Sample records for defense instruction dodi

  1. 75 FR 66680 - Defense Federal Acquisition Regulation Supplement (DFARS); Continuation of Essential Contractor... (United States)


    ...-AG52 Defense Federal Acquisition Regulation Supplement (DFARS); Continuation of Essential Contractor... that contractors providing essential contractor services, as determined by the requiring activity..., implementing the requirements of DoDI 3020.37, Continuation of Essential DoD Contractor Services During Crises...

  2. Symposium by NATO Defense Research Group Panel VIII on Computer-Based Instruction in Military Environments

    CERN Document Server

    Weddle, Peter


    This collection of papers is the result of a symposium sponsored by NATO's Defense Research Group Panel VIII in the Spring of 1985. The symposium came into being when it became obvious to the NATO countries that research, development and utilization of advanced technologies for training was the best means of increasing both training effectiveness and efficiency. This symposium was the second in a series of three devoted to training. The series was structured to cover all aspects of training. The first series addressed the value of training, the second one dealt with the application of training technologies and the third and last of the series focused on academic issues concerned with the effect of prior learning on subsequent learning. The fact that a major American publisher has determined that computer based instruction is the technology of greatest interest to the NATO community is not surprising. Advances in microprocessor technology have revolutionized both how and where we train. During this symposium t...

  3. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling

    International Nuclear Information System (INIS)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid


    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  4. An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'

    Energy Technology Data Exchange (ETDEWEB)

    Campbell, Philip LaRoche


    The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

  5. Is Intellectual Property Theft? BI's Hidden Ideology...And Two Reactions [and] In Defense of the Bibliographic Process [and] In Defense of Instruction Librarians. (United States)

    Duff, Alistair S.; And Others


    Discusses the "hidden" ideology in traditional bibliographic instruction's treatment of intellectual property rights and copyright laws, and suggests that protection of these rights constitutes a form of stealing thoughts and ideas that should belong to the public. Reactions from two librarians who defend the current bibliographic…

  6. Computer Assisted Instruction (United States)

    Higgins, Paul


    Methodology for developing a computer assisted instruction (CAI) lesson (scripting, programing, and testing) is reviewed. A project done by Informatics Education Ltd. (IEL) for the Department of National Defense (DND) is used as an example. (JT)

  7. An Analysis of Factors Affecting Affiliation in the Marine Corps Reserves (United States)


    AR Active Reserve ASL Active Status List CC Continuance Commitment DODI Department of Defense Instruction DON Department of the Navy FFM ...turnover (Mobley, Griffeth, Hand, & Meglino, 1979). Other research on personality constructs use the five factor model ( FFM ) as a basis...Conscientiousness and emotional stability are two personality dimensions of the FFM , which are negatively correlated and useful predictors of voluntary turnover

  8. Recommendations for sampling for prevention of hazards in civil defense. On analytics of chemical, biological and radioactive contaminations. Brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling; Empfehlungen fuer die Probenahme zur Gefahrenabwehr im Bevoelkerungsschutz. Zur Analytik von chemischen, biologischen und radioaktiven Kontaminationen. Kurzanleitung fuer die CBRN-Probenahme

    Energy Technology Data Exchange (ETDEWEB)

    Bachmann, Udo; Biederbick, Walter; Derakshani, Nahid (and others)


    The recommendation for sampling for prevention of hazards in civil defense is describing the analytics of chemical, biological and radioactive contaminations and includes detail information on the sampling, protocol preparation and documentation procedures. The volume includes a separate brief instruction for the CBRN (chemical, biological, radioactive, nuclear) sampling.

  9. Department of Defense Facilities Energy Conservation Policies and Spending

    National Research Council Canada - National Science Library

    Andrews, Anthony


    .... This report reviews energy conservation legislation and Executive Orders that apply to the Department of Defense, directives and instructions to the military departments and agencies on implementing...

  10. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher


    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  11. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert


    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  12. Planetary Defense (United States)


    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  13. Defense Business Board (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  14. 32 CFR 884.17 - Commander's instruction letter to member. (United States)


    ... instruction letter to member. Subject: Instructions in Case of Release on Bail or Personal Recognizance 1. You... 32 National Defense 6 2010-07-01 2010-07-01 false Commander's instruction letter to member. 884.17... civilian custody on bail or on your own recognizance, report immediately in person or by telephone to the...

  15. Public Health Emergency Management Within the Department of Defense (United States)


    February 20071 (aa) DoD Instruction 1100.21, “ Voluntary Services in the Department of Defense,” March 11, 2002 (ab) DoD Instruction 5210.25...include eradication of disease, identification of affected animals, animal quarantine implementation, euthanasia , carcass disposal, cleaning and

  16. Defense Human Resources Activity > PERSEREC (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  17. Editorial - Instructions

    DEFF Research Database (Denmark)

    Kastberg, Peter; Grinsted, Annelise


    Why you may wonder - have we chosen a topic which at first glance may seem trivial, and even a bit dull? Well, looks can be deceiving, and in this case they are! There are many good reasons for taking a closer look at instructions.......Why you may wonder - have we chosen a topic which at first glance may seem trivial, and even a bit dull? Well, looks can be deceiving, and in this case they are! There are many good reasons for taking a closer look at instructions....

  18. Home - Defense Technology Security Administration (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  19. 32 CFR 632.6 - Administrative instructions. (United States)


    ... defense techniques. (ii) MP club. (iii) Individual chemical aerosol irritant projectors. (iv) Their assigned firearms. (b) Commanders will also— (1) Provide periodic refresher training to ensure continued... guards to receive instructions regarding use of force. (Give periodic refresher training to ensure...

  20. Ballistic missile defense effectiveness (United States)

    Lewis, George N.


    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  1. Optimizing Active Cyber Defense


    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei


    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  2. Instructional Partners, Principals, Teachers, and Instructional Assistants. (United States)

    Indiana State Dept. of Public Instruction, Indianapolis.

    This handbook examines various topics of interest and concern to teachers as they work with instructional assistants forming a classroom instructional partnership and functioning as a team. These topics include: (1) instructional assistant qualifications; (2) duties--instructional, classroom clerical, auxillary; (3) factors to be considered when…

  3. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library


    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  4. Forum: Interpersonal Communication in Instructional Settings: Interpersonal Communication Research in Instructional Contexts: A Dyadic Approach (United States)

    Goodboy, Alan K.; Kashy, Deborah A.


    Do we study too much interpersonal communication and not enough of other topics in the instructional communication literature? This forum provides a mixed bag of both affirmative and negative responses to this question. On one hand, answering "yes" is quite defensible because there are many recent studies examining interpersonal…

  5. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S


    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  6. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe


    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  7. Recognizing Plant Defense Priming. (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe


    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.


    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  9. Current Obstacles to Fully Preparing Title 10 Forces for Homeland Defense and Civil Support

    National Research Council Canada - National Science Library

    Campbell, James S


    The National Strategy for Homeland Security, The National Military Strategic Plan for the War of Terrorism, the Strategy for Homeland Defense and Civil Support, numerous CONPLANS and DOD instructions...

  10. 77 FR 11495 - Renewal of Department of Defense Federal Advisory Committees (United States)


    ... management, curricula, and methods of instructions, facilities, and other matters of interest. The Secretary... more than 10 members, who are eminent authorities in the fields of academia, business, national defense and security, the defense industry, and research and analysis. Not less than 50 percent of Board...

  11. Technologies for distributed defense (United States)

    Seiders, Barbara; Rybka, Anthony


    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  12. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.


    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  13. Strategy Instruction in Mathematics. (United States)

    Goldman, Susan R.


    Experiments in strategy instruction for mathematics have been conducted using three models (direct instruction, self-instruction, and guided learning) applied to the tasks of computation and word problem solving. Results have implications for effective strategy instruction for learning disabled students. It is recommended that strategy instruction…

  14. Defense Mechanisms: A Bibliography. (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  15. Defense Business Transformation (United States)


    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  16. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus


    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  17. 76 FR 21708 - Privacy Act of 1974; System of Records (United States)


    ... Appendix I to OMB Circular No. A-130, ``Federal Agency Responsibilities for Maintaining Records About... Instruction (DoDI) 1400.25-V810, DoD Civilian Personnel Management System: Injury Compensation; DoDI 1400.25-V850, DoD Civilian Personnel Management System: Unemployment Compensation; DoD 1400.25-M, DoD Civilian...

  18. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.


    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  19. A Report on the Research and Development of Instructional Simulation. (United States)

    West, Charles K.; And Others

    The purpose of this report is to communicate findings on current knowledge of simulation design, development, and evaluation. Research on this project was guided by questions posed by the Defense Systems Management College in Fort Belvoir, Virginia. These questions fall into three categories: the constituents of good instructional simulations, the…

  20. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher


    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  1. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher


    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  2. Defense Transportation; The Army

    National Research Council Canada - National Science Library


    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  3. Defense Primer: DOD Contractors (United States)


    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  4. Ballistic Missile Defense


    Mayer, Michael


    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...


    Harvard Univ., Cambridge, MA. Graduate School of Education.


  6. The Instructional Capacitor (United States)

    Walton, Elizabeth


    Many administrators are so overwhelmed by the basic responsibilities of their daily work that there seems to be little or no time left for providing quality leadership in instruction. Instead, schools employ department chairs, instructional specialists, and coordinators to provide instructional leadership. How can administrators find time in the…

  7. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  8. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  9. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  10. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent


    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  11. Defense waste management plan

    International Nuclear Information System (INIS)


    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  12. Defensive Federal Litigation (United States)


    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  13. Defense styles of pedophilic offenders. (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas


    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  14. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W


    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  15. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W


    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  16. Analysis of Department of Defense Organic Depot Maintenance Capacity Management and Facility Utilization Factors (United States)


    System ( CAPMS ) in lieu of using DODI 4151.15H. Facility utilization rate computation is not explicitly defined; it is merely identified as a ratio of...front of a bottleneck buffers the critical resource and protects against disruption of the system. This approach optimizes facility utilization titled BUFFERED BASELINE. Three different levels of inventory were used to evaluate the effect of increasing the inventory level on critical

  17. Long multiplication by instruction sequences with backward jump instructions

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.


    For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Backward jump instructions

  18. Defensive Passivity in Adolescence (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha


    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  19. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.


    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  20. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.


    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  1. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.


    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  2. Rethinking Defensive Information Warfare (United States)


    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  3. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library


    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  4. Programmed Instruction Revisited. (United States)

    Skinner, B. F.


    Discusses the history and development of teaching machines, invented to restore the important features of personalized instruction as public school class size increased. Examines teaching and learning problems over the past 50 years, including motivation, attention, appreciation, discovery, and creativity in relation to programmed instruction.…

  5. Fashions in Instructional Development. (United States)

    Knapper, Christopher K.

    This paper on instructional development notes the trend toward teaching improvement efforts, classifies instructional development centers in terms of their differing philosophies of operation, and identifies some general problems that have been encountered in institutional efforts to improve teaching and learning. Centers in North America, Europe,…

  6. Defense Primer: Procurement (United States)


    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  7. Quadrennial Defense Review Report (United States)


    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  8. Whither Ballistic Missile Defense? (United States)


    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  9. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren


    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  10. Using Principles of Programmed Instruction (United States)

    Huffman, Harry


    Although programmed instruction in accounting is available, it is limited in scope and in acceptance. Teachers, however, may apply principles of programming to the individualizing of instruction. (Author)

  11. Using Interactive Video Instruction To Enhance Public Speaking Instruction. (United States)

    Cronin, Michael W.; Kennan, William R.

    Noting that interactive video instruction (IVI) should not and cannot replace classroom instruction, this paper offers an introduction to interactive video instruction as an innovative technology that can be used to expand pedagogical opportunities in public speaking instruction. The paper: (1) defines the distinctive features of IVI; (2) assesses…


    Directory of Open Access Journals (Sweden)

    Constantin PREDA


    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  13. Bibliographic Instruction : A Webliography

    Directory of Open Access Journals (Sweden)


    Full Text Available A Webliography about the Bibliographic Instruction, it collects a variety of internet resources divided to main categories; directories, articles, bibliographies, organization, mailing lists, and interest groups.

  14. Nanomaterials for Defense Applications (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  15. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova


    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  16. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.


    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  17. Ballistic Missile Defense in Europe


    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven


    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  18. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations (United States)


    Managed Spare Parts at Service Industrial Sites by Supply Chain , Fiscal...Metrics and Inventory Stratification Reporting; and Defense Logistics Agency Instruction 4140.08, DLA Retail Supply Chain Materiel Management ...the retail supply system, which is typically managed by the services. As a retail inventory manager at industrial sites, DLA manages the supply

  19. Effects of Sex, Social Desirability, and Birth Order on the Defense Mechanisms Inventory. (United States)

    Dudley, Gary E.


    Investigated effects of sex difference, social desirability instructions, and birth order of respondents on defense mechanisms inventory (DMI). Sex difference was found in projection only. Social desirability effects were found in turning-against-others, projection, principalization, and reversal. Thus, an interpretive caution is in order…

  20. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D


    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  1. UDK tower defense

    CERN Document Server

    Doran, John


    This book is written by someone who is passionate about games for those who are equally passionate about games. The step-by-step instructions contained within this guide will make creating your first game simple.If you have ever had the urge to know more about how all those amazing games you played for countless hours are created, then this book is definitely for you! This step-by-step tutorial will teach you how to create a complete game within UDK.Even if you have no prior experience of UDK, you can still start building the games you want today.

  2. Special Report: Defense Officials Release Operational Energy (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  3. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)



    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  4. Antipredator defenses predict diversification rates (United States)

    Arbuckle, Kevin; Speed, Michael P.


    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  5. Inclusive differentiated instruction

    Directory of Open Access Journals (Sweden)

    Jerković Ljiljana S.


    Full Text Available Inclusive differentiated instruction is a new model of didactic instruction, theoretically described and established in this paper for the first time, after being experimentally verified through teaching of the mother tongue (instruction in reading and literature. Inclusive individually planned instruction is based on a phenomenological and constructivist didactic instructional paradigm. This type of teaching is essentially developmental and person-oriented. The key stages of inclusive differentiated instruction of literature are: 1 recognition of individual students' potential and educational needs regarding reading and work on literary texts; 2 planning and preparation of inclusive individually planned instruction in reading and literature; 3 actual class teaching of lessons thus prepared; and 4 evaluation of the student achievement following inclusive differentiated instruction in reading and literature. A highly important element of the planning and preparation of inclusive differentiated instruction is the creation of student profiles and inclusive individualized syllabi. Individualized syllabi specify the following: 1. a brief student profile; 2. the student position on the continuum of the learning outcomes of instruction in the Serbian language; 3. reverse-engineered macro-plan stages of instruction in the Serbian language (3.1. identifying expected outcomes and fundamental qualities of learners' work, 3.2. defining acceptable proofs of their realisation, 3.3. planning learning and teaching experiences, and 3.4. providing material and technical requisites for teaching; 4 the contents and procedure of individualized lessons targeting the student; 5 a plan of syllabus implementation monitoring and evaluation. The continuum of the learning outcomes of inclusive differentiated instruction in literature exists at three main levels, A, B and C. The three levels are: A reading techniques and learning about the main literary theory concepts; B

  6. Defense Reutilization and Marketing Manual (United States)


    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  7. Defense Acquisitions Acronyms and Terms (United States)


    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  8. Instructional Methods Tool (United States)


    course can vary from 40 to 1400 academic hours or greater, while the course content can focus on leadership, doctrinal, or technical training . The...for the Department of the Army by Northrop Grumman Corporation. Technical review by Victor J. Ingurgio, U.S. Army Research Institute...NOTICES DISTRIBUTION: This Research Report has been submitted to the Defense Information Technical Center (DTIC). Address

  9. Apparel. Teacher's Instructional Guide. (United States)

    Rambo, Patti

    This instructional guide for a one-half credit technological laboratory course for grades 10-12 focuses on apparel from the perspectives of personal decision making related to apparel, the apparel industry, and career preparation. Introductory materials are a course description; overview of course design; facilities, equipment, and resources; and…

  10. Instructional Guidelines. Welding. (United States)

    Fordyce, H. L.; Doshier, Dale

    Using the standards of the American Welding Society and the American Society of Mechanical Engineers, this welding instructional guidelines manual presents a course of study in accordance with the current practices in industry. Intended for use in welding programs now practiced within the Federal Prison System, the phases of the program are…

  11. Windows into Instructional Practice (United States)

    Steinbacher-Reed, Christina; Rotella, Sam A.


    Administrators are often removed from the daily instructional realities in classrooms, while teachers aren't given enough opportunities to lead in their schools, write Christina Steinbacher-Reed and Sam A. Rotella Jr. The result is a wall that prevents the two parties from collaborating in a way that improves school culture, teaching practices,…


    Ohio Vocational Agriculture Instructional Materials Service, Columbus.


  13. Computers in writing instruction

    NARCIS (Netherlands)

    Schwartz, Helen J.; van der Geest, Thea; Smit-Kreuzen, Marlies


    For computers to be useful in writing instruction, innovations should be valuable for students and feasible for teachers to implement. Research findings yield contradictory results in measuring the effects of different uses of computers in writing, in part because of the methodological complexity of

  14. Gaze Interactive Building Instructions

    DEFF Research Database (Denmark)

    Hansen, John Paulin; Ahmed, Zaheer; Mardanbeigi, Diako

    We combine eye tracking technology and mobile tablets to support hands-free interaction with digital building instructions. As a proof-of-concept we have developed a small interactive 3D environment where one can interact with digital blocks by gaze, keystroke and head gestures. Blocks may be moved...

  15. Job Instruction Training. (United States)

    Pfau, Richard H.

    Job Instruction Training (JIT) is a step-by-step, relatively simple technique used to train employees on the job. It is especially suitable for teaching manual skills or procedures; the trainer is usually an employee's supervisor but can be a co-worker. The JIT technique consists of a series of steps that a supervisor or other instructor follows…

  16. Nuclear Energy. Instructional Materials. (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy (see note) developed as part of a descriptive curriculum research project in Arkansas. The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  17. Wind Power. Instructional Materials. (United States)

    Jordan, Kenneth; Thessing, Dan

    This document is one of five learning packets on alternative energy developed as part of a descriptive curriculum research project in Arkansas (see note). The overall objectives of the learning packets are to improve the level of instruction in the alternative energies by vocational exploration teachers, and to facilitate the integration of new…

  18. Instructional Psychology 1976 - 1981, (United States)


    business it is to carry out applied work in the design of instructional content and delivery. These organizations include specialized divisions of...34learning disabilities" label: An experimental analysis. Comtemporary Educational Psychology, 1977, 2, 292-297. Allington, R. L. Sensitivity to

  19. Reviews in instructional video

    NARCIS (Netherlands)

    van der Meij, Hans


    This study investigates the effectiveness of a video tutorial for software training whose construction was based on a combination of insights from multimedia learning and Demonstration-Based Training. In the videos, a model of task performance was enhanced with instructional features that were

  20. Computer-assisted instruction

    NARCIS (Netherlands)

    Voogt, J.; Fisser, P.; Wright, J.D.


    Since the early days of computer technology in education in the 1960s, it was claimed that computers can assist instructional practice and hence improve student learning. Since then computer technology has developed, and its potential for education has increased. In this article, we first discuss

  1. Scaffolding in Assisted Instruction

    Directory of Open Access Journals (Sweden)


    Full Text Available On-The-Job Training, developed as direct instruction, is one of the earliest forms of training. This method is still widely in use today because it requires only a person who knows how to do the task, and the tools the person uses to do the task. This paper is intended to be a study of the methods used in education in Knowledge Society, with more specific aspects in training the trainers; as a result of this approach, it promotes scaffolding in assisted instruction as a reflection of the digital age for the learning process. Training the trainers in old environment with default techniques and designing the learning process in assisted instruction, as an application of the Vygotskian concept of the zone of proximal development (ZPD to the area of computer literacy for the younger users, generate diversity in educational communities and requires standards for technology infrastructure, standards for the content, developed as a concepts map, and applications for personalized in-struction, based on ZPD theory.

  2. Characteristics of Instructional Videos (United States)

    Beheshti, Mobina; Taspolat, Ata; Kaya, Omer Sami; Sapanca, Hamza Fatih


    Nowadays, video plays a significant role in education in terms of its integration into traditional classes, the principal delivery system of information in classes particularly in online courses as well as serving as a foundation of many blended classes. Hence, education is adopting a modern approach of instruction with the target of moving away…

  3. Facility transition instruction

    International Nuclear Information System (INIS)

    Morton, M.R.


    The Bechtel Hanford, Inc. facility transition instruction was initiated in response to the need for a common, streamlined process for facility transitions and to capture the knowledge and experience that has accumulated over the last few years. The instruction serves as an educational resource and defines the process for transitioning facilities to long-term surveillance and maintenance (S and M). Generally, these facilities do not have identified operations missions and must be transitioned from operational status to a safe and stable configuration for long-term S and M. The instruction can be applied to a wide range of facilities--from process canyon complexes like the Plutonium Uranium Extraction Facility or B Plant, to stand-alone, lower hazard facilities like the 242B/BL facility. The facility transition process is implemented (under the direction of the US Department of Energy, Richland Operations Office [RL] Assistant Manager-Environmental) by Bechtel Hanford, Inc. management, with input and interaction with the appropriate RL division and Hanford site contractors as noted in the instruction. The application of the steps identified herein and the early participation of all organizations involved are expected to provide a cost-effective, safe, and smooth transition from operational status to deactivation and S and M for a wide range of Hanford Site facilities

  4. Paratransit: An Instructional Module. (United States)

    Scalici, Anthony

    A concept-based introduction to paratransit is provided in this instructional module for undergraduate and graduate transportation-related courses for disciplines such as engineering, business, marketing, and technology. The concept of paratransit generally refers to modes of transportation other than mass transit and solo-driven automobiles. The…

  5. Listening strategies instruction

    DEFF Research Database (Denmark)

    Nogueroles López, Marta


    , who presented similar level of Spanish, needs, educational and cultural background, but did not receive such a training. The listening strategies instruction consisted in integrating the development of listening strategies into a regular course of Spanish as a foreign language. Data referring...

  6. Inquiry-Oriented Instruction: A Conceptualization of the Instructional Principles (United States)

    Kuster, George; Johnson, Estrella; Keene, Karen; Andrews-Larson, Christine


    Research has highlighted that inquiry-based learning (IBL) instruction leads to many positive student outcomes in undergraduate mathematics. Although this research points to the value of IBL instruction, the practices of IBL instructors are not well-understood. Here, we offer a characterization of a particular form of IBL instruction:…

  7. DOE Defense Program (DP) safety programs. Final report, Task 003

    International Nuclear Information System (INIS)


    The overall objective of the work on Task 003 of Subcontract 9-X52-W7423-1 was to provide LANL with support to the DOE Defense Program (DP) Safety Programs. The effort included the identification of appropriate safety requirements, the refinement of a DP-specific Safety Analysis Report (SAR) Format and Content Guide (FCG) and Comprehensive Review Plan (CRP), incorporation of graded approach instructions into the guidance, and the development of a safety analysis methodologies document. All tasks which were assigned under this Task Order were completed. Descriptions of the objectives of each task and effort performed to complete each objective is provided here

  8. A Study on the Defensive Stance and Position of Handball Goalkeepers: Facing a Forward Jump Shot Made from 9 Meters. (United States)

    Yang, Jong Hyun; Lee, Young Suk


    The purpose of this study was to find the defensive stance and calculate an optimal defense position for goalkeepers while blocking forward jump shots made from a distance of 9 m. Nine men's handball matches were recorded and 78 video clips were selected for analysis. These are the top class goalkeepers, which included players from the national team and reserve team of Korea. The goalkeeper's actual defensive position was significantly different from instructional suggestions; the width of both feet of the goalkeeper was approximately 2.5 times the width of the shoulders, and the hands were at waist height. The goalkeeper's actual defense position was about 1.10 (± 0.3) m from the goal line and also significantly different than instructional material (0.75 m). The optimal defense position, which was calculated from the goalkeeper's actual movement, was 1.44 m from the goal line, because the ratio of goalkeeper's defensive area in relation to the total area to be defended is highest at this point. In summary, we recommended that handball goalkeepers move forward, about a half step (0.34 m), when defending a forward jump shot made from 9 m, and instructional material should be modified according to the findings from this study.

  9. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F


    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  10. Instructional Leadership Practices in Singapore (United States)

    Ng, Foo Seong David; Nguyen, Thanh Dong; Wong, Koon Siak Benjamin; Choy, Kim Weng William


    This paper presents a review of the literature on principal instructional leadership in Singapore. The authors investigated the dimensions of instructional leadership in the practices of Singapore principals and highlighted the strategies these leaders adopt to enact their instructional roles. Singapore principals were found to play an active role…

  11. Putting instruction sequences into effect

    NARCIS (Netherlands)

    Bergstra, J.A.


    An attempt is made to define the concept of execution of an instruction sequence. It is found to be a special case of directly putting into effect of an instruction sequence. Directly putting into effect of an instruction sequences comprises interpretation as well as execution. Directly putting into

  12. The Measurement of Instructional Accomplishments. (United States)

    Fraley, Lawrence E.; Vargas, Ernest A.

    Instructional System Technology in recent years has been characterized by an increase in individualized instruction and the modularization of the curriculum. In traditional systems the learners are forced to take blocks of instruction the size of entire courses and these are much too large. The courses can now be broken down into conceptual…

  13. Intelligent Frameworks for Instructional Design. (United States)

    Spector, J. Michael; And Others


    Presents a taxonomy describing various uses of artificial intelligence techniques in automated instructional development systems. Instructional systems development is discussed in relation to the design of computer-based instructional courseware; two systems being developed at the Air Force Armstrong Laboratory are reviewed; and further research…

  14. Very Long Instruction Word Processors

    Indian Academy of Sciences (India)

    Explicitly Parallel Instruction Computing (EPIC) is an instruction processing paradigm that has been in the spot- light due to its adoption by the next generation of Intel. Processors starting with the IA-64. The EPIC processing paradigm is an evolution of the Very Long Instruction. Word (VLIW) paradigm. This article gives an ...

  15. Motivational elements in user instructions

    NARCIS (Netherlands)

    Loorbach, N.R.


    Concerning the design of user instructions, two view can be distinguished. The traditional view considers instructions as purely instrumental documents. The more and more emerging affective view still assumes that above all, instructions should enable readers to perform tasks. But in order to

  16. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael


    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  17. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D


    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  18. Defense Meteorological Satellite Program (DMSP) (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  19. Strategic Missile Defense & Nuclear Deterrence (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  20. Tactile defensiveness and stereotyped behaviors. (United States)

    Baranek, G T; Foster, L G; Berkson, G


    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  1. Instructional immediacy in elearning. (United States)

    Walkem, Kerrie


    Instructor immediacy has been positively associated with many desirable academic outcomes including increased student learning. This study extends existing understanding of instructional immediacy behaviours in elearning by describing postgraduate nursing students' reflections on their own experience. An exploratory, descriptive survey design was used to collect qualitative data. Participants were asked what behaviours or activities help to create rapport or a positive interpersonal connection (immediacy) between students and their online teacher(s). Thematic analysis of the data revealed three main themes: acknowledging and affirming student's personal and professional responsibilities; providing clear and timely information; and utilising rich media. These findings give lecturers insight into instructional strategies they may adopt to increase immediacy in elearning and hence improve student learning outcomes.

  2. A Critique of Instructional


    McKernan, James


    The ‘objectives model’ of curriculum planning, predicated upon behavioural performances, has become the dominant form of curriculum planning in Europe and elsewhere in the world. This paper argues that the objectives model is satisfactory for training or instruction, but falls down when applied to a true sense of ‘education’. The paper outlines 13 limitations on the use of educational objectives. It is argued that those interested in using objectives are guided by evaluation as assessment rat...

  3. Acquisition Planning at the Defense Communications Agency. (United States)


    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  4. Effective Multicultural Instruction

    Directory of Open Access Journals (Sweden)

    Franklin T. Thompson


    Full Text Available The reason why the Trayvon Martin murder trial and similar court cases create a philosophical rift in our nation is due in part to flaws in the delivery of multicultural education. Traditional multicultural instruction does not prepare citizens for the subtleties and complexities of race relations. This study investigates critical strategies and practices that address multicultural missing gaps. I also seek to fill a void in the literature created by a lack of student input regarding teaching strategies that encourage lifelong learning. Students (N = 337 enrolled at a Midwestern university were asked to rate the efficacy of selected instructional strategies. Utilizing a 9-point Likert-type scale, students gave themselves a personal growth rating of 7.15 (SD = 1.47. Variables important to predicting that growth (R2 = .56, p < .0005 were a six-factor variable known as a non-color-blind instructional approach (t = 10.509, p ≤ .0005, allowing students an opportunity to form their own opinions apart from the instructor (t = 4.797, p ≤ .0005, and a state law that mandated multicultural training (t = 3.234, p = .001. Results demonstrated that utilizing a 35% traditional and 65% critical pedagogy mixture when teaching multicultural education helped promote win/win scenarios for education candidates hoping to become difference makers.

  5. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library


    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  6. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  7. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense... (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  8. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee (United States)


    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  9. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel


    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  10. Legal review on PTSD defense of adolescent patients in criminal cases

    Directory of Open Access Journals (Sweden)

    Xiaofu Li


    Full Text Available Post-Traumatic Stress Disorder is nothing new for Chinese society; however, Chinese courts are hesitated to accept the PTSD as a mental defense for adolescent patients. PTSD defense might be popular in future and court shall give proper weight to relevant factors. It is a big problem that there are no procedures or instructions for the connection between diagnosis and judgment. The paper illustrates the origination of PTSD and its development in USA with some relevant cases. Even the American courts consider PTSD as a problem. And there should be detailed regulations in China to keep pace with the development of science technology.

  11. The Department of Defense Information Security Process: A Study of Change Acceptance and Past-Performance-Based Outsourcing (United States)

    Hackney, Dennis W. G.


    Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…


    Directory of Open Access Journals (Sweden)

    Kevin YEE

    Full Text Available Introduced in July, 2011 in a beta test of invited users only, the new social media service Google+ (or G+ quickly spread by word of mouth, and Google leader Larry Page (2011 blogged that within sixteen days it had 10 million users. By August, it had 25 million users (Cashmore, 2011. Even with slower growth ahead (still with no marketing budget, the service looks likely to crest 100 million users perhaps as early as ten months, a feat that took Facebook three years. Other social networks, most notably Facebook and Twitter, have been used increasingly as instructional tools, since they are platforms with which students are already familiar (Maloney, 2007; McLoughlin & Lee, 2007. Selwyn (2009 found that students often eschew official channels for communication in favor of less formal community-based formats such as Facebook, implying a growing need for instructional communication tools that will be used willingly by students. The question is whether Google+ can be used like Twitter or Facebook to augment instruction, or even, perhaps, to improve upon those predecessors for academic purposes. Google+ is like Twitter in that anyone can follow a given user’s posts. There is no direct “friend” relationship required to read the posts written by others. However, it also approximates some features of Facebook. Rather than friends sorted into “lists” like in Facebook, Google+ allows users to place feeds into one or more “circles,” the better to monitor (or control the flow of information to and from different audiences. Circles are more intuitive, and more central to the experience, than the Facebook lists. They provide an explicit organizational structure, compared to the less-obvious listing functionality, which feels like an afterthought, found in Facebook.

  13. EST Vocabulary Instruction

    Directory of Open Access Journals (Sweden)

    Célia D.S. Bell


    Full Text Available This study aims at contributing to the investigation on the instruction of EST (English for Science and Technology vocabulary, in terms of receptive use of the language. It evaluates the effectiveness of two teaching approaches to the acquisition of vocabulary. The first approach consisted of teaching vocabulary through the use of dictionaries, where the words were merely translated into the learners’ L1 or defined in the target language thus promoting superficial level of word processing. The second approach employed activities promoting deep level of word processing. Data were analysed quantitatively. Results indicated that the two approaches seem to have some equipotentiality, as far as EST vocabulary is concerned.

  14. The Mere Exposure Instruction Effect. (United States)

    Van Dessel, Pieter; Mertens, Gaëtan; Smith, Colin Tucker; De Houwer, Jan


    The mere exposure effect refers to the well-established finding that people evaluate a stimulus more positively after repeated exposure to that stimulus. We investigated whether a change in stimulus evaluation can occur also when participants are not repeatedly exposed to a stimulus, but are merely instructed that one stimulus will occur frequently and another stimulus will occur infrequently. We report seven experiments showing that (1) mere exposure instructions influence implicit stimulus evaluations as measured with an Implicit Association Test (IAT), personalized Implicit Association Test (pIAT), or Affect Misattribution Procedure (AMP), but not with an Evaluative Priming Task (EPT), (2) mere exposure instructions influence explicit evaluations, and (3) the instruction effect depends on participants' memory of which stimulus will be presented more frequently. We discuss how these findings inform us about the boundary conditions of mere exposure instruction effects, as well as the mental processes that underlie mere exposure and mere exposure instruction effects.

  15. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D


    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  16. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen


    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  17. On Three Defenses of Sentimentalism


    Iwasa, Noriaki


    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  18. Defense Primer: The National Defense Budget Function (050) (United States)


    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  19. Report on Defense Business Operations to the Congressional Defense Committees (United States)


    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  20. The Instructional Network: Using Facebook to Enhance Undergraduate Mathematics Instruction (United States)

    Gregory, Peter; Gregory, Karen; Eddy, Erik


    Facebook is a website with over one billion users worldwide that is synonymous with social-networking. However, in this study, Facebook is used as an "instructional network". Two sections of an undergraduate calculus course were used to study the effects of participating in a Facebook group devoted solely to instruction. One section was…

  1. Improving Reading Instruction through Research-Based Instructional Strategies (United States)

    Nash, Vickie Lynn


    The diverse population of students in grades 1- 3 at a suburban elementary school has created a challenge for teachers when differentiating instruction in reading. The purpose of this doctoral project study was to explore the lived experiences of these teachers as they have acquired research-based instructional strategies in reading that support…

  2. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton


    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  3. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition (United States)


    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  4. An Analysis of Communication Between Program Managers and Contracting Officers and Its Effect on the Performance of the Defense Acquisition System (United States)


    McCurdy MDAP Breaches per SAR Year (1997–2013) ................45 Figure 13. Nunn-McCurdy MDAP Breech Rates by Component (1997–2013) .........46 Figure...and KO only to be rejected by the KO’s approving authority or higher headquarters. Instances were cited where often external pressures from...the 5000 Series is the DODI 5000.02. As of the writing of this document, the current version dates from January 7, 2015. The following is an

  5. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.


    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  6. 77 FR 29616 - Privacy Act of 1974; System of Records (United States)


    .... DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information Assurance (CS/IA) Program... Infrastructure Program (DCIP) Management; and DoDI 5205.13, Defense Industrial Base (DIB) Cyber Security...

  7. BASIC Instructional Program: System Documentation. (United States)

    Dageforde, Mary L.

    This report documents the BASIC Instructional Program (BIP), a "hands-on laboratory" that teaches elementary programming in the BASIC language, as implemented in the MAINSAIL language, a machine-independent revision of SAIL which should facilitate implementation of BIP on other computing systems. Eight instructional modules which make up…

  8. Designing Instructional Materials: Some Guidelines. (United States)

    Burbank, Lucille; Pett, Dennis

    Guidelines for the design of instructional materials are outlined in this paper. The principles of design are presented in five major categories: (1) general design (structural appeal and personal appeal); (2) instructional design (attention, memory, concept learning, and attitude change); (3) visual design (media considerations, pictures, graphs…

  9. Cognitive Approaches to Automated Instruction. (United States)

    Regian, J. Wesley, Ed.; Shute, Valerie J., Ed.

    This book contains a snapshot of state-of-the-art research on the design of automated instructional systems. Selected cognitive psychologists were asked to describe their approach to instruction and cognitive diagnosis, the theoretical basis of the approach, its utility and applicability, and the knowledge engineering or task analysis methods…

  10. Physics Instruction for Radiologic Technologists (United States)

    Chaney, Edward L.; And Others


    Discusses the Denver collaborative training program in radiologic technology with emphasis upon identification of core topics, preparation of quality instructional materials, and use of innovative teaching techniques, such as computer-assisted instruction and video tape presentations. Included is a 10-week course outline. (CC)

  11. Active Learning through Online Instruction (United States)

    Gulbahar, Yasemin; Kalelioglu, Filiz


    This article explores the use of proper instructional techniques in online discussions that lead to meaningful learning. The research study looks at the effective use of two instructional techniques within online environments, based on qualitative measures. "Brainstorming" and "Six Thinking Hats" were selected and implemented…

  12. Adaptive instruction and pupil achievement

    NARCIS (Netherlands)

    Houtveen, A.A M; Booy, N; de Jong, Robert (Rob); van de Grift, W.J C M

    In this article the results are reported of a quasi-experiment on effects of adaptive instruction on reading results of children in the first year of reading instruction in Dutch primary schools. The research involved 456 pupils from 23 schools (12 experimental and 11 control group schools).

  13. Instructional Theory for Teaching Statistics. (United States)

    Atwood, Jan R.; Dinham, Sarah M.

    Metatheoretical analysis of Ausubel's Theory of Meaningful Verbal Learning and Gagne's Theory of Instruction using the Dickoff and James paradigm produced two instructional systems for basic statistics. The systems were tested with a pretest-posttest control group design utilizing students enrolled in an introductory-level graduate statistics…

  14. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John


    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  15. Department of Defense PERSEREC (DOD PERSEREC) (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  16. Unaligned instruction relocation

    Energy Technology Data Exchange (ETDEWEB)

    Bertolli, Carlo; O' Brien, John K.; Sallenave, Olivier H.; Sura, Zehra N.


    In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (ISA). Aligned assembled code is generated, by a computer processor. The aligned assembled code complies with an aligned ISA and includes aligned processor code for a processor and aligned accelerator code for an accelerator. A first linking pass is performed on the aligned assembled code, including relocating a first relocation target in the aligned accelerator code that refers to a first object outside the aligned accelerator code. Unaligned assembled code is generated in accordance with the unaligned ISA and includes unaligned accelerator code for the accelerator and unaligned processor code for the processor. A second linking pass is performed on the unaligned assembled code, including relocating a second relocation target outside the unaligned accelerator code that refers to an object in the unaligned accelerator code.

  17. Unaligned instruction relocation (United States)

    Bertolli, Carlo; O'Brien, John K.; Sallenave, Olivier H.; Sura, Zehra N.


    In one embodiment, a computer-implemented method includes receiving source code to be compiled into an executable file for an unaligned instruction set architecture (ISA). Aligned assembled code is generated, by a computer processor. The aligned assembled code complies with an aligned ISA and includes aligned processor code for a processor and aligned accelerator code for an accelerator. A first linking pass is performed on the aligned assembled code, including relocating a first relocation target in the aligned accelerator code that refers to a first object outside the aligned accelerator code. Unaligned assembled code is generated in accordance with the unaligned ISA and includes unaligned accelerator code for the accelerator and unaligned processor code for the processor. A second linking pass is performed on the unaligned assembled code, including relocating a second relocation target outside the unaligned accelerator code that refers to an object in the unaligned accelerator code.

  18. Interactive Instruction in Bayesian Inference

    DEFF Research Database (Denmark)

    Khan, Azam; Breslav, Simon; Hornbæk, Kasper


    An instructional approach is presented to improve human performance in solving Bayesian inference problems. Starting from the original text of the classic Mammography Problem, the textual expression is modified and visualizations are added according to Mayer’s principles of instruction. These pri......An instructional approach is presented to improve human performance in solving Bayesian inference problems. Starting from the original text of the classic Mammography Problem, the textual expression is modified and visualizations are added according to Mayer’s principles of instruction....... These principles concern coherence, personalization, signaling, segmenting, multimedia, spatial contiguity, and pretraining. Principles of self-explanation and interactivity are also applied. Four experiments on the Mammography Problem showed that these principles help participants answer the questions...... that an instructional approach to improving human performance in Bayesian inference is a promising direction....

  19. The Art and Science of Defense Logistics (United States)


    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  20. Missile defense in the United States


    Heurlin, Bertil


    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  1. ARS-Media for excel instruction manual (United States)

    ARS-Media for Excel Instruction Manual is the instruction manual that explains how to use the Excel spreadsheet ARS-Media for Excel application. ARS-Media for Excel Instruction Manual is provided as a pdf file....

  2. Mood States Associated with Induced Defensiveness. (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett


    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  3. 22 CFR 120.6 - Defense article. (United States)


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  4. 22 CFR 120.9 - Defense service. (United States)


    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  5. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military... (United States)


    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  6. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities (United States)


    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  7. Instructional strategies to improve women's attitudes toward science (United States)

    Newbill, Phyllis Leary

    Although negative attitudes toward science are common among women and men in undergraduate introductory science classes, women's attitudes toward science tend to be more negative than men's. The reasons for women's negative attitudes toward science include lack of self-confidence, fear of association with social outcasts, lack of women role models in science, and the fundamental differences between traditional scientific and feminist values. Attitudes are psychological constructs theorized to be composed of emotional, cognitive, and behavioral components. Attitudes serve functions, including social expressive, value expressive, utilitarian, and defensive functions, for the people who hold them. To change attitudes, the new attitudes must serve the same function as the old one, and all three components must be treated. Instructional designers can create instructional environments to effect attitude change. In designing instruction to improve women's attitudes toward science, instructional designers should (a) address the emotions that are associated with existing attitudes, (b) involve credible, attractive women role models, and (c) address the functions of the existing attitudes. Two experimental instructional modules were developed based on these recommendations, and two control modules were developed that were not based on these recommendations. The asynchronous, web-based modules were administered to 281 undergraduate geology and chemistry students at two universities. Attitude assessment revealed that attitudes toward scientists improved significantly more in the experimental group, although there was no significant difference in overall attitudes toward science. Women's attitudes improved significantly more than men's in both the experimental and control groups. Students whose attitudes changed wrote significantly more in journaling activities associated with the modules. Qualitative analysis of journals revealed that the guidelines worked exactly as predicted

  8. Defense bill: Earmarking as usual (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  9. Cyber Defense: An International View (United States)


    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  10. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.


    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  11. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton


    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  12. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)


    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  13. Instructed officers Radiation Protection

    International Nuclear Information System (INIS)


    This law contains instructions on the prevention of radiological and contains 4 articles Article I: describe the responsibilities of the institutions that operate within the scope of radiological protection in terms of the number of radiation protection officers and personal Supervisors who available in the practices radiation field. Article II: talking about the conditions of radiation protection officers that must be available in the main officers and working field in larg institutions and thecondition of specific requirements for large enterprises of work permits in the field of radiological work that issued by the Council. Article III: the functions and duties of officers in the prevention of radiological oversee the development of radiation protection programmes in the planning stages, construction and preparing the rules of local labour and what it lead of such tasks.Article IV: radiation protection officers powers: to modify and approve the programme of prevention and radiation safety at the company, stop any unsafe steps, amend the steps of the usage, operation of materials, devices and so on

  14. Motivational Measure of the Instruction Compared: Instruction Based on the ARCS Motivation Theory vs Traditional Instruction in Blended Courses (United States)

    Colakoglu, Ozgur M.; Akdemir, Omur


    The ARCS Motivation Theory was proposed to guide instructional designers and teachers who develop their own instruction to integrate motivational design strategies into the instruction. There is a lack of literature supporting the idea that instruction for blended courses if designed based on the ARCS Motivation Theory provides different…

  15. Zoology by Self-Instruction (United States)

    Roach, Keith; Hammond, Roger


    A historical account is given of how a conventional university first-year undergraduate course in zoology has been replaced by a self-instructional one. Advantages and problems are weighed, and successful student achievement and interest are described. (LBH)

  16. A Fallibilistic Model for Instruction (United States)

    Dawson, A. J.


    Discusses models in inquiry and of instruction based on critical Fallibilistic philosophy, developed by Karl R. Popper, which holds that all knowledge grows by conjecture and refutation. Classroom applications of strategies which result from the model are presented. (JP)

  17. Instructional Style Meets Classroom Design. (United States)

    Novelli, Joan


    Nine elementary teachers explain how they design their classrooms to match and support their instructional styles. The teachers focus on whole language programs, student portfolios, science activity set-ups, technology transformation, learning center strategies, and space utilization. (SM)

  18. Intelligent Tools and Instructional Simulations

    National Research Council Canada - National Science Library

    Murray, William R; Sams, Michelle; Belleville, Michael


    This intelligent tools and instructional simulations project was an investigation into the utility of a knowledge-based performance support system to support learning and on-task performance for using...

  19. Measurement control workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Crawford, Cary [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); McGinnis, Brent [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Insolves LLC, Piketon, OH (United States)


    A workshop to teach the essential elements of an effective nuclear materials control and accountability (MC&A) programs are outlined, along with the modes of Instruction, and the roles and responsibilities of participants in the workshop.

  20. Measurement Control Workshop Instructional Materials

    International Nuclear Information System (INIS)

    Gibbs, Philip; Crawford, Cary; McGinnis, Brent


    A workshop to teach the essential elements of an effective nuclear materials control and accountability (MC&A) programs are outlined, along with the modes of Instruction, and the roles and responsibilities of participants in the workshop.

  1. Adaptive Explicitly Parallel Instruction Computing

    National Research Council Canada - National Science Library

    Talla, Surendranath


    .... With in this context, we ask ourselves the following questions. 1. Can application performance be improved if the compiler had the freedom to pick the instruction set on a per application basis? 2...

  2. Rating Instructional Conversations: A Guide


    Rueda, Robert; Goldenberg, Claude; Gallimore, Ronald


    The current focus on more effective ways to foster literacy in school-age children, especially language minority students, has led to the development of alternative instructional approaches. One such approach is the instructional conversation (IC), based on early work in the Hawaiian Kamehameha Elementary Education Project (KEEP), on neo-Vygotskian theory, and on recent classroom-based research on reading comprehension. The present report outlines preliminary efforts to operationaliz...

  3. PLE-based instruction concept (United States)

    Javorcik, Tomas


    The paper is aimed at the description of a PLE (Personal Learning Environment)-based teaching model suitable for implementation in the instruction of upper primary school students. The paper describes the individual stages of the model and its use of ICT (Information and Communication Technologies) tools. The Personal Learning Environment is a form of instruction which allows for the meaningful use of information and communication technologies (including mobile technologies) in their entirety.

  4. Tritium control and accountability instructions

    International Nuclear Information System (INIS)

    Wall, W.R.; Cruz, S.L.


    This instruction describes the tritium accountability procedures practiced by the Tritium Research Laboratory, at Sandia National Laboratories, Livermore. The accountability procedures are based upon the Sandia National Laboratories, Livermore, Nuclear Materials Operations Manual, SAND83-8036. The Nuclear Materials Operations Manual describes accountability techniques which are in compliance with the Department of Energy 5630 series Orders, Code of Federal Regulations, and Sandia National Laboratories Instructions

  5. Tritium control and accountability instructions

    International Nuclear Information System (INIS)

    Wall, W.R.


    This instruction describes the tritium accountability procedures practiced by the Tritium Research Laboratory, Building 968 at Sandia National Laboratories, Livermore. The accountability procedures are based upon the Sandia National Laboratories, Livermore, Nuclear Materials Operations Manual, SAND78-8018. The Nuclear Materials Operations Manual describes accountability techniques which are in compliance with the Department of Energy Manual, Code of Federal Regulations, and Sandia National Laboratories Instructions

  6. Instructional Technology and Objectification

    Directory of Open Access Journals (Sweden)

    Bekir S. Gur


    Full Text Available Objectification refers to the way in which everything (including human beings is treated as an object, raw material, or resource to be manipulated and used. In this article, objectification refers to the way that education is often reduced to the packaging and delivery of information. A critique of objectification in instructional technology is presented. In the context of Heidegger’s critique of technology, the authors claim that objectification in education is metaphysical in the sense that the intelligibility (being of education is equated with ready-to-use packages, and thus is reduced to delivery and transmission of objects. The embodiment dimension of teaching and learning can help us in resisting this reduction. The authors argue that objectification increases bureaucratic control over the teaching process and deskills teachers; and by which teachers are proletarianized. The authors conclude that instructional designers should create structures in which a care relation and dialogue between students and teachers can take place. Résumé: L’objectification réfère à la façon dont tout (incluant les être humains est traité comme un objet, une matière première ou une ressource qui peut être manipulée et utilisée. Dans cet article, l’objectification réfère à la façon dont l’éducation est souvent réduite à la mise en boîte et à la livraison de l’information. Une critique de l’objectification en technologie éducative est présentée. Dans le contexte de la critique de la technologie par Heidegger, les auteurs prétendent que l’objectification en éducation est métaphysique dans le sens que l’intelligibilité (être de l’éducation équivaut à la mise en boîte prêt-à –utiliser, et se résume donc à la livraison et à la transmission d’objets. L’incarnation de l’enseignement et de l’apprentissage peuvent nous aider à résister à cette réduction. Les auteurs arguent que l

  7. Intelligent Instructional Systems in Military Training. (United States)

    Fletcher, J.D.; Zdybel, Frank

    Intelligent instructional systems can be distinguished from more conventional approaches by the automation of instructional interaction and choice of strategy. This approach promises to reduce the costs of instructional materials preparation and to increase the adaptability and individualization of the instruction delivered. Tutorial simulation…

  8. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin


    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  9. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo


    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  10. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F


    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  11. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.


    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS


    Directory of Open Access Journals (Sweden)

    Laszlo STICZ


    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  13. Student Papers on Strategic Defense Initiative. (United States)


    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  14. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)


    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  15. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.


    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  16. Active Computer Network Defense: An Assessment (United States)


    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  17. Trade Costs, Conflicts, and Defense Spending


    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman


    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...


    Directory of Open Access Journals (Sweden)

    Saeed Bagheri


    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  19. Variation in plant defense suppresses herbivore performance (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.


    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  20. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library


    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  1. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library


    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  2. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library


    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  3. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.


    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  4. Energetic Techniques For Planetary Defense (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.


    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  5. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.


    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  6. Defense mutualisms enhance plant diversification. (United States)

    Weber, Marjorie G; Agrawal, Anurag A


    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  7. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective (United States)


    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  8. The US-Russia missile defense dialogue as a factor of the Russian defense policy


    Dmitry Suslov


    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  9. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275. (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  10. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  11. 2015 Assessment of the Ballistic Missile Defense System (BMDS) (United States)


    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 ( are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  12. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act (United States)


    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  13. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  14. Best practices in writing instruction

    CERN Document Server

    Fitzgerald, Jill; MacArthur, Charles A


    An indispensable teacher resource and course text, this book presents evidence-based practices for helping all K-12 students develop their skills as writers. Every chapter draws clear connections to the Common Core State Standards (CCSS). Leading authorities describe how to teach the skills and strategies that students need to plan, draft, evaluate, and revise multiple types of texts. Also addressed are ways for teachers to integrate technology into the writing program, use assessment to inform instruction, teach writing in the content areas, and tailor instruction for English language learner

  15. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni


    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  16. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.


    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  17. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.


    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  18. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.


    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  19. Defense program pushes microchip frontiers (United States)

    Julian, K.


    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  20. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.


    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  1. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.


    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  2. Physics of a ballistic missile defense - The chemical laser boost-phase defense (United States)

    Grabbe, Crockett L.


    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  3. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández


    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  4. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)


    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  5. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.


    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  6. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses. (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L


    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  7. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.


    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  8. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli


    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  9. Library Instruction. SPEC Kit 17. (United States)

    Association of Research Libraries, Washington, DC. Office of Management Studies.

    At the request of the Pennsylvania State University Library, the Office of Management Studies surveyed Association of Research Libraries (ARL) members requesting information and documentation illustrating the organization, nature, and level of the library instruction function at their institutions. A review of the responses from 64 of the 94 ARL…

  10. Assistant for instructional development (AID)

    NARCIS (Netherlands)

    Meer, J.P. van; Veldhuis, G.J.; Emmerik, M.L. van; Theunissen, N.C.M.


    Introduction: Due to periodical job rotation within the military, instructional developers are not always experts in their field and are consequently unaware of the types of educational concepts that are available to teach with (Jans & Frazer-Jans, 2004). These observations have led to the

  11. Using Observation to Improve Instruction (United States)

    Powell, William; Napoliello, Susan


    The International School of Kuala Lumpur in Malaysia, which serves international students in preschool through middle school, focused a great deal of professional attention on differentiation. The administrators in Malaysian school, by making rounds of classrooms, raised teachers' awareness of differentiated instruction.

  12. Learning Strategy Instruction Innovation Configuration (United States)

    Schumaker, Jean B.


    One way of helping students with learning disabilities and other struggling students to be independent life-long learners is to teach them how to use learning strategies in efficient ways. Learning strategy instruction can provide students the opportunity to succeed in today's schools and meet rigorous standards, transforming ineffective learners…

  13. Unpacking Corrections in Mobile Instruction

    DEFF Research Database (Denmark)

    Levin, Lena; Cromdal, Jakob; Broth, Mathias


    that the practice of unpacking the local particulars of corrections (i) provides for the instructional character of the interaction, and (ii) is highly sensitive to the relevant physical and mobile contingencies. These findings contribute to the existing literature on the interactional organisation of correction...

  14. Three Logics of Instructional Leadership (United States)

    Rigby, Jessica G.


    Purpose: This study examines conceptions of instructional leadership in the institutional environment. We know that principals' practices affect student learning and that principals are influenced by ideas in the broader environment. This article examines and defines the multiple conceptions of what it means for principals to be instructional…

  15. Conversation Walks: Improving Instructional Leadership (United States)

    Zepeda, Sally J.; Lanoue, Philip D.


    Principals are tasked with being the instructional leaders in their schools--developing teacher's abilities through formal and informal classroom observations and feedback. But how can school districts ensure that principals have the skills they need to fulfill this crucial role? In Clarke County School District in Georgia, central-office leaders…

  16. Understanding the Supplemental Instruction Leader (United States)

    James, Adrian; Moore, Lori


    This article explored the learning styles and leadership styles of Supplemental Instruction (SI) leaders at Texas A&M University, and the impact of those preferences on recurring attendance to their sessions. The Learning Style Inventory, the Multifactor Leadership Questionnaire, and a demographic instrument were administered to SI leaders…

  17. Preparing Instructional Leaders: A Model (United States)

    Brazer, S. David; Bauer, Scott C.


    Purpose: This article proposes a model that provides one means of making instructional leadership the central focus of leadership preparation. It draws from conceptualizations of teaching and learning as well as organizational and leadership theory to advocate for greater coherence in education leadership programs. Conceptual Argument: We begin…

  18. Cement Mason's Curriculum. Instructional Units. (United States)

    Hendirx, Laborn J.; Patton, Bob

    To assist cement mason instructors in providing comprehensive instruction to their students, this curriculum guide treats both the skills and information necessary for cement masons in commercial and industrial construction. Ten sections are included, as follow: related information, covering orientation, safety, the history of cement, and applying…

  19. Health Instruction Packages: Cardiac Anatomy. (United States)

    Phillips, Gwen; And Others

    Text, illustrations, and exercises are utilized in these five learning modules to instruct nurses, students, and other health care professionals in cardiac anatomy and functions and in fundamental electrocardiographic techniques. The first module, "Cardiac Anatomy and Physiology: A Review" by Gwen Phillips, teaches the learner to draw…

  20. Interior Design: Teacher's Instructional Guide. (United States)

    Hays, Tricia

    This teacher's instructional guide, which is part of a family and consumer sciences education series focusing on a broad range of employment opportunities, is intended to assist teachers responsible for teaching one- and two-year interior design programs for Texas high school students. The following are among the items included: (1) introductory…

  1. Succession Planning for Library Instruction (United States)

    Sobel, Karen; Drewry, Josiah


    Detailed succession planning helps libraries pass information from one employee to the next. This is crucial in preparing for hiring, turnover, retirements, training of graduate teaching assistants in academic libraries, and other common situations. The authors of this article discuss succession planning for instruction programs in academic…

  2. Adaptive Instruction: Building on Diversity. (United States)

    Wang, Margaret C.


    The use of alternative instructional strategies and resources to meet the learning needs of individual students incorporates the diagnosis of student learning progress, the teaching of self-management skills, organizational supports, and family involvement into an effective educational program. (JN)

  3. Gestalt Theory and Instructional Design. (United States)

    Moore, Patrick; Fitz, Chad


    Offers a brief overview of Gestalt theory. Shows how six Gestalt principles (proximity, closure, symmetry, figure-ground segregation, good continuation, and similarity) can be applied to improve a reader's comprehension of a badly designed instruction module that uses several graphics. (SR)

  4. The Basics of Blended Instruction (United States)

    Tucker, Catlin R.


    Even though many of teachers do not have technology-rich classrooms, the rapidly evolving education landscape increasingly requires them to incorporate technology to customize student learning. Blended learning, with its mix of technology and traditional face-to-face instruction, is a great approach. Blended learning combines classroom learning…

  5. An Experiment in Museum Instruction. (United States)

    Bloomberg, Marguerite

    Various lesson plans for museum instruction were tested on fifth grade children of fair and high intelligence in an attempt to improve upon the "accepted method" of teaching, which was thought to be better suited to the child of low intelligence than to his abler classmates. The lesson plans tested were: (1) the accepted method…

  6. Market Segmentation: An Instructional Module. (United States)

    Wright, Peter H.

    A concept-based introduction to market segmentation is provided in this instructional module for undergraduate and graduate transportation-related courses. The material can be used in many disciplines including engineering, business, marketing, and technology. The concept of market segmentation is primarily a transportation planning technique by…

  7. Instructing the Online Catalog User. (United States)

    Miller, William


    This essay offers suggestions to make online public access catalogs (OPACs) less idiosyncratic and more usable. Discussion covers qualitative difference between online catalog and predecessors, challenge of debunking assumptions, skills for success, maintaining an instructional perspective, catalog development for the people by the people, and the…

  8. Instruction of Competent Psychomotor Skill (United States)

    Olson, Valerie Dong


    Instruction of competent psychomotor skill necessitates an eclectic approach. The principles of learning, complemented with learning styles and sensory modalities preferences, provide a background for teaching physical skills. The use of the psychomotor domain of Bloom's Taxonomy as a map and corresponding behavioral objectives foster the mastery…

  9. Attrition Cost Model Instruction Manual (United States)

    Yanagiura, Takeshi


    This instruction manual explains in detail how to use the Attrition Cost Model program, which estimates the cost of student attrition for a state's higher education system. Programmed with SAS, this model allows users to instantly calculate the cost of attrition and the cumulative attrition rate that is based on the most recent retention and…

  10. Women Administrators as Instructional Leaders (United States)

    Horner, Beth A.


    Women are under-represented in educational research and are much less likely to hold administrative positions than are men. This study, using the Liberal Feminist Theory and Structural Barrier Theory, proffers possible explanations for this phenomenon. Four women leaders were interviewed to gain insight into their instructional leadership…

  11. International Instructional Systems: Social Studies (United States)

    Brant, Jacek; Chapman, Arthur; Isaacs, Tina


    This paper reports on research conducted as part of the International Instructional System Study that explored five subject areas across nine jurisdictions in six high-performing countries. The Study's overall aim was to understand what, if anything, there is in common in the curricula and assessment arrangements among the high-performing…

  12. Transportation Brokerage: An Instructional Module. (United States)

    Hayden, Linda

    A concept-based introduction to transportation brokerage is provided in this instructional module for undergraduate and graduate transportation-related courses for disciplines such as engineering, business, marketing, and technology. The concept of transportation brokerage is defined as an assignment of the management of a specific element of a…

  13. Computer Assisted Instruction in Basic. (United States)


    LIBRARY........................16 Program Purpose.........................16 Flowcharts ..........................17 Lessons...17IFlowchart For Main Menu...............19 Flowchart for Lessons One Through Six......................20 CHAPTER Page Tests I1-6 .* 21 Flowchart For...Software support was limited to off-the-shelf packages. All of the computers were purchased with Beginners All Purpose Instruction Code (BASIC), a word

  14. Sandia National Laboratories: National Security Missions: Defense Systems (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  15. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V


    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes


    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. Department of Defense Intelligence Information System (DoDIIS). Instructions 2000 (United States)


    Specification (I&RTS). DC6 Every DoDIIS site shall complete the transition of its installed computing and processing base to the DII COE standards and... and processing base to the DII COE standards and protocols by the date specified in the DoDIIS Calendar. General segmentation guidelines are as follows...defined in the DII COE Integration and Runtime Specification (I&RTS). DC6 Every DoDIIS site shall complete the transition of its installed computing

  18. 77 FR 39140 - Defense Federal Acquisition Regulation Supplement: Shipping Instructions (DFARS Case 2011-D052) (United States)


    ... origin contracts, Export Traffic Release regardless of FOB terms, or foreign military sales shipments...) Shipping documents covering f.o.b. origin shipments. (i) Procedures for the contractor to obtain bills of...

  19. 77 FR 4637 - Defense Federal Acquisition Regulation Supplement: Shipping Instructions (DFARS Case 2011-D052) (United States)


    .... origin contracts, Export Traffic Release regardless of f.o.b. terms, or foreign military sales shipments... use the DD Form 1659 when using the clauses at FAR 52.242-10, F.o.b. Origin--Government Bills of Lading or Prepaid Postage, or 52.242-11, F.o.b. Origin-- Government Bills of Lading or Indicia Mail...

  20. Effective instruction for English learners. (United States)

    Calderón, Margarita; Slavin, Robert; Sánchez, Marta


    The fastest-growing student population in U.S. schools today is children of immigrants, half of whom do not speak English fluently and are thus labeled English learners. Although the federal government requires school districts to provide services to English learners, it offers states no policies to follow in identifying, assessing, placing, or instructing them. Margarita Calderón, Robert Slavin, and Marta Sánchez identify the elements of effective instruction and review a variety of successful program models. During 2007-08, more than 5.3 million English learners made up 10.6 percent of the nation's K-12 public school enrollment. Wide and persistent achievement disparities between these English learners and English-proficient students show clearly, say the authors, that schools must address the language, literacy, and academic needs of English learners more effectively. Researchers have fiercely debated the merits of bilingual and English-only reading instruction. In elementary schools, English learners commonly receive thirty minutes of English as a Second Language (ESL) instruction but attend general education classes for the rest of the day, usually with teachers who are unprepared to teach them. Though English learners have strikingly diverse levels of skills, in high school they are typically lumped together, with one teacher to address their widely varying needs. These in-school factors contribute to the achievement disparities. Based on the studies presented here, Calderón, Slavin, and Sánchez assert that the quality of instruction is what matters most in educating English learners. They highlight comprehensive reform models, as well as individual components of these models: school structures and leadership; language and literacy instruction; integration of language, literacy, and content instruction in secondary schools; cooperative learning; professional development; parent and family support teams; tutoring; and monitoring implementation and outcomes

  1. 48 CFR 215.403-5 - Instructions for submission of cost or pricing data or information other than cost or pricing data. (United States)


    ... submission of cost or pricing data or information other than cost or pricing data. 215.403-5 Section 215.403... DEFENSE CONTRACTING METHODS AND CONTRACT TYPES CONTRACTING BY NEGOTIATION Contract Pricing 215.403-5 Instructions for submission of cost or pricing data or information other than cost or pricing data. When the...

  2. The eye movement desensitization and reprocessing procedure prevents defensive processing in health persuasion. (United States)

    Dijkstra, Arie; van Asten, Regine


    In the present study, the method of eye movement desensitization and reprocessing (EMDR) is studied to understand and prevent defensive reactions with regard to a negatively framed message advocating fruit and vegetable consumption. EMDR has been shown to tax the working memory. Participants from a university sample (n = 124) listened to the persuasive message in a randomized laboratory experiment. In the EMDR condition, they were also instructed to follow with their eyes a dot on the computer screen. The dot constantly moved from one side of the screen to the other in 2 seconds. In addition, a self-affirmation procedure was applied in half of the participants. EMDR led to a significant increase in persuasion, only in recipients in whom the persuasive message could be expected to activate defensive self-regulation (in participants with a moderate health value and in participants with low self-esteem). In those with a moderate health value, EMDR increased persuasion, but only when recipients were not affirmed. In addition, EMDR increased persuasion only in recipients with low self-esteem, not in those with high self-esteem. These results showed that EMDR influenced persuasion and in some way lowered defensive reactions. The similarities and differences in effects of EMDR and self-affirmation further increased our insight into the psychology of defensiveness.

  3. Bibliographic Instruction in the 21st Century. (United States)

    Poirier, Gayle


    Discusses bibliographic instruction in libraries. Topics include a history of bibliographic instruction; the Internet and electronic searching; librarians' use of technology; defining information needs; locating and accessing information, including classification systems and Boolean searching; evaluating information; using and communication…

  4. Removing Administrative Impediments to Instructional Improvement Efforts. (United States)

    Anderson, Lorin W.; Pigford, Aretha B.


    Principals can and should develop strategies that will enable them to provide instructional leadership despite increased demands from other tasks. Recommended actions include: delegation; peer observation; commitment to instructional leadership; and effective communication with teachers. (CB)

  5. Piano instruction for nursery school trainees


    新海, 節; Makoto, SHINKAI; 藤女子大学人間生活学部保育学科


    It is important piano instruction in childcare training schools be viewed primarily as "music for childcare". To this end,it is also important that the view of piano instruction for nursery school trainees be switched from one mainly focused on the technical aspects of performance using many etudes to a form of instruction based on developing the musicality of the trainees and their ability to display emotion through music. Further, through this instruction, the trainees need to develop the a...

  6. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library


    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  7. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library


    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  8. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton


    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  9. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library


    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  10. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library


    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  11. Technology Use in Higher Education Instruction (United States)

    Elzarka, Sammy


    The significance of integrating technology use in higher education instruction is undeniable. The benefits include those related to access to instruction by underserved populations, adequately preparing students for future careers, capitalizing on best instructional practices, developing higher order thinking activities, and engaging students…

  12. On the Practice Architectures of Instructional Leadership (United States)

    Salo, Petri; Nylund, Jan; Stjernstrøm, Else


    This paper explores the concept of instructional leadership and principals' perceptions of the practices of instructional leadership. Despite the emphasis on the effects of school leadership regarding teaching practices and learning outcomes, research on direct instructional leadership is scarce. It is focused either on identifying overall…

  13. Students and Instructors Opinions about Piano Instruction (United States)

    Kilic, Deniz Beste Çevik


    This study examined the opinions of the students and piano instructors in the Turkish Education Faculties' Fine Arts Instruction Departments' music instruction programs about piano instruction. The study data were collected using a questionnaire administered to the piano instructors and the students who took lessons from them. The study results…

  14. Explicit Instruction Elements in Core Reading Programs (United States)

    Child, Angela R.


    Classroom teachers are provided instructional recommendations for teaching reading from their adopted core reading programs (CRPs). Explicit instruction elements or what is also called instructional moves, including direct explanation, modeling, guided practice, independent practice, discussion, feedback, and monitoring, were examined within CRP…

  15. A Performance-Based Instructional Theory (United States)

    Lawson, Tom E.


    The rationale for a performanced- based instructional theory has arisen from significant advances during the past several years in instructional psychology. Four major areas of concern are: analysis of subject-matter content in terms of performance competencies, diagnosis of pre-instructional behavior, formulation of an instructional…

  16. Effective Instruction: A Mathematics Coach's Perspective (United States)

    Nebesniak, Amy L.


    Effective instruction is multifaceted, dependent largely on the context and, consequently, on numerous variables. Although "effective instruction" is difficult to define, in the author's experience--and as the work of mathematics education specialists and researchers indicates--three key features of quality instruction stand out: (1) Teaching…

  17. Changing Student Teachers' Views of Comprehension Instruction ...

    African Journals Online (AJOL)

    At the same time research shows that little, if any, explicit and continuous strategy instruction takes place in classrooms. Reasons seem ... This article reports on the effect of a reading comprehension instruction course on university student teachers' lesson planning, strategy use and views about comprehension instruction.

  18. Instructional Cost Analysis: History and Present Inadequacies. (United States)

    Humphrey, David A.

    The cost analysis of instruction is conducted according to principles of teaching and learning that have often become historically dated. Using today's costing systems prevents determination of whether cost effectiveness actually exists. The patterns of instruction in higher education and the systems employed for instructional cost analysis are…

  19. Rapid Prototyping: An Alternative Instructional Design Strategy. (United States)

    Tripp, Steven D.; Bichelmeyer, Barbara


    Discusses the nature of instructional design and describes rapid prototyping as a feasible model for instructional system design (ISD). The use of prototyping in software engineering is described, similarities between software design and instructional design are discussed, and an example is given which uses rapid prototyping in designing a…

  20. Four Practical Principles for Enhancing Vocabulary Instruction (United States)

    Manyak, Patrick C.; Von Gunten, Heather; Autenrieth, David; Gillis, Carolyn; Mastre-O'Farrell, Julie; Irvine-McDermott, Elizabeth; Baumann, James F.; Blachowicz, Camille L. Z.


    This article presents four practical principles that lead to enhanced word-meaning instruction in the elementary grades. The authors, a collaborative team of researchers and classroom teachers, identified and developed these principles and related instructional activities during a three-year vocabulary instruction research project. The principles…

  1. How can we make user instructions motivational?

    NARCIS (Netherlands)

    Steehouder, M.F.; Loorbach, N.R.


    Good technical instructions are often viewed as 'cool, concise and professional', but there are good arguments to pay attention to their persuasive and motivational aspects as well. Until now, only analyses of existing instructions have been published, while guidelines for making instructions

  2. Direct Reading Instruction and the NYS ELA (United States)

    Jones-Carey, Margaret H.


    This study analyzed the impact of classroom based reading instruction ("direct instruction") on the standardized test scores of 6th grade students as measured by the New York State English Language Arts assessment (NYS ELA). It was hypothesized that the implementation of direct instruction in reading in grade 6 would improve NYS ELA…

  3. Direct Vocabulary Instruction in Preschool: A Comparison of Extended Instruction, Embedded Instruction, and Incidental Exposure (United States)

    Loftus-Rattan, Susan M.; Mitchell, Alison M.; Coyne, Michael D.


    Based on its coincidence with a significant period in language development for children, preschool provides a favorable setting to foster vocabulary growth. The purpose of this study was to evaluate the effectiveness of two instructional conditions and an incidental exposure condition for teaching targeted vocabulary words to preschool students…

  4. Demonstrating Empathy: A Phenomenological Study of Instructional Designers Making Instructional Strategy Decisions for Adult Learners (United States)

    Vann, Linda S.


    Instructional designers are tasked with making instructional strategy decisions to facilitate achievement of learning outcomes as part of their professional responsibilities. While the instructional design process includes learner analysis, that analysis alone does not embody opportunities to assist instructional designers with demonstrations of…

  5. 30 CFR 48.25 - Training of new miners; minimum courses of instruction; hours of instruction. (United States)


    ...; minimum courses of instruction; hours of instruction. (a) Each new miner shall receive no less than 24...: Provided, That no less than 8 hours of training shall in all cases be given to new miners before they are... instruction; hours of instruction. 48.25 Section 48.25 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION...

  6. Evaluation of a Theory of Instructional Sequences for Physics Instruction (United States)

    Wackermann, Rainer; Trendel, Georg; Fischer, Hans E.


    The background of the study is the theory of basis models of teaching and learning, a comprehensive set of models of learning processes which includes, for example, learning through experience and problem-solving. The combined use of different models of learning processes has not been fully investigated and it is frequently not clear under what circumstances a particular model should be used by teachers. In contrast, the theory under investigation here gives guidelines for choosing a particular model and provides instructional sequences for each model. The aim is to investigate the implementation of the theory applied to physics instruction and to show if possible effects for the students may be attributed to the use of the theory. Therefore, a theory-oriented education programme for 18 physics teachers was developed and implemented in the 2005/06 school year. The main features of the intervention consisted of coaching physics lessons and video analysis according to the theory. The study follows a pre-treatment-post design with non-equivalent control group. Findings of repeated-measures ANOVAs show large effects for teachers' subjective beliefs, large effects for classroom actions, and small to medium effects for student outcomes such as perceived instructional quality and student emotions. The teachers/classes that applied the theory especially well according to video analysis showed the larger effects. The results showed that differentiating between different models of learning processes improves physics instruction. Effects can be followed through to student outcomes. The education programme effect was clearer for classroom actions and students' outcomes than for teachers' beliefs.

  7. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems. (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V


    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  8. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.


    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  9. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald


    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  10. Educating Jurors about Forensic Evidence: Using an Expert Witness and Judicial Instructions to Mitigate the Impact of Invalid Forensic Science Testimony. (United States)

    Eastwood, Joseph; Caldwell, Jiana


    Invalid expert witness testimony that overstated the precision and accuracy of forensic science procedures has been highlighted as a common factor in many wrongful conviction cases. This study assessed the ability of an opposing expert witness and judicial instructions to mitigate the impact of invalid forensic science testimony. Participants (N = 155) acted as mock jurors in a sexual assault trial that contained both invalid forensic testimony regarding hair comparison evidence, and countering testimony from either a defense expert witness or judicial instructions. Results showed that the defense expert witness was successful in educating jurors regarding limitations in the initial expert's conclusions, leading to a greater number of not-guilty verdicts. The judicial instructions were shown to have no impact on verdict decisions. These findings suggest that providing opposing expert witnesses may be an effective safeguard against invalid forensic testimony in criminal trials. © 2015 American Academy of Forensic Sciences.

  11. Instructional Leadership and Schools Effectiveness (United States)

    Hung, Daisy Kee Mui; Ponnusamy, Premavathy

    With the influx of information technology through the Internet and the use of ICT in our daily lives, our future generation has traversed from a mere change of era to a dynamic era of change. Thus, the role of school leaders is becoming more challenging than ever. They need to make greater strides to ensure that they are able to make adjustments and readjustments in instructional practices to cater for the changing elements in their organization. In brief, the school leaders have to be creative, innovative with entrepreneurial drive in order to steer their subordinates (teachers) towards school excellence. Leadership of principal is therefore considered as a main criterion to create successful schools in country's educational advancement. Besides, the school effectiveness plays a crucial role in country's academic advancement. This paper focuses on a comprehensive review of literature on the relationship between instructional leadership and school effectiveness.

  12. Collaboration systems for classroom instruction (United States)

    Chen, C. Y. Roger; Meliksetian, Dikran S.; Chang, Martin C.


    In this paper we discuss how classroom instruction can benefit from state-of-the-art technologies in networks, worldwide web access through Internet, multimedia, databases, and computing. Functional requirements for establishing such a high-tech classroom are identified, followed by descriptions of our current experimental implementations. The focus of the paper is on the capabilities of distributed collaboration, which supports both synchronous multimedia information sharing as well as a shared work environment for distributed teamwork and group decision making. Our ultimate goal is to achieve the concept of 'living world in a classroom' such that live and dynamic up-to-date information and material from all over the world can be integrated into classroom instruction on a real-time basis. We describe how we incorporate application developments in a geography study tool, worldwide web information retrievals, databases, and programming environments into the collaborative system.


    CERN Multimedia

    TIS Secretariat


    Please note that the SAFETY INSTRUCTION N0 49 (IS 49) and the SAFETY NOTE N0 28 (NS 28) entitled respectively 'AVOIDING CHEMICAL POLLUTION OF WATER' and 'CERN EXHIBITIONS - FIRE PRECAUTIONS' are available on the web at the following urls: and Paper copies can also be obtained from the TIS Divisional Secretariat, email:

  14. [Study of defense styles, defenses and coping strategies in alcohol-dependent population]. (United States)

    Ribadier, A; Varescon, I


    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  15. Instructional skills evaluation in nuclear industry training

    International Nuclear Information System (INIS)

    Mazour, T.J.; Ball, F.M.


    This report provides information to nuclear power plant training managers and their staffs concerning the job performance requirements of instructional personnel to implement prformance-based training programs (also referred to as the Systems Approach Training). The information presented in this report is a compilation of information and lessons learned in the nuclear power industry and in other industries using performance-based training programs. The job performance requirements in this report are presented as instructional skills objectives. The process used to develop the instructional skills objectives is described. Each objective includes an Instructional Skills Statement describing the behavior that is expected and an Instructional Skills Standard describing the skills/knowledge that the individual should possess in order to have achieved mastery. The instructional skills objectives are organized according to the essential elements of the Systems Approach to Training and are cross-referenced to three categories of instructional personnel: developers of instruction, instructors, and instructional managers/supervisors. Use of the instructional skills objectives is demonstrated for reviewing instructional staff training and qualification programs, developing criterion-tests, and reviewing the performance and work products of individual staff members. 22 refs

  16. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas


    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  17. 29 CFR 1630.15 - Defenses. (United States)


    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  18. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library


    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  19. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library


    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  20. Defensive Swarm: An Agent Based Modeling Analysis (United States)


    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  1. Defense Meteorological Satellite Program (DMSP) Film (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  2. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G


    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  3. Formerly Used Defense Sites (FUDS) Public Properties (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  4. Happiness and Defense Styles in Psychiatrists. (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury


    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  5. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian


    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  6. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M


    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  7. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L


    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  8. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.


    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  9. Cost Effective Regional Ballistic Missile Defense (United States)


    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  10. Carp erythrodermatitis : host defense-pathogen interaction


    Pourreau, C.N.


    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  11. Defense Acquisition Reform, 19602009: An Elusive Goal (United States)


    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  12. Integrating the Department of Defense Supply Chain (United States)


    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  13. Waste Generator Instructions: Key to Successful Implementation of the US DOE's 435.1 for Transuranic Waste Packaging Instructions (LA-UR-12-24155) - 13218

    International Nuclear Information System (INIS)

    French, David M.; Hayes, Timothy A.; Pope, Howard L.; Enriquez, Alejandro E.; Carson, Peter H.


    In times of continuing fiscal constraints, a management and operation tool that is straightforward to implement, works as advertised, and virtually ensures compliant waste packaging should be carefully considered and employed wherever practicable. In the near future, the Department of Energy (DOE) will issue the first major update to DOE Order 435.1, Radioactive Waste Management. This update will contain a requirement for sites that do not have a Waste Isolation Pilot Plant (WIPP) waste certification program to use two newly developed technical standards: Contact-Handled Defense Transuranic Waste Packaging Instructions and Remote-Handled Defense Transuranic Waste Packaging Instructions. The technical standards are being developed from the DOE O 435.1 Notice, Contact-Handled and Remote-Handled Transuranic Waste Packaging, approved August 2011. The packaging instructions will provide detailed information and instruction for packaging almost every conceivable type of transuranic (TRU) waste for disposal at WIPP. While providing specificity, the packaging instructions leave to each site's own discretion the actual mechanics of how those Instructions will be functionally implemented at the floor level. While the Technical Standards are designed to provide precise information for compliant packaging, the density of the information in the packaging instructions necessitates a type of Rosetta Stone that translates the requirements into concise, clear, easy to use and operationally practical recipes that are waste stream and facility specific for use by both first line management and hands-on operations personnel. The Waste Generator Instructions provide the operator with step-by-step instructions that will integrate the sites' various operational requirements (e.g., health and safety limits, radiological limits or dose limits) and result in a WIPP certifiable waste and package that can be transported to and emplaced at WIPP. These little known but widely productive Waste

  14. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney


    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  15. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library


    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  16. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri


    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  17. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.


    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  18. The methodological defense of realism scrutinized. (United States)

    Wray, K Brad


    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Cometary Defense with Directed Energy (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.


    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  20. 47 CFR 90.411 - Civil defense communications. (United States)


    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  1. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  2. 32 CFR 245.12 - Amplifying instructions. (United States)


    ... flights, agricultural and forest fire flights, border patrol flights, and other essential civil air... Defense Sector (NEADS) Boston, Chicago, Cleveland, Minneapolis, New York, Indianapolis, Kansas City...

  3. Examining the influence of acute instructional approaches on the decision-making performance of experienced team field sport players. (United States)

    Buszard, Tim; Farrow, Damian; Kemp, Justin


    We examined the influence of instructions on decision-making accuracy using video simulations of game-specific scenarios in Australian football. Skilled performers (average age of 23.4 ± 4.2 years) differing in experience (range 0 to 339 Australian Football League (AFL) matches) assumed the role of the key attacker and verbally indicated their kicking decision. Participants were randomly stratified into three groups: (1) LOOSE (n = 15)--instructed to "keep the ball away from the loose defender"; (2) TTF (n = 15) - instructed to "take the first option"; and (3) NI (control) (n = 16)--given no instructions. Gaze behaviour for a subset of participants (n = 20) was recorded. In the scenarios with an even number of attacking and defensive players, the decision-making accuracy of LOOSE was greater than TTF. This difference was most evident for lesser experienced performers, highlighting that lesser experienced performers are more affected by instructional foci than experienced performers. Gaze behaviour was not affected by instructional foci, but visual search rate was greater in scenarios of greater player number and complexity.

  4. Effective Instruction of Public Speaking


    竹野, 茂; Shigeru, TAKENO


    This paper explores the instruction of public speaking in a large-size class. The author has been in charge of the speech classes,SPEECH III and SPEECH IV mainly for the second year students at Miyazaki Municipal University for several years. At the preparation stage of SPEECH III, and IV, he intended that the class size was about 30 students as one group in the lecture style. But, in reality, more than 50 students took the course. Then he had to rethink the way of teaching. To solve the prob...

  5. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois


    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  6. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process. (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  7. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor... (United States)


    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  8. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor... (United States)


    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  9. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process. (United States)


    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  10. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu


    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  11. 32 CFR 636.32 - Miscellaneous instructions. (United States)


    ... National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND... that housing area streets are extremely dangerous and that playing in the street is prohibited. (2) Bus... actually in the roadway while awaiting arrival of the school bus. (3) Complaints received by the MP desk...

  12. Review of defense display research programs (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan


    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  13. Immune defense and host life history. (United States)

    Zuk, Marlene; Stoehr, Andrew M


    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  14. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.


    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  15. DCT-based cyber defense techniques (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer


    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  16. Precipitation affects plant communication and defense. (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard


    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  17. Graduates perception towards instructional methods of emergency ...

    African Journals Online (AJOL)

    Graduates perception towards instructional methods of emergency medicine: affecting their self-confidence in emergency departments. Mohamed Daffalla Awadalla, Ahmed Abd Elrahman Abdalla, Sami Mahjoub Taha ...

  18. The Multimodal Possibilities of Online Instructions

    DEFF Research Database (Denmark)

    Kampf, Constance


    The WWW simplifies the process of delivering online instructions through multimodal channels because of the ease of use for voice, video, pictures, and text modes of communication built into it.  Given that instructions are being produced in multimodal format for the WWW, how do multi-modal analy......The WWW simplifies the process of delivering online instructions through multimodal channels because of the ease of use for voice, video, pictures, and text modes of communication built into it.  Given that instructions are being produced in multimodal format for the WWW, how do multi...

  19. Review of Instructional Approaches in Ethics Education. (United States)

    Mulhearn, Tyler J; Steele, Logan M; Watts, Logan L; Medeiros, Kelsey E; Mumford, Michael D; Connelly, Shane


    Increased investment in ethics education has prompted a variety of instructional objectives and frameworks. Yet, no systematic procedure to classify these varying instructional approaches has been attempted. In the present study, a quantitative clustering procedure was conducted to derive a typology of instruction in ethics education. In total, 330 ethics training programs were included in the cluster analysis. The training programs were appraised with respect to four instructional categories including instructional content, processes, delivery methods, and activities. Eight instructional approaches were identified through this clustering procedure, and these instructional approaches showed different levels of effectiveness. Instructional effectiveness was assessed based on one of nine commonly used ethics criteria. With respect to specific training types, Professional Decision Processes Training (d = 0.50) and Field-Specific Compliance Training (d = 0.46) appear to be viable approaches to ethics training based on Cohen's d effect size estimates. By contrast, two commonly used approaches, General Discussion Training (d = 0.31) and Norm Adherence Training (d = 0.37), were found to be considerably less effective. The implications for instruction in ethics training are discussed.

  20. Tutorial Instruction in Science Education

    Directory of Open Access Journals (Sweden)

    Rhea Miles


    Full Text Available The purpose of the study is to examine the tutorial practices of in-service teachers to address the underachievement in the science education of K-12 students. Method: In-service teachers in Virginia and North Carolina were given a survey questionnaire to examine how they tutored students who were in need of additional instruction. Results: When these teachers were asked, “How do you describe a typical one-on-one science tutorial session?” the majority of their responses were categorized as teacher-directed. Many of the teachers would provide a science tutorial session for a student after school for 16-30 minutes, one to three times a week. Respondents also indicated they would rely on technology, peer tutoring, scientific inquiry, or themselves for one-on-one science instruction. Over half of the in-service teachers that responded to the questionnaire stated that they would never rely on outside assistance, such as a family member or an after school program to provide tutorial services in science. Additionally, very few reported that they incorporated the ethnicity, culture, or the native language of ELL students into their science tutoring sessions.

  1. Learning from Narrated Instruction Videos. (United States)

    Alayrac, Jean-Baptiste; Bojanowski, Piotr; Agrawal, Nishant; Sivic, Josef; Laptev, Ivan; Lacoste-Julien, Simon


    Automatic assistants could guide a person or a robot in performing new tasks, such as changing a car tire or repotting a plant. Creating such assistants, however, is non-trivial and requires understanding of visual and verbal content of a video. Towards this goal, we here address the problem of automatically learning the main steps of a task from a set of narrated instruction videos. We develop a new unsupervised learning approach that takes advantage of the complementary nature of the input video and the associated narration. The method sequentially clusters textual and visual representations of a task, where the two clustering problems are linked by joint constraints to obtain a single coherent sequence of steps in both modalities. To evaluate our method, we collect and annotate a new challenging dataset of real-world instruction videos from the Internet. The dataset contains videos for five different tasks with complex interactions between people and objects, captured in a variety of indoor and outdoor settings. We experimentally demonstrate that the proposed method can automatically discover, learn and localize the main steps of a task input videos.

  2. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol


    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  3. Defensive medicine: No wonder policymakers are confused. (United States)

    Kapp, Marshall B


    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  4. Antiviral Defense Mechanisms in Honey Bees (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.


    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  5. Advanced thermal management technologies for defense electronics (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram


    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  6. Salt, chloride, bleach, and innate host defense (United States)

    Wang, Guoshun; Nauseef, William M.


    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  7. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)


    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  8. Salt, chloride, bleach, and innate host defense. (United States)

    Wang, Guoshun; Nauseef, William M


    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  9. Elementary Students' Retention of Environmental Science Knowledge: Connected Science Instruction versus Direct Instruction (United States)

    Upadhyay, Bhaskar; DeFranco, Cristina


    This study compares 3rd-grade elementary students' gain and retention of science vocabulary over time in two different classes--"connected science instruction" versus "direct instruction." Data analysis yielded that students who received connected science instruction showed less gain in science knowledge in the short term compared to students who…

  10. Instructed Pragmatics at a Glance: Where Instructional Studies Were, Are, and Should Be Going (United States)

    Taguchi, Naoko


    This paper brings together the research and developments of instructed pragmatics over the past three decades by reporting the synthesis findings of instructional intervention studies in interlanguage pragmatics. Two questions have guided this investigation: (1) is instruction effective in learning pragmatics?; and (2) what methods are most…

  11. 32 CFR 13.4 - Duties and responsibilities of the defense. (United States)


    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  12. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012... (United States)


    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  13. Instructable autonomous agents. Ph.D. Thesis (United States)

    Huffman, Scott Bradley


    In contrast to current intelligent systems, which must be laboriously programmed for each task they are meant to perform, instructable agents can be taught new tasks and associated knowledge. This thesis presents a general theory of learning from tutorial instruction and its use to produce an instructable agent. Tutorial instruction is a particularly powerful form of instruction, because it allows the instructor to communicate whatever kind of knowledge a student needs at whatever point it is needed. To exploit this broad flexibility, however, a tutorable agent must support a full range of interaction with its instructor to learn a full range of knowledge. Thus, unlike most machine learning tasks, which target deep learning of a single kind of knowledge from a single kind of input, tutorability requires a breadth of learning from a broad range of instructional interactions. The theory of learning from tutorial instruction presented here has two parts. First, a computational model of an intelligent agent, the problem space computational model, indicates the types of knowledge that determine an agent's performance, and thus, that should be acquirable via instruction. Second, a learning technique, called situated explanation specifies how the agent learns general knowledge from instruction. The theory is embodied by an implemented agent, Instructo-Soar, built within the Soar architecture. Instructo-Soar is able to learn hierarchies of completely new tasks, to extend task knowledge to apply in new situations, and in fact to acquire every type of knowledge it uses during task performance - control knowledge, knowledge of operators' effects, state inferences, etc. - from interactive natural language instructions. This variety of learning occurs by applying the situated explanation technique to a variety of instructional interactions involving a variety of types of instructions (commands, statements, conditionals, etc.). By taking seriously the requirements of flexible

  14. Effects of Instruction and Stage-Fright on Intelligence Testing (United States)

    Meijer, Joost; Oostdam, Ron


    In the present research, it was tried to unravel the influence of various types of instruction on test anxiety levels and, in turn, its influence on intelligence test performance. Three types of instruction were compared: a stressful, achievement-orientated instruction; a reassuring, task-orientated instruction; and an ambiguous instruction.…

  15. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen


    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  16. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)


    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  17. Using Informal Classroom Observations to Improve Instruction (United States)

    Ing, Marsha


    Purpose: The purpose of this study is to describe the variability of principals' classroom observations across schools and to relate classroom observations to the schools' instructional climate. This helps identify the conditions under which classroom observations effectively improve instruction in some schools and not in other schools.…

  18. Instructional Technology in Brazil: A Status Report (United States)

    Saettler, Paul


    A status report on the evolving conceptions of instructional technology and current applications in Brazil. A complementary purpose is to summarize those conditions which vitally influence the general characteristics of the Brazilian educational system and the nature of instructional technology in this major developing country of the world.…

  19. A Taxonomy of Asynchronous Instructional Video Styles (United States)

    Chorianopoulos, Konstantinos


    Many educational organizations are employing instructional videos in their pedagogy, but there is a limited understanding of the possible video formats. In practice, the presentation format of instructional videos ranges from direct recording of classroom teaching with a stationary camera, or screencasts with voiceover, to highly elaborate video…

  20. Self-Paced Instruction: Hello, Education (United States)

    Leuba, Richard J.; Flammer, Gordon H.


    Answers criticisms of self-paced instruction (SPI) by citing advantages of SPI over lecture methods. Concludes that criticisms of SPI are useful since they indicate in which areas further research should be conducted to improve this method of instruction. (MLH)

  1. Using Blogs to Improve Differentiated Instruction (United States)

    Colombo, Michaela W.; Colombo, Paul D.


    The authors discuss how the instructional impact of science teachers can be extended by using blogs, a technology popular among students that allows teachers to differentiate their instruction for students with diverse needs. Software now makes it easy for teachers to establish class blogs, Web sites that contain text, audio, and video postings on…

  2. Making the Most of Instructional Coaches (United States)

    Kane, Britnie Delinger; Rosenquist, Brooks


    Although coaching holds great promise for professional development, instructional coaches are often asked to take on responsibilities that are not focused on improving instruction. The authors discuss a quantitative study of four school districts and a qualitative analysis of a single district that, together, reveal how hiring practices and school…

  3. Classroom Instruction: The Influences of Marie Clay (United States)

    McNaughton, Stuart


    Marie Clay's body of work has influenced classroom instruction in direct and indirect ways, through large overarching themes in our pedagogical content knowledge as well as specific smart practices. This paper focuses on her the contributions to our thinking about instruction which come from two broad theoretical concepts; emergent literacy…

  4. Thread extraction for polyadic instruction sequences

    NARCIS (Netherlands)

    Bergstra, J.; Middelburg, C.


    In this paper, we study the phenomenon that instruction sequences are split into fragments which somehow produce a joint behaviour. In order to bring this phenomenon better into the picture, we formalize a simple mechanism by which several instruction sequence fragments can produce a joint

  5. Understanding instructions for oral rehydration therapy. (United States)

    Eisemon, T O; Patel, V L


    Oral rehydration mixtures are readily available in rural Kenya, but the instructions that accompany them are not always clear. Mothers will understand such instructions more readily if they explain the principles of oral rehydration and describe in a logical way the sequence of procedures to be followed.

  6. Implicit and Explicit Instruction of Spelling Rules (United States)

    Kemper, M. J.; Verhoeven, L.; Bosman, A. M. T.


    The study aimed to compare the differential effectiveness of explicit and implicit instruction of two Dutch spelling rules. Students with and without spelling disabilities were instructed a spelling rule either implicitly or explicitly in two experiments. Effects were tested in a pretest-intervention-posttest control group design. Experiment 1…

  7. 25 CFR 67.15 - Special instructions. (United States)


    ... Area Director, the Assistant Secretary may issue special instructions not inconsistent with the... 25 Indians 1 2010-04-01 2010-04-01 false Special instructions. 67.15 Section 67.15 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR TRIBAL GOVERNMENT PREPARATION OF A ROLL OF INDEPENDENT...

  8. 25 CFR 61.15 - Special instructions. (United States)


    ... Secretary may issue special instructions not inconsistent with the regulations in this part 61. ... 25 Indians 1 2010-04-01 2010-04-01 false Special instructions. 61.15 Section 61.15 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR TRIBAL GOVERNMENT PREPARATION OF ROLLS OF INDIANS § 61...

  9. How Instructional Systems Will Manage Learning (United States)

    Flanagan, John C.


    Discusses trends toward the systems approach in education including the development of effective instructional systems in government and industry; the introduction of teaching machines, programed learning, and computer- assisted instruction; and the increase in both the amount and sophistication of educational research and development. (JF)

  10. Modelling Web-Based Instructional Systems

    NARCIS (Netherlands)

    Retalis, Symeon; Avgeriou, Paris


    The size and complexity of modern instructional systems, which are based on the World Wide Web, bring about great intricacy in their crafting, as there is not enough knowledge or experience in this field. This imposes the use of new instructional design models in order to achieve risk-mitigation,

  11. Instructional Leadership in Elementary School Science (United States)

    Sherman, Ann; MacDonald, Leo


    Instructional leadership is internationally recognized as being a key role for school administrators to advance in their relationships with teachers. But what happens when a principal lacks content knowledge or specific pedagogical knowledge about certain curriculum areas? How do administrators support instructional practices of teachers who teach…

  12. Categories for Observing Language Arts Instruction (COLAI). (United States)

    Benterud, Julianna G.

    Designed to study individual use of time spent in reading during regularly scheduled language arts instruction in a natural classroom setting, this coding sheet consists of nine categories: (1) engagement, (2) area of language arts, (3) instructional setting, (4) partner (teacher or pupil(s)), (5) source of content, (6) type of unit, (7) assigned…

  13. Preparing Instructional Objectives: Agony or Ecstasy? (United States)

    Roberts, Wesley K.

    This paper 1) discusses the problems encountered in preparing objectives for instructional programs; 2) describes an informal research project in which seven instructional designers working on the same project attempted to determine agreement on an objective; and 3) suggests how to prepare objectives so that difficulties can be minimized. One…

  14. Misunderstanding during instructional communication as related to ...

    African Journals Online (AJOL)

    Misunderstanding during instructional communication as related to oral proficiency. ... Data were collected through video recorded observations of authentic lessons presented by 26 pre-service teachers using English second language as the medium of instruction in the classroom. Misunderstandings were identified and ...

  15. Orientation: Automotive Mechanics Instructional Program. Block 1. (United States)

    O'Brien, Ralph D.

    The first six instructional blocks in automotive mechanics, the lessons and supportive information in the document provide a guide for teachers in planning an instructional program in the basic theory and practice of a beginning course at the secondary and post-secondary level. The material, as organized, is a suggested sequence of instruction…

  16. Text-Picture Relations in Cooking Instructions

    NARCIS (Netherlands)

    van der Sluis, Ielka; Leito, Shadira; Redeker, Gisela; Bunt, Harry


    Like many other instructions, recipes on packages with ready-to-use ingredients for a dish combine a series of pictures with short text paragraphs. The information presentation in such multimodal instructions can be compact (either text or picture) and/or cohesive (text and picture). In an

  17. Delivering Instruction to Adult Learners. Revised Edition. (United States)

    Cantor, Jeffrey A.

    This one-stop guide for trainers and educators of adults in industry, business, or the professions details a results-oriented instructional strategy that is based on the following principles for instructing adults effectively: (1) act as a leader, helper, guide, change agent, coordinator, and facilitator of learning; (2) promote active…

  18. Softball: Special Olympics Sports Skills Instructional Program. (United States)

    Special Olympics, Inc., Washington, DC.

    One of seven instructional units on Special Olympics Sports Skills Instructional Programs, this guide presents suggestions for coaching softball for mentally retarded persons. An overview section provides information on teaching suggestions, followed by a list of program goals, objectives, and benefits. Sports skill assessments measure athletes'…

  19. Grouping and Organizing for Instruction in Reading. (United States)

    Ediger, Marlow

    Flexibility is a key term to emphasize when grouping students for instruction, since a student might be in a different group for one academic area as compared to another academic area. This paper describes grouping for different methods of reading instruction and other disciplines. The paper discusses the following: using basal readers, using…

  20. Energizing Learning: The Instructional Power of Conflict (United States)

    Johnson, David W.; Johnson, Roger T.


    Although intellectual conflict may be an important instructional tool (because of its potential constructive outcomes), conflict is rarely structured in instructional situations (because of its potential destructive outcomes). Many educators may be apprehensive about instigating intellectual conflict among students because of the lack of…

  1. The Pedagogy of Flipped Instruction in Oman (United States)

    Lane-Kelso, Mary


    "Flipping the classroom", or reverse instruction has been hailed the new pedagogical approach for preparing students for the 21st century. The idea behind this method is relatively simple. Instead of structuring class work to deliver direct instruction from the teacher in class and giving homework to students to practice outside of…

  2. Handwriting Instruction in Elementary Schools: Revisited! (United States)

    Asher, Asha; Estes, Joanne


    Handwriting is an essential literacy and communication skill developed through a variety of instructional methods in elementary school. This study explored the consistency in handwriting instruction across grade levels in a Midwest public school district 15 years after the school initially implemented a uniform handwriting program. Additionally,…

  3. Changing Throwing Pattern: Instruction and Control Parameter (United States)

    Southard, Dan


    The purpose of this study was to determine the effects of instruction and scaling up a control parameter (velocity of throw) on changes in throwing pattern. Sixty adult female throwers (ages 20-26 years) were randomly placed into one of four practice conditions: (a) scale up on velocity with no instruction, (b) maintain constant velocity with no…

  4. Putting the Fun Back into Fluency Instruction (United States)

    Cahill, Mary Ann; Gregory, Anne E.


    Based on recent research in fluency instruction, the authors present a scenario in which a teacher focuses her fluency instruction on authentic fluency tasks based in performance. Beginning with establishing a student-friendly definition of fluency and culminating with student engagement in fun fluency activities, this article explores the…

  5. Effects of Instructions on False Recognition. (United States)

    Mueller, John H.; And Others

    Four experiments were conducted to examine the effects of various processing instructions on the rate of false recognition. The continuous single-item procedure was used, and false recognitions of four types were examined: synonyms, antonyms, nonsemantic associates, and homonyms. The instructions encouraged subjects to think of associates, usages…

  6. Motivational Design in Information Literacy Instruction (United States)

    Hess, Amanda Nichols


    Motivational design theory complements instructional design theory and, when used together, both principles can affect learning, knowledge acquisition, and knowledge retention. In information literacy instruction, motivational design exists throughout the appropriate standards documents. However, there is limited current research on the best…

  7. Instructional Technology in the Armed Forces. (United States)

    Hitchens, Howard B., Jr.

    Broad areas of communications media used in technical training in specific occupational skills within the armed forces are examined in the first part of this report. These areas include: traditional audiovisual media, television, the techniques of programed instruction and instructional systems development, and the use of computers. In the second…

  8. The Future of Instructional Teacher Leader Roles (United States)

    Mangin, Melinda M.; Stoelinga, Sara Ray


    In response to increased performance expectations, schools and districts are turning to nonsupervisory, school-based, instructional teacher leader roles to help improve teachers' instruction and enhance student learning. Increased opportunities to learn about teacher leadership may facilitate the implementation and institutionalization of…

  9. Instructional Partnerships: A Pathway to Leadership (United States)

    Moreillon, Judi, Ed.; Ballard, Susan, Ed.


    In this Best of "Knowledge Quest" monograph, the editors have collected seminal articles to support pre-service and in-service school librarians in developing and strengthening the instructional partner role. "Instructional Partnerships: A Pathway to Leadership" provides readers with background knowledge, research-based…

  10. Instructional Strategy: Administration of Injury Scripts (United States)

    Schilling, Jim


    Context: Learning how to form accurate and efficient clinical examinations is a critical factor in becoming a competent athletic training practitioner, and instructional strategies differ for this complex task. Objective: To introduce an instructional strategy consistent with complex learning to encourage improved efficiency by minimizing…

  11. Instructional Podcasting with Undergraduate Digital Natives (United States)

    Thomas, Kevin M.; Willis, Dottie


    This paper analyzes the use of instructional podcasts with students in introductory computer application classes at a small, independent, private university. Participants were all undergraduates in the school of education. In an effort to model effective use of instructional technology for preservice teachers and to "meet digital native…

  12. Web-Based Instruction (WBI): An Introduction. (United States)

    Khan, Badrul H.


    Advances in information technology, coupled with changes in society, are creating new paradigms for education. The Web, as a medium of learning and instruction, has the potential to support the creation of well-designed resources. A table of features and components associated with Web-based instruction learning environments is provided.…

  13. Instructional Technology, Temper, Technique, and Teacher Empowerment. (United States)

    Hunter, J. Mark; Garrison, James W.


    Scientific management and hierarchical accountability tend to destroy dialogue and issue ideas as orders to be obeyed. Instructional technology packages can actually enslave teachers. The emendation or feedback loop built into all instructional systems should allow educators to alter design in the context of practice and help technologists design…

  14. Multimedia Instruction Initiative: Building Faculty Competence. (United States)

    Haile, Penelope J.

    Hofstra University began a university-wide initiative to enhance classroom instruction with multimedia technology and foster collaborative approaches to learning. The Multimedia Instruction Initiative emphasized teamwork among faculty, students, and computer center support staff to develop a technology-enriched learning environment supported by…

  15. Processing Instruction: A Review of Issues (United States)

    Rasuki, Muhlisin


    This paper provides a critical review of Processing Instruction (PI). This type of instructional option was specifically designed to help second/foreign language (L2) learners grasp meaning manifested in the use of particular grammatical forms in a target language effectively through the provision of input. In this way, PI attempts to help…

  16. Kinaesthetic activities in physics instruction

    DEFF Research Database (Denmark)

    Bruun, Jesper; Christiansen, Frederik V


    One of the major difficulties in learning physics is for students to develop a conceptual understanding of the core concepts of physics. Many authors argue that students’ conceptions of basic physical phenomena are rooted in basic schemas, originating in fundamental kinaesthetic experiences...... of being. We argue that this idea should be utilized in physics instruction, that kinaesthetic activities will provide useful entry point for students’ acquisition of the basic conceptions of physics, and that they can overcome the phenomenological gap between experiential and conceptual understanding. We...... discuss the nature of image schemas and focus particularly on one: effort-resistance-flow. This schema is fundamental not only in our everyday experience, but also in most of school physics. We show how enactment of a particular kinaesthetic model can support student understanding and intuition...

  17. Instructive for disposal of fluorescent

    International Nuclear Information System (INIS)

    Salazar Vargas, Gerlin


    An instructive is established for the management system of waste fluorescent lamps, ensuring the storage, collection, transportation, and final disposal. The lamp is changed by an official of the Seccion de Matenimiento Construccion of the Oficina de Servicios Generales or is produced with the support of an official of the unit. The fluorescent should be deposited in stock of materials of the building maintenance section or unit specified with the help of a staff and in appropriate conditions. The fluorescent lamp is transported according to the guidelines in the manual. A responsible company is contracted by la Vicerrectoria de Administracion of the Universidad de Costa Rica dedicated to the transport and proper handling of fluorescent lamps [es

  18. Computer-aided instruction system

    International Nuclear Information System (INIS)

    Teneze, Jean Claude


    This research thesis addresses the use of teleprocessing and time sharing by the RAX IBM system and the possibility to introduce a dialog with the machine to develop an application in which the computer plays the role of a teacher for different pupils at the same time. Two operating modes are thus exploited: a teacher-mode and a pupil-mode. The developed CAI (computer-aided instruction) system comprises a checker to check the course syntax in teacher-mode, a translator to trans-code the course written in teacher-mode into a form which can be processes by the execution programme, and the execution programme which presents the course in pupil-mode

  19. Instruction timing for the CDC 7600 computer

    International Nuclear Information System (INIS)

    Lipps, H.


    This report provides timing information for all instructions of the Control Data 7600 computer, except for instructions of type 01X, to enable the optimization of 7600 programs. The timing rules serve as background information for timing charts which are produced by a program (TIME76) of the CERN Program Library. The rules that co-ordinate the different sections of the CPU are stated in as much detail as is necessary to time the flow of instructions for a given sequence of code. Instruction fetch, instruction issue, and access to small core memory are treated at length, since details are not available from the computer manuals. Annotated timing charts are given for 24 examples, chosen to display the full range of timing considerations. (Author)

  20. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs


    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  1. Excessive Profits of German Defense Contractors (United States)


    its business unit Thyssen Krupp Marine Systems, is a German defense contractor. (2) Tognom AG Tognum AG owned the MTU Friedrichshafen GmbH before... Friedrichshafen provided engines for many ships of the German Navy and for German battle tanks, such as the Leopard I and Leopard II. MTU refers to the

  2. The Transferability and Retraining of Defense Engineers. (United States)

    Rittenhouse, Carl H.

    This study was undertaken to describe any special barriers to the transfer of engineers from defense to commercial work, and to evaluate retraining and reorientation techniques that might help ease the transfer. Interviews and questionnaires were used to obtain data from about 2,100 engineers and 100 managers in 14 industries. Characteristics,…

  3. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene


    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often


    African Journals Online (AJOL)


    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  5. Special Report: Fiscal Budget (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  6. Under Secretary of Defense (Comptroller) > Budget (United States)

    functionalStatements OUSD(C) History FMR Budget Materials Budget Execution Financial Management Improving Financial Performance Reports Regulations Press Release | Budget Briefing | Transcripts: David L. Norquist, Under PDF document. Click on Excel icon for Excel document Overview - FY2019 Defense Budget Performance

  7. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha


    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  8. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.


    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  9. - Special Report - Cybersecurity (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  10. Department of Defense Education Activity. An Overview. (United States)

    US Department of Defense, 2004


    DoDEA operates 223 public schools in 16 districts located in seven states, Puerto Rico, Guam, and 13 foreign countries to serve the children of military service members and Department of Defense civilian employees. Approximately 104,935 students are enrolled in DoDEA schools, with approximately 73,200 students in the DoDDS system, and…


    Directory of Open Access Journals (Sweden)

    Hakki BILGEN


    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  12. Preemptive strikes: Fear, hope, and defensive aggression. (United States)

    Halevy, Nir


    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  13. Innovation in the Defense Acquisition Enterprise (United States)


    uni- versities in the fields of innovation and entrepreneurship . Many books and articles have been written on innovation, perhaps none more has been the possible loss of freedom to make their own IR&D invest- ment decisions. That was never my intent . I once ran a major defense

  14. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin


    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  15. DefenseLink Special: Veterans Day 2006 (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  16. Prendre Au Serieux Les Jeux pedagogiques (Taking Instructional Games Seriously). (United States)

    Boudin, Herve


    Three types of instructional games (learning, practice, and creative) are distinguished and discussed, and their place in the second language classroom is considered. It is emphasized that instructional games should complement, not repeat, classroom instruction. (MSE)

  17. Axioms for behavioural congruence of single-pass instruction sequences

    NARCIS (Netherlands)

    Bergstra, J.A.; Middelburg, C.A.


    In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were

  18. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton


    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  19. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library


    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  20. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses. (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R


    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  1. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig


    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  2. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M


    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  3. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline


    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  4. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library


    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  5. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library


    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  6. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John


    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  7. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library


    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  8. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole


    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  9. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library


    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  10. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library


    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  11. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew


    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...


    Directory of Open Access Journals (Sweden)

    Isis Didier Lins


    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  13. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library


    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  14. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward


    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...


    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI


    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  16. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine


    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  17. Department of Defense Agency Financial Report for FY 2011 (United States)


    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  18. Defense Acquisition Reform: Background, Analysis, and Issues for Congress (United States)


    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  19. Effects of Cooperative and Individualistic Instructional Strategies On ...

    African Journals Online (AJOL)


    instructional strategies on students' problem solving abilities in secondary school chemistry ... individualistic instructional strategy and conventional teaching method. ..... solving abilities are best enhanced by cooperative learning environment.

  20. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.


    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  1. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties (United States)


    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  2. Design and Acquisition of Software for Defense Systems (United States)


    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  3. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments (United States)


    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  4. 12 CFR 411.500 - Secretary of Defense. (United States)


    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  5. 6 CFR 25.8 - Government contractor Defense. (United States)


    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  6. Using assessment to individualize early mathematics instruction. (United States)

    Connor, Carol McDonald; Mazzocco, Michèle M M; Kurz, Terri; Crowe, Elizabeth C; Tighe, Elizabeth L; Wood, Taffeta S; Morrison, Frederick J


    Accumulating evidence suggests that assessment-informed personalized instruction, tailored to students' individual skills and abilities, is more effective than more one-size-fits-all approaches. In this study, we evaluate the efficacy of Individualizing Student Instruction in Mathematics (ISI-Math) compared to Reading (ISI-Reading) where classrooms were randomly assigned to ISI-Math or ISI-Reading. The literature on child characteristics X instruction or skill X treatment interaction effects point to the complexities of tailoring instruction for individual students who present with constellations of skills. Second graders received mathematics instruction in small flexible learning groups based on their assessed learning needs. Results of the study (n=32 teachers, 370 students) revealed significant treatment effects on standardized mathematics assessments. With effect sizes (d) of 0.41-0.60, we show that we can significantly improve 2nd graders' mathematics achievement, including for children living in poverty, by using assessment data to individualize the mathematics instruction they receive. The instructional regime, ISI-Math, was implemented by regular classroom teachers and it led to about a 4-month achievement advantage on standardized mathematics tests when compared to students in control classrooms. These results were realized within one school year. Moreover, treatment effects were the same regardless of school-level poverty and students' gender, initial mathematics or vocabulary scores. Copyright © 2017 Society for the Study of School Psychology. Published by Elsevier Ltd. All rights reserved.

  7. Differentiating Science Instruction: Secondary science teachers' practices (United States)

    Maeng, Jennifer L.; Bell, Randy L.


    This descriptive study investigated the implementation practices of secondary science teachers who differentiate instruction. Participants included seven high school science teachers purposefully selected from four different schools located in a mid-Atlantic state. Purposeful selection ensured participants included differentiated instruction (DI) in their lesson implementation. Data included semi-structured interviews and field notes from a minimum of four classroom observations, selected to capture the variety of differentiation strategies employed. These data were analyzed using a constant-comparative approach. Each classroom observation was scored using the validated Differentiated Instruction Implementation Matrix-Modified, which captured both the extent to which critical indicators of DI were present in teachers' instruction and the performance levels at which they engaged in these components of DI. Results indicated participants implemented a variety of differentiation strategies in their classrooms with varying proficiency. Evidence suggested all participants used instructional modifications that required little advance preparation to accommodate differences in students' interests and learning profile. Four of the seven participants implemented more complex instructional strategies that required substantial advance preparation by the teacher. Most significantly, this study provides practical strategies for in-service science teachers beginning to differentiate instruction and recommendations for professional development and preservice science teacher education.

  8. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library


    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A


    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  15. Evaluating Modern Defenses Against Control Flow Hijacking (United States)


    instructions go bad: Generalizing return-oriented programming to risc . In In Proceedings of the 15th ACM conference on Computer and communications se... Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering at the MASSACHUSETTS...Department of Electrical Engineering and Computer Science

  16. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed... (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  17. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  18. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market (United States)


    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  19. Poster session in instructional technology course (United States)

    Diniaty, Artina; Fauzi'ah, Lina; Wulan Febriana, Beta; Arlianty, Widinda Normalia


    Instructional technology course must be studied by students in order to 1) understand the role of technology in learning, 2) capable of analyzing advantages and disadvantages of using technology in teaching, 3) capable of performing technology in teaching. A poster session in instructional technology course was performed to 1) enhance students' interest in this course and develop students' creativity. The step of this research includes: planning, implementation, and evaluation. The result showed that students' responses towards poster session in instructional technology course were good.

  20. Curriculum and instruction in nuclear waste disposal

    International Nuclear Information System (INIS)

    Robinson, M.; Lugaski, T.; Pankratius, B.


    Curriculum and instruction in nuclear waste disposal is part of the larger problem of curriculum and instruction in science. At a time when science and technological literacy is crucial to the nation's economic future fewer students are electing to take needed courses in science that might promote such literacy. The problem is directly related to what science teachers teach and how they teach it. Science content that is more relevant and interesting to students must be a part of the curriculum. Science instruction must allow students to be actively involved in investigating or playing the game of science

  1. The Instructional Text like a Textual Genre

    Directory of Open Access Journals (Sweden)

    Adiane Fogali Marinello


    Full Text Available This article analyses the instructional text as a textual genre and is part of the research called Reading and text production from the textual genre perspective, done at Universidade de Caxias do Sul, Campus Universitário da Região dos Vinhedos. Firstly, some theoretical assumptions about textual genre are presented, then, the instructional text is characterized. After that an instructional text is analyzed and, finally, some activities related to reading and writing of the mentioned genre directed to High School and University students are suggested.

  2. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs. (United States)


    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  3. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van


    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  4. The impact of inquiry-based instructional professional development upon instructional practice: An action research study (United States)

    Broom, Frances A.

    This mixed method case study employs action research, conducted over a three month period with 11 elementary math and science practitioners. Inquiry as an instructional practice is a vital component of math and science instruction and STEM teaching. Teachers examined their beliefs and teaching practices with regard to those instructional factors that influence inquiry instruction. Video-taped lessons were compared to a rubric and pre and post questionnaires along with two interviews which informed the study. The results showed that while most beliefs were maintained, teachers implemented inquiry at a more advanced level after examining their teaching and reflecting on ways to increase inquiry practices. Because instructional practices provide only one component of inquiry-based instruction, other components need to be examined in a future study.

  5. Generating and executing programs for a floating point single instruction multiple data instruction set architecture (United States)

    Gschwind, Michael K


    Mechanisms for generating and executing programs for a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA) are provided. A computer program product comprising a computer recordable medium having a computer readable program recorded thereon is provided. The computer readable program, when executed on a computing device, causes the computing device to receive one or more instructions and execute the one or more instructions using logic in an execution unit of the computing device. The logic implements a floating point (FP) only single instruction multiple data (SIMD) instruction set architecture (ISA), based on data stored in a vector register file of the computing device. The vector register file is configured to store both scalar and floating point values as vectors having a plurality of vector elements.

  6. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  7. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna


    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  8. Defense waste processing facility startup progress report

    International Nuclear Information System (INIS)

    Iverson, D.C.; Elder, H.H.


    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing

  9. Defense Waste Processing Facility, Savannah River Plant

    International Nuclear Information System (INIS)

    After 10 years of research, development, and testing, the US Department of Energy is building a new facility which will prepare high-level radioactive waste for permanent disposal. The Defense Waste Processing Facility, known as the DWPF, will be the first production-scale facility of its kind in the United States. In the DWPF, high-level waste produced by defense activities at the Savannah River Plant will be processed into a solid form, borosilicate glass, suitable for permanent off-site geologic disposal. With construction beginning in the fall of 1983, the DWPT is scheduled to be operational in 1989. By 2005, the DWPF will have immobilized the backlog of high-level waste which has been accumulating in storage tanks at the Savannah River Plant since 1954. Canisters of the immobilized waste will then be ready for permanent disposal deep under the ground, safely isolated from the environment

  10. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review (United States)


    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  11. Attentional Focusing Instructions and Force Production

    Directory of Open Access Journals (Sweden)

    David C Marchant


    Full Text Available Research progress assessing the role of attentional focusing instructions on skill acquisition and performance has lead researchers to apply this approach to force production tasks. Initial converging evidence indicates that force production tasks are sensitive to verbal instruction; externally focused instructions (onto movement outcomes, or onto the object force is being exerted against are shown to be more beneficial than internally focused instructions (focusing attention onto the movements being executed. These benefits are observed for maximal and accurate force production, as well as the maintenance of force production in prolonged tasks. A range of mechanisms are identified supporting the proposal that an external focus promotes movement efficiency in line with energy and effort conservation. Future research is required to assess how this developing body of work interacts with the broader understanding of psychological and physiological factors implicated in the effective production, maintenance and limitation of maximal or sub-maximal forces.

  12. Completion processing for data communications instructions (United States)

    Blocksome, Michael A; Kumar, Sameer; Parker, Jeffrey J


    Completion processing of data communications instructions in a distributed computing environment, including receiving, in an active messaging interface (`AMI`) data communications instructions, at least one instruction specifying a callback function; injecting into an injection FIFO buffer of a data communication adapter, an injection descriptor, each slot in the injection FIFO buffer having a corresponding slot in a pending callback list; listing in the pending callback list any callback function specified by an instruction, incrementing a pending callback counter for each listed callback function; transferring payload data as per each injection descriptor, incrementing a transfer counter upon completion of each transfer; determining from counter values whether the pending callback list presently includes callback functions whose data transfers have been completed; calling by the AMI any such callback functions from the pending callback list, decrementing the pending callback counter for each callback function called.

  13. Managing Innovation and Change for Instructional Technology. (United States)

    Holznagel, Donald C.


    Introduces the term "orgware" and reviews the literature on managing technological innovation in instructional settings. Six areas of management concern are described, and advice on managing innovation and change is provided. (11 references) (GLR)

  14. When innovative instructional designs are too innovative

    DEFF Research Database (Denmark)

    Kjærgaard, Thomas; Wahl, Christian


    and it was developed to include, motivate and encourage the students to engage in more situated learning processes. The course is infamous for low attendance and for demotivating the students. The new instructional design utilized teacher-produced video-clips to qualify the students learning in the preparation...... for the lessons and new pedagogical activities during lessons to make the learning process more situated. The video-clips should also include more students through scaffolding the academic reading with video-clips. However, the outcome was not as planned. The students didn’t recognize the video......This paper presents a study of what happens when innovation of an instructional design is too innovative. The study investigates an implementation process of a new instructional design in nursing education. The new instructional design should be a step away for a functionalist approach to learning...

  15. Formal education of curriculum and instructional designers

    NARCIS (Netherlands)

    McKenney, Susan; Visscher-Voerman, Irene


    McKenney, S., & Visscher-Voerman, I. (2013). Formal education of curriculum and instructional designers. Educational Designer, 2(6). Available online:

  16. Competency-Based Instruction for Marketing Students. (United States)

    Heath, Betty; Williams, Terry M.


    Which method of instruction is more effective for postsecondary students: competency-based or traditional? This study reveals that the effectiveness of one method over the other depends on work experience of the student. (Author)

  17. Differentiating Instruction in Early Childhood Care Education ...

    African Journals Online (AJOL)

    Nneka Umera-Okeke

    Alvan Ikoku Federal College of Education, Owerri,. E-mail: ... Key words: childhood education, Differentiated instruction, teachers/ caregivers' practice ... differences in their readiness level, interests and learning profiles/styles (p. 940). Today's ...

  18. Improving Instruction through a Videotape Library. (United States)

    Batesky, James


    Videotape and a videotape library can be used to expand the quality of instruction of a physical education program by allowing greater diversity of material taught and increased use of professionals and experts in various sports. (JMF)

  19. Biotechnology Education: A Multiple Instructional Strategies Approach. (United States)

    Dunham, Trey; Wells, John; White, Karissa


    Provides a rationale for inclusion of biotechnology in technology education. Describes an instructional strategy that uses behaviorist, cognitive, and constructivist learning theories in two activities involving photobioreactors and bovine somatotropin (growth hormone). (Contains 39 references.) (SK)

  20. Sharing perspectives on English-medium instruction

    CERN Document Server

    Ackerley, Katherine; Helm, Francesca


    This volume gives voice to the views and experiences of researchers, lecturers, administrative staff, teacher trainers and students with regard to the implementation of English-medium instruction in a public university based in the north-east of Italy.

  1. CCP-NAP operator instructions at ANL

    International Nuclear Information System (INIS)

    Tantillo, V.V.


    CCP-NAP Operator Instructions at ANL (ANL/TM 435) supplements the CCPGUIDE (Category 26) prepared by the National Magnetic Fusion Energy Computer Center (NMFECC), Lawrence Livermore National Laboratory. The instructions in CCP-NAP Operator Instructions at ANL serve as a reference guide for Computing Services operators when operator intervention is necessary for ANL's MFEnet Nodes located in Building 221, Room A-134. Use this document in conjunction with the CCPGUIDE. The CCPGUIDE, a guide for network operators, outlines the procedures for loading the Communications Control Processor (CCP) and monitoring its activity. The CCPGUIDE contains detailed information on Software Loading, System Status, System Monitoring, Command Summary, etc. The material in this document is the result of additional information provided by Jim Morton and Jim Gigliaridi (NMFECC) when our Argonne National Laboratory/Computing Services MFEnet Nodes were installed. This document provides two formats: QUICK instructions and procedures, and detailed general text

  2. Discourse Analysis in Stylistics and Literature Instruction. (United States)

    Short, Mick


    A review of research regarding discourse analysis in stylistics and literature instruction covers studies of text, systematic analysis, meaning, style, literature pedagogy, and applied linguistics. A 10-citation annotated bibliography and a larger unannotated bibliography are included. (CB)

  3. 7 CFR 1212.103 - Instructions. (United States)


    ... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (MARKETING AGREEMENTS..., PROMOTION, CONSUMER EDUCATION AND INDUSTRY INFORMATION ORDER Referendum Procedures § 1212.103 Instructions... information sources, without incurring advertising expense, to publicize the dates, places, method of voting...

  4. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  5. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee (United States)


    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  6. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense (United States)


    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  7. Assessment of Accelerated Acquisition of Defense Programs (United States)


    Quadrennial Defense Review explicitly called for doubling production rates of ISR UAVs, including Global Hawk. By 2009, Global Hawks had logged over 25,000...Honeywell (Formerly AlliedSignal) turboprop engine, compared to the Predator’s 115 hp (86 kW) piston engine. The power increase allows the Reaper...on basic requirements subsequently translated into costs at least double initial estimates and years of schedule slippage. In other words a classic

  8. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux


    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  9. Strategic nuclear policy and ballistic missile defense

    International Nuclear Information System (INIS)


    The article explains the problems of the antirockets (ABM) as they were part of the presentation Salt I 1972. It is a translation from the English of a publication of the Foreign Affairs Research Institute in London. A topical analysis of the strategic nuclear policy of the two superpowers and their attitudes in the question of ballistic missile defense are given by means of two monographies. (orig./HSCH) [de



    Oleksandr Yu. Burov


    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  11. Compatible Goals: Defense and Environmental Protection (United States)


    Remedial Action Site. AD-P004 146 Treatment of Wastewater (Red Water ) Resulti g from TNT Trinitrotoluene) Purification. AD-P004 147 Location of Volatile... Availabilit C040e3 _Vafl" -,ior OEC 5 1984 Ths document has been appeoved Dist Spool.A distribution.Is unlimiedL..... .. . COMFATABLE GOALS : DEFENSE AND...surface water to the same good biological quality as the water entering the installation. 4. Conserve fossil fuel energy to the highest degree possi

  12. Defense Coastal/Estuarine Research Program (DCERP) (United States)


    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  13. Is Soviet Defense Policy Becoming Civilianized? (United States)


    Larionov, a consultant to the institute, both at RAND and in Moscow; and Drs. Alexei Arbatov and Aleksandr Savelyev and several of their colleagues during...Soviet defense industry resources to civilian use is presented in Arthur J. Alexander , Perestroika and Change in Soviet Weapons Acquisition, The RAND...1986, especially pp. 101-102. 17 18 the more prominent younger specialists like Alexei Arbatov, Andrei Kokoshin, and Aleksandr Savelyev have long been

  14. Assessment of Ukranian National Defense Policy (United States)


    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  15. Defense Logistics Standard Systems Functional Requirements. (United States)


    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  16. Content-Based Instruction Approach In Instructional Multimedia For English Learning


    Farani, Rizki


    Content-based Instruction (CBI) is an approach in English learning that integrates certain topic and English learning objectives. This approach focuses on using English competencies as a “bridge” to comprehend certain topic or theme in English. Nowadays, this approach can be used in instructional multimedia to support English learning by using computer. Instructional multimedia with computer system refers to the sequential or simultaneous use of variety of media formats in a given presentatio...

  17. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.


    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  18. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders. (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R


    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  19. PTSD as a criminal defense: a review of case law. (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L


    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  20. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel


    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.