, procedures, and drawings. 72.150 Section 72... WASTE Quality Assurance § 72.150 Instructions, procedures, and drawings. The licensee, applicant for a... documented instructions, procedures, or drawings of a type appropriate to the circumstances and shall require...

  12. A Survey of Grammar Instruction from Scholastic Perspective

    Science.gov (United States)

    Peng, Yanghua

    2017-01-01

    The study of grammar has been paid much attention and the grammar instruction becomes an emphasis and key problem in English language teaching and learning. How to instruct students grammar appropriately becomes controversial for some English teachers increasingly. Some linguistics, theorists and teachers hold that the grammar instruction should…

  13. Student-Centered Instruction in a Theoretical Statistics Course

    Science.gov (United States)

    Bates Prins, Samantha C.

    2009-01-01

    This paper provides an example of how student-centered instruction can be used in a theoretical statistics class. The author taught a two-semester undergraduate probability and mathematical statistics sequence using primarily teacher-centered instruction in the first semester and primarily student-centered instruction in the second semester. A…

  14. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  15. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  16. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  17. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  18. Engine Fundamentals: Automotive Mechanics Instructional Program. Block 2.

    Science.gov (United States)

    O'Brien, Ralph D.

    The second of six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in engine fundamentals at the secondary and postsecondary level. The material, as organized, is a suggested sequence of instruction within each block. Each lesson…

  19. 25 CFR 67.15 - Special instructions.

    Science.gov (United States)

    2010-04-01

    ... Area Director, the Assistant Secretary may issue special instructions not inconsistent with the... 25 Indians 1 2010-04-01 2010-04-01 false Special instructions. 67.15 Section 67.15 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR TRIBAL GOVERNMENT PREPARATION OF A ROLL OF INDEPENDENT...

  20. Understanding instructions for oral rehydration therapy.

    Science.gov (United States)

    Eisemon, T O; Patel, V L

    1989-01-01

    Oral rehydration mixtures are readily available in rural Kenya, but the instructions that accompany them are not always clear. Mothers will understand such instructions more readily if they explain the principles of oral rehydration and describe in a logical way the sequence of procedures to be followed.

  1. Text-Picture Relations in Cooking Instructions

    NARCIS (Netherlands)

    van der Sluis, Ielka; Leito, Shadira; Redeker, Gisela; Bunt, Harry

    2016-01-01

    Like many other instructions, recipes on packages with ready-to-use ingredients for a dish combine a series of pictures with short text paragraphs. The information presentation in such multimodal instructions can be compact (either text or picture) and/or cohesive (text and picture). In an

  2. Instructional Leadership in Elementary School Science

    Science.gov (United States)

    Sherman, Ann; MacDonald, Leo

    2008-01-01

    Instructional leadership is internationally recognized as being a key role for school administrators to advance in their relationships with teachers. But what happens when a principal lacks content knowledge or specific pedagogical knowledge about certain curriculum areas? How do administrators support instructional practices of teachers who teach…

  3. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  4. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  5. Attentional Focusing Instructions and Force Production

    Directory of Open Access Journals (Sweden)

    David C Marchant

    2011-01-01

    Full Text Available Research progress assessing the role of attentional focusing instructions on skill acquisition and performance has lead researchers to apply this approach to force production tasks. Initial converging evidence indicates that force production tasks are sensitive to verbal instruction; externally focused instructions (onto movement outcomes, or onto the object force is being exerted against are shown to be more beneficial than internally focused instructions (focusing attention onto the movements being executed. These benefits are observed for maximal and accurate force production, as well as the maintenance of force production in prolonged tasks. A range of mechanisms are identified supporting the proposal that an external focus promotes movement efficiency in line with energy and effort conservation. Future research is required to assess how this developing body of work interacts with the broader understanding of psychological and physiological factors implicated in the effective production, maintenance and limitation of maximal or sub-maximal forces.

  6. Ethics instruction in the dental hygiene curriculum.

    Science.gov (United States)

    Kacerik, Mark G; Prajer, Renee G; Conrad, Cynthia

    2006-01-01

    Dental hygiene ethics is an essential component of the dental hygiene curriculum. The accreditation standards for dental hygiene education state that graduates must be competent in applying ethical concepts to the provision and/or support of oral health care services. Although the standards for entry into the profession of dental hygiene emphasize the importance of ethical reasoning, there is little published research specific to ethics instruction in dental hygiene programs. The purpose of this study was to assess how ethics is taught in the dental hygiene curriculum. A 17-item survey was designed and distributed to 261 accredited dental hygiene programs in the United States for a response rate of 56% (N=147). The survey requested that participants provide information on teaching and evaluation methodologies, didactic and clinical hours of instruction, individuals responsible for providing instruction, and the degree of emphasis placed on ethics and integration of ethical reasoning within the dental hygiene curriculum. Results of the survey reflect that dental hygiene programs devote a mean of 20. hours to teaching dental hygiene ethics in the didactic component of the curriculum. With regard to the clinical component of the curriculum, 63% of respondents indicated that 10 or less hours are devoted to ethics instruction. These results show an increase in didactic hours of instruction from previous studies where the mean hours of instruction ranged from 7 to 11.7 hours. Results showed 64% of respondents offered a separate course in ethics; however, 82% of programs surveyed indicated that ethics was incorporated into one or more dental hygiene courses with 98% utilizing dental hygiene faculty to provide instruction. Most programs utilized a variety of instructional methods to teach ethics with the majority employing class discussion and lecture (99% and 97% respectively). The type of institution-technical college, community college, four-year university with a

  7. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    Science.gov (United States)

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  8. Resource Letter ALIP-1: Active-Learning Instruction in Physics

    Science.gov (United States)

    Meltzer, David E.; Thornton, Ronald K.

    2012-06-01

    This Resource Letter provides a guide to the literature on research-based active-learning instruction in physics. These are instructional methods that are based on, assessed by, and validated through research on the teaching and learning of physics. They involve students in their own learning more deeply and more intensely than does traditional instruction, particularly during class time. The instructional methods and supporting body of research reviewed here offer potential for significantly improved learning in comparison to traditional lecture-based methods of college and university physics instruction. We begin with an introduction to the history of active learning in physics in the United States, and then discuss some methods for and outcomes of assessing pedagogical effectiveness. We enumerate and describe common characteristics of successful active-learning instructional strategies in physics. We then discuss a range of methods for introducing active-learning instruction in physics and provide references to those methods for which there is published documentation of student learning gains.

  9. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  10. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  11. Language used in interaction during developmental science instruction

    Science.gov (United States)

    Avenia-Tapper, Brianna

    The coordination of theory and evidence is an important part of scientific practice. Developmental approaches to instruction, which make the relationship between the abstract and the concrete a central focus of students' learning activity, provide educators with a unique opportunity to strengthen students' coordination of theory and evidence. Therefore, developmental approaches may be a useful instructional response to documented science achievement gaps for linguistically diverse students. However, if we are to leverage the potential of developmental instruction to improve the science achievement of linguistically diverse students, we need more information on the intersection of developmental science instruction and linguistically diverse learning contexts. This manuscript style dissertation uses discourse analysis to investigate the language used in interaction during developmental teaching-learning in three linguistically diverse third grade classrooms. The first manuscript asks how language was used to construct ascension from the abstract to the concrete. The second manuscript asks how students' non-English home languages were useful (or not) for meeting the learning goals of the developmental instructional program. The third manuscript asks how students' interlocutors may influence student choice to use an important discourse practice--justification--during the developmental teaching-learning activity. All three manuscripts report findings relevant to the instructional decisions that teachers need to make when implementing developmental instruction in linguistically diverse contexts.

  12. Tune Up: Automotive Mechanics Instructional Program. Block 5.

    Science.gov (United States)

    O'Brien, Ralph D.

    The fifth of six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in automotive tune-ups at the secondary and post secondary level. The material, as organized, is a suggested sequence of instruction within each block. Each lesson…

  13. Fuel System: Automotive Mechanics Instructional Program. Block 4.

    Science.gov (United States)

    O'Brien, Ralph D.

    The fourth of six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in automotive fuel systems at the secondary and post secondary level. The material, as organized, is a suggested sequence of instruction within each block. Each…

  14. Cooling System: Automotive Mechanics Instructional Program. Block 6.

    Science.gov (United States)

    O'Brien, Ralph D.

    The last of six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in the automotive cooling system at the secondary and post secondary level. The material, as organized, is a suggested sequence of instruction within each block. Each…

  15. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  16. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  17. Rating Instructional Conversations: A Guide

    OpenAIRE

    Rueda, Robert; Goldenberg, Claude; Gallimore, Ronald

    1992-01-01

    The current focus on more effective ways to foster literacy in school-age children, especially language minority students, has led to the development of alternative instructional approaches. One such approach is the instructional conversation (IC), based on early work in the Hawaiian Kamehameha Elementary Education Project (KEEP), on neo-Vygotskian theory, and on recent classroom-based research on reading comprehension. The present report outlines preliminary efforts to operationaliz...

  18. 25 CFR 61.15 - Special instructions.

    Science.gov (United States)

    2010-04-01

    ... Secretary may issue special instructions not inconsistent with the regulations in this part 61. ... 25 Indians 1 2010-04-01 2010-04-01 false Special instructions. 61.15 Section 61.15 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR TRIBAL GOVERNMENT PREPARATION OF ROLLS OF INDIANS § 61...

  19. Handwriting Instruction in Elementary Schools: Revisited!

    Science.gov (United States)

    Asher, Asha; Estes, Joanne

    2016-01-01

    Handwriting is an essential literacy and communication skill developed through a variety of instructional methods in elementary school. This study explored the consistency in handwriting instruction across grade levels in a Midwest public school district 15 years after the school initially implemented a uniform handwriting program. Additionally,…

  20. Effects of Instructions on False Recognition.

    Science.gov (United States)

    Mueller, John H.; And Others

    Four experiments were conducted to examine the effects of various processing instructions on the rate of false recognition. The continuous single-item procedure was used, and false recognitions of four types were examined: synonyms, antonyms, nonsemantic associates, and homonyms. The instructions encouraged subjects to think of associates, usages…

  1. Instructional Podcasting with Undergraduate Digital Natives

    Science.gov (United States)

    Thomas, Kevin M.; Willis, Dottie

    2013-01-01

    This paper analyzes the use of instructional podcasts with students in introductory computer application classes at a small, independent, private university. Participants were all undergraduates in the school of education. In an effort to model effective use of instructional technology for preservice teachers and to "meet digital native…

  2. Data-based decision making for instructional improvement in primary education

    NARCIS (Netherlands)

    Gelderblom, Gerrit; Schildkamp, Kim; Pieters, Julius Marie; Ehren, Melanie Catharina Margaretha

    2016-01-01

    Data-based decision making can help teachers improve their instruction. Research shows that instruction has a strong impact on students' learning outcomes. This study investigates whether Dutch primary school teachers use data to improve their instruction. Four aspects of instruction were

  3. An Analysis of Instructional Facilitators' Relationships with Teachers and Principals

    Science.gov (United States)

    Range, Bret G.; Pijanowski, John C.; Duncan, Heather; Scherz, Susan; Hvidston, David

    2014-01-01

    This study examines the perspectives of Wyoming instructional facilitators, concerning three coaching constructs--namely, their instructional leadership roles, teachers' instructional practices, and the support that they receive from principals and teachers. Findings suggest that instructional facilitators were positive about their instructional…

  4. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  5. Instructional decision making of high school science teachers

    Science.gov (United States)

    Carver, Jeffrey S.

    The instructional decision-making processes of high school science teachers have not been well established in the literature. Several models for decision-making do exist in other teaching disciplines, business, computer game programming, nursing, and some fields of science. A model that incorporates differences in science teaching that is consistent with constructivist theory as opposed to conventional science teaching is useful in the current climate of standards-based instruction that includes an inquiry-based approach to teaching science. This study focuses on three aspects of the decision-making process. First, it defines what factors, both internal and external, influence high school science teacher decision-making. Second, those factors are analyzed further to determine what instructional decision-making processes are articulated or demonstrated by the participants. Third, by analyzing the types of decisions that are made in the classroom, the classroom learning environments established as a result of those instructional decisions are studied for similarities and differences between conventional and constructivist models. While the decision-making process for each of these teachers was not clearly articulated by the teachers themselves, the patterns that establish the process were clearly exhibited by the teachers. It was also clear that the classroom learning environments that were established were, at least in part, established as a result of the instructional decisions that were made in planning and implementation of instruction. Patterns of instructional decision-making were different for each teacher as a result of primary instructional goals that were different for each teacher. There were similarities between teachers who exhibited more constructivist epistemological tendencies as well as similarities between teachers who exhibited a more conventional epistemology. While the decisions that will result from these two camps may be different, the six step

  6. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  7. Teaching and Learning Geometry in Drama Based Instruction

    Science.gov (United States)

    Ubuz, Behiye; Duatepe-Paksu, Asuman

    2016-01-01

    This paper explains what drama-based instruction is and offers insights into the phases in drama-based instruction. Further, examples of drama-based lessons in geometry related to ring and circle, and altitude of a triangle together with the teacher and students perceptions related to the strengths and limitations of drama based instruction in…

  8. Designing Technology-Enabled Instruction to Utilize Learning Analytics

    Science.gov (United States)

    Davies, Randall; Nyland, Robert; Bodily, Robert; Chapman, John; Jones, Brian; Young, Jay

    2017-01-01

    A key notion conveyed by those who advocate for the use of data to enhance instruction is an awareness that learning analytics has the potential to improve instruction and learning but is not currently reaching that potential. Gibbons (2014) suggested that a lack of learning facilitated by current technology-enabled instructional systems may be…

  9. Designing Instructional Strategies which Facilitate Learning for Mastery.

    Science.gov (United States)

    Anderson, Lorin W.; Jones, Beau Fly

    The "state of the craft" of instruction within the context of the mastery learning model is discussed. Little has been said in the past about specific instructional strategies that are applicable to particular instructional units or objectives, or to the daily classroom life of teachers. This paper is organized into six major sections. The first…

  10. Effects of multimedia vocabulary instruction on adolescents with learning disabilities.

    Science.gov (United States)

    Kennedy, Michael J; Deshler, Donald D; Lloyd, John Wills

    2015-01-01

    The purpose of this experimental study is to investigate the effects of using content acquisition podcasts (CAPs), an example of instructional technology, to provide vocabulary instruction to adolescents with and without learning disabilities (LD). A total of 279 urban high school students, including 30 with LD in an area related to reading, were randomly assigned to one of four experimental conditions with instruction occurring at individual computer terminals over a 3-week period. Each of the four conditions contained different configurations of multimedia-based instruction and evidence-based vocabulary instruction. Dependent measures of vocabulary knowledge indicated that students with LD who received vocabulary instruction using CAPs through an explicit instructional methodology and the keyword mnemonic strategy significantly outperformed other students with LD who were taught using the same content, but with multimedia instruction that did not adhere to a specific theoretical design framework. Results for general education students mirrored those for students with LD. Students also completed a satisfaction measure following instruction with multimedia and expressed overall agreement that CAPs are useful for learning vocabulary terms. © Hammill Institute on Disabilities 2013.

  11. Instructional games in allied health education.

    Science.gov (United States)

    Meyer, M A

    1980-08-01

    A theoretical framework and practical suggestions for incorporating games and simulation into allied health instruction are presented. Research findings that support the use of educational simulation/games as a tool for higher cognitive learning are discussed. Examples and step-by-step instructions are given to help allied health educatiors and students write their own simulation games, try them out, evaluate them, and incorporate them into classroom use to stimulate interaction. Advantages of using educational simulation/games in allied health education as well as possible disadvantages of this teaching strategy are discussed. Use of instructional games to enhance teaching effectiveness as measured by student achievement in the allied health fields is emphasized.

  12. Making the Most of Instructional Coaches

    Science.gov (United States)

    Kane, Britnie Delinger; Rosenquist, Brooks

    2018-01-01

    Although coaching holds great promise for professional development, instructional coaches are often asked to take on responsibilities that are not focused on improving instruction. The authors discuss a quantitative study of four school districts and a qualitative analysis of a single district that, together, reveal how hiring practices and school…

  13. Preparing Instructional Objectives: Agony or Ecstasy?

    Science.gov (United States)

    Roberts, Wesley K.

    This paper 1) discusses the problems encountered in preparing objectives for instructional programs; 2) describes an informal research project in which seven instructional designers working on the same project attempted to determine agreement on an objective; and 3) suggests how to prepare objectives so that difficulties can be minimized. One…

  14. Instructional Technology in the Armed Forces.

    Science.gov (United States)

    Hitchens, Howard B., Jr.

    Broad areas of communications media used in technical training in specific occupational skills within the armed forces are examined in the first part of this report. These areas include: traditional audiovisual media, television, the techniques of programed instruction and instructional systems development, and the use of computers. In the second…

  15. Web-Based Instruction (WBI): An Introduction.

    Science.gov (United States)

    Khan, Badrul H.

    1998-01-01

    Advances in information technology, coupled with changes in society, are creating new paradigms for education. The Web, as a medium of learning and instruction, has the potential to support the creation of well-designed resources. A table of features and components associated with Web-based instruction learning environments is provided.…

  16. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  17. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  18. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  19. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  20. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  1. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  2. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  3. Towards a Person-Centered Model of Instruction: Can An Emphasis on the Personal Enhance Instruction in Cyberspace?

    Science.gov (United States)

    Miller, Christopher; Mazur, Joan M.

    2001-01-01

    A person-centered instructional design model was developed for virtual, Web-based environments, based on the work of Carl Rogers. This model attempts to address several issues raised in the literature. A person-centered instructional model is described and contrasted with instructionalist and constructivist approaches. Theoretical and practical…

  4. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  5. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  6. Inquiry-Based Instruction and High Stakes Testing

    Science.gov (United States)

    Cothern, Rebecca L.

    Science education is a key to economic success for a country in terms of promoting advances in national industry and technology and maximizing competitive advantage in a global marketplace. The December 2010 Program for International Student Assessment (PISA) ranked the United States 23rd of 65 countries in science. That dismal standing in science proficiency impedes the ability of American school graduates to compete in the global market place. Furthermore, the implementation of high stakes testing in science mandated by the 2007 No Child Left Behind (NCLB) Act has created an additional need for educators to find effective science pedagogy. Research has shown that inquiry-based science instruction is one of the predominant science instructional methods. Inquiry-based instruction is a multifaceted teaching method with its theoretical foundation in constructivism. A correlational survey research design was used to determine the relationship between levels of inquiry-based science instruction and student performance on a standardized state science test. A self-report survey, using a Likert-type scale, was completed by 26 fifth grade teachers. Participants' responses were analyzed and grouped as high, medium, or low level inquiry instruction. The unit of analysis for the achievement variable was the student scale score average from the state science test. Spearman's Rho correlation data showed a positive relationship between the level of inquiry-based instruction and student achievement on the state assessment. The findings can assist teachers and administrators by providing additional research on the benefits of the inquiry-based instructional method. Implications for positive social change include increases in student proficiency and decision-making skills related to science policy issues which can help make them more competitive in the global marketplace.

  7. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  8. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  9. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  10. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  11. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  12. Instructional psychology and the design of training simulators

    International Nuclear Information System (INIS)

    Stammers, R.B.

    1985-01-01

    In this paper the role of instructional psychology in simulator design and use is discussed. It is suggested that research and development work has tended to focus upon the face validity of simulators rather than their instructional utility. Dimensions of simulation are reviewed as are the variety of uses to which a simulator may be put. The nature of instructional psychology is briefly described under the following headings: task analysis, the acquisition of knowledge and skill and theories of instruction. Attention is also given to the potential role of computer-based training and the topic of retention of training is introduced. (author)

  13. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  14. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  15. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  16. Processing Instruction: A Review of Issues

    Science.gov (United States)

    Rasuki, Muhlisin

    2017-01-01

    This paper provides a critical review of Processing Instruction (PI). This type of instructional option was specifically designed to help second/foreign language (L2) learners grasp meaning manifested in the use of particular grammatical forms in a target language effectively through the provision of input. In this way, PI attempts to help…

  17. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  18. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  19. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  20. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)