WorldWideScience

Sample records for defense organization bmdo

  1. BMDO photovoltaics program overview

    Science.gov (United States)

    Caveny, Leonard H.; Allen, Douglas M.

    1994-01-01

    This is an overview of the Ballistic Missile Defense Organization (BMDO) Photovoltaic Program. Areas discussed are: (1) BMDO advanced Solar Array program; (2) Brilliant Eyes type satellites; (3) Electric propulsion; (4) Contractor Solar arrays; (5) Iofee Concentrator and Cell development; (6) Entech linear mini-dome concentrator; and (7) Flight test update/plans.

  2. BMDO: New Mexico Technology Transfer Demonstration Project. Interim final report

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    The BMDO-New Mexico Technology Transfer Demonstration Project(BMDO-NM) was a collaborative effort among the national laboratories to identify and evaluate the commercial potential of selected SDI-funded technologies. The project was funded by BMDO (formerly known as the Strategic Defense Initiative Office or SDIO), the Technology Enterprise Division (NM-TED) of the NM Economic Development Division, and the three National Laboratories. The project was managed and supervised by SAGE Management Partners of Albuquerque, and project funding was administered through the University of New Mexico. The BMDO-NM Demonstration Project focused on the development of a process to assist technology developers in the evaluation of selected BMDO technology programs so that commercialization decisions can be made in an accelerated manner. The project brought together BMDO, the NM-TED, the University of New Mexico, and three New Mexico Federal laboratories -- Los Alamos (DOE), Phillips (DOD) and Sandia (DOE). Each national laboratory actively participated throughout the project through its technology transfer offices. New Mexico was selected as the site for the Demonstration Program because of its three national and federal research laboratories engaged in BMDO programs, and the existing relationship among state govemment, the labs, universities and local economic development and business assistance organizations. Subsequent Commercialization and Implementation phases for the selected technologies from LANL and SNL were completed by SAGE and the Project Team. Funding for those phases was provided by the individual labs as well as BMDO and NM-TED in kind services. NM-TED played a proactive role in this New Mexico partnership. Its mandate is to promote technology-based economic development, with a commitment to facilitate the use of technology by industry and business statewide. TED assumed the role of program manager and executing agent for BMDO in this demonstration project.

  3. BMDO electric space-propulsion program

    Science.gov (United States)

    Caveny, Leonard H.; Curran, Francis M.; Brophy, John R.

    1993-01-01

    Electric propulsion (EP) applications being considered include: orbit insertion, orbit repositioning, station keeping, and elusive maneuvering. Typically, 1 to 5 kW are available for EP. A class of thrusters, the Hall-effect thrusters, is extensively researched, developed and flown by Russia. These thrusters, using xenon propellant, perform reliably, e.g., at 1.35 kW, 600 s specific impulse, 50 percent efficiency and greater than 2000 hr life. This specific impulse and efficiency combination is superior to the present arcjets for several Ballistic Missile Defense Organization (BMDO) applications. Three versions of the Hall thrusters are part of the experimental evaluation. Since today's goals are within reach of available thrusters and power sources, emphasis is being placed on such topics as: thruster lifetime, spacecraft interactions, electromagnetic interference, and erosion product deposition. Facilities in U.S. laboratories are being specially configured to achieve these goals.

  4. Proceedings: BMDO Advance Planning Briefing For Industry

    Science.gov (United States)

    2007-11-02

    D (/) UJ Ü z < 9 CD o CC CD UJ > 1X1 cc o »- w c o ■ MM 3 C o Ü CD >C £ 0 T3 — Q) ■D > C𔃿) < CO CO °- c -n...technical expertise, innovative foresight and entrepreneurial skills to transition these defense technologies to the commercial market place. no...diverse representation of high-level experts from industry, venture capital, marketing , academia and government agencies. As you can see, this partial

  5. The BMDO Thruster-on-a-Pallet Program

    Science.gov (United States)

    Caveny, Leonard H.; Curran, Francis M.; Sankovic, John M.; Allen, Douglas M.; Brophy, John R.; Garner, Charles

    1995-01-01

    The Ballistic Missile Defense Organization sponsors an aggressive program to develop and demonstrate electric propulsion and space power technologies for future missions. This program supports a focused effort to design, fabricate, and space qualify a Russian Hall thruster system-on-a-pallet ready to take advantage of a near-term flight opportunity. The Russian Hall Effect Thruster Technology (RHETT) program will demonstrate an integrated pallet design in late FY95. The program also includes a parallel effort to develop advanced Solar Concentrator Arrays with Refractive Linear Element Technology (SCARLET). This synergistic technology will be demonstrated in a flight experiment this summer on the Comet satellite. This paper provides an overview of the RHETT and SCARLET programs with an emphasis on electric propulsion, recent progress, and near-term program plans.

  6. Reappraising Defense Organization: An Analysis Based on the Defense Organization Study of 1977-1980,

    Science.gov (United States)

    1983-01-01

    or all of the current structure and there- by presents the opportunity for some external entity to begin, like Moses, with a tabula rasa , the...fundamental role of the Department of Defense (DOD) has been to "provide for the common defence," as described in the US Constitution. This...be strengthened. Chapter 5 focuses on the military depart- ments, with particular emphasis on the role of the service secretar- ies. It recommends

  7. Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization

    Science.gov (United States)

    2014-12-01

    No. DODIG-2015-043 D E C E M B E R 1 , 2 0 1 4 Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization... FINANCE AND ACCOUNTING SERVICE SUBJECT: Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization (Report No...organization, Defense Finance and Accounting Service Office of Internal Review (DFAS IR), in effect for the period ended June 30, 2014. The generally

  8. A Strategic Defense Initiative Organization Software Testing Initiative

    Science.gov (United States)

    1990-10-01

    Pentagon Washir gton, DC 20301-7100 Other Defense Technical Information Center 2 Cameron Station Alexandria, VA 22314 Dr. Dan Alpert , Director Program in...Science, Technology & Society University of Illinois Room 201 912-1/2 West Illinois Street Urbana, Illinois 61801 IDA General Larry D. Welch, HQ 1 Mr

  9. Reproduction and love: strategies of the organism's cellular defense system?

    Science.gov (United States)

    De Loof, A; Huybrechts, R; Kotanen, S

    1998-08-01

    A novel view is presented which states that primordial germ cells and their descendants can be regarded as 'cancerous cells' which emit signals that activate a whole array of cellular defensive mechanisms by the somatoplasm. These cells have become unrestrained in response to the lack of typical cell adhesion properties of epithelial cells. From this point of view: (1) the encapsulation of oocytes by follicle cells, vitelline membrane and egg shell; (2) the suppression of gonadal development in larval life; (3) the production of sex steroid hormones and of vitellogenin; and (4) the expulsion of the gametes from the body fit into a general framework for a defense strategy of the somatoplasm against germ line cells. Accordingly, the origin of sexual reproduction appears to be a story of failure and intercellular hostility rather than a 'romantic' and altruistic event. Yet, it has resulted in evolutionary success for the system in which it has evolved; probably through realizing feelings of 'pleasure' associated with reproduction.

  10. Defense Organization Officials Did Not Consistently Comply With Requirements for Assessing Contractor Performance

    Science.gov (United States)

    2017-02-01

    Performance ii │ DODIG-2017-052 (Project No. D2016-D000CF-0165.000) Recommendations We recommend that Defense organization officials develop and implement...Directors, DISA and DLA, should develop and implement organization -wide procedures that identify specific timeframes and steps for CPARS officials to...that the contracting or requiring office should establish procedures to implement CPARS across the organization including developing training

  11. Quality Control Review of the Defense Logistics Agency Audit Organization

    Science.gov (United States)

    2014-12-19

    all auditors are required to follow, and established an internal quality assurance division that performs ongoing, periodic assessments of work...audit organization performing audits or attestation engagements or both have an appropriate internal quality control system in place and undergo an...2010, the DLA OIG addressed our recommendation to implement official policies and procedures, which all auditors are required to follow. The DLA

  12. Contemporary Chinese Defense Industry Reforms and Civil–Military Integration in Three Key Organizations

    OpenAIRE

    Francis, Ed; Puska, Susan M

    2010-01-01

    This brief highlights key points on three Chinese government and military organizations involved in managing defense science, technology, and industry: 1) the State Council’s State Administration for Science, Technology and Industry for National Defense (SASTIND); 2) the General Armament Department (GAD) of the People’s Liberation Army; and 3) the Ministry of Industry and Information Technology’s Civil–Military Integration Promotion Department (CMIPD). This brief calls attention to im...

  13. Trade-offs between competition and defense specialists among unicellular planktonic organisms: the "killing the winner" hypothesis revisited

    National Research Council Canada - National Science Library

    Winter, Christian; Bouvier, Thierry; Weinbauer, Markus G; Thingstad, T Frede

    2010-01-01

    .... In the special case of unicellular planktonic organisms, the theoretical framework describing the trade-offs between competition and defense specialists is known as the "killing the winner" hypothesis (KtW...

  14. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  15. Structural organization of psychological defenses and coping strategies of preschool teachers with different levels of professional burnout

    Directory of Open Access Journals (Sweden)

    Тетяна Анатоліївна Колтунович

    2015-10-01

    Full Text Available The article deals with the actual problem of modern education system – preschool teachers’ professional burnout. Assumptions about the existence of the relationship between professional burnout, coping strategies and mechanisms of psychological defenses; about the determination of burnout at different stages of its formation according to the structural organization of coping and psychological defenses were empirically proven, and their leading and basic components were defined

  16. Marine Biological Survey, Peacock Point Outfall, Wake Atoll June 1998 (NODC Accession 0000247)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Army Space and Missile Defense Command (SMDC), in support of the Ballistic Missile Defense Organization (BMDO) sponsored a marine biological survey at Wake...

  17. Baseline marine biological survey at the Peacock Point outfall and other point-source discharges on Wake Atoll, Pacific Ocean in 1998-06 (NODC Accession 0000247)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Army Space and Missile Defense Command (SMDC) in support of the Ballistic Missile Defense Organization (BMDO) sponsored a marine biological survey at Wake...

  18. Contemporary Chinese Defense Industry Reforms and Civil–Military Integration in Three Key Organizations

    OpenAIRE

    Francis, Ed; PUSKA, Susan M.

    2010-01-01

    This brief highlights key points on three Chinese government and military organizations involved in managing defense science, technology, and industry: 1) the State Council’s State Administration for Science, Technology and Industry for National Defense (SASTIND); 2) the General Armament Department (GAD) of the People’s Liberation Army; and 3) the Ministry of Industry and Information Technology’s Civil–Military Integration Promotion Department (CMIPD). This brief calls attention to im...

  19. Defense Small Business Innovation Research Program (SBIR). Volume 4. ARPA, DNA, BMDO, and SOC0M Abstracts of Phase 1 Awards 1993

    Science.gov (United States)

    1993-01-01

    Topic#: 93-019 ID#: 9310314 ONE PROGRESS BLVD., BOX 8 Office: MICOM ALACHUA, FL 32615 Contract #: DAAH01-93-C-R267 Phone: (904) 462-2358 PI: JEAN - LUC ...suppression techniques as a pre-processing step. ENERGY COMPRESSION RESEARCH CORP. Topic#: 93-014 ID#: 93-PI-078 6355 NANCY RIDGE DRIVE Office: DNA SAN DIEGO

  20. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    the Naval Air and Missile Defense Command (NAMDC). NAMDC then began training field grade officers through a Weapons and Tactics Instructor ( WTI ...49 Integrated Air and Missile Defense (IAMD) Weapons and Tactics Instructor ( WTI ), Naval Air and Missile...and Missile Defense (IAMD) Weapons and Tactics Instructor ( WTI ). Accessed April 28, 2015. http://namdc.ahf.nmci.navy.mil/site%20pages/wti.htm

  1. Panic-like defensive behavior but not fear-induced antinociception is differently organized by dorsomedial and posterior hypothalamic nuclei of Rattus norvegicus (Rodentia, Muridae

    Directory of Open Access Journals (Sweden)

    A.F. Biagioni

    2012-04-01

    Full Text Available The hypothalamus is a forebrain structure critically involved in the organization of defensive responses to aversive stimuli. Gamma-aminobutyric acid (GABAergic dysfunction in dorsomedial and posterior hypothalamic nuclei is implicated in the origin of panic-like defensive behavior, as well as in pain modulation. The present study was conducted to test the difference between these two hypothalamic nuclei regarding defensive and antinociceptive mechanisms. Thus, the GABA A antagonist bicuculline (40 ng/0.2 µL or saline (0.9% NaCl was microinjected into the dorsomedial or posterior hypothalamus in independent groups. Innate fear-induced responses characterized by defensive attention, defensive immobility and elaborate escape behavior were evoked by hypothalamic blockade of GABA A receptors. Fear-induced defensive behavior organized by the posterior hypothalamus was more intense than that organized by dorsomedial hypothalamic nuclei. Escape behavior elicited by GABA A receptor blockade in both the dorsomedial and posterior hypothalamus was followed by an increase in nociceptive threshold. Interestingly, there was no difference in the intensity or in the duration of fear-induced antinociception shown by each hypothalamic division presently investigated. The present study showed that GABAergic dysfunction in nuclei of both the dorsomedial and posterior hypothalamus elicit panic attack-like defensive responses followed by fear-induced antinociception, although the innate fear-induced behavior originates differently in the posterior hypothalamus in comparison to the activity of medial hypothalamic subdivisions.

  2. Panic-like defensive behavior but not fear-induced antinociception is differently organized by dorsomedial and posterior hypothalamic nuclei of Rattus norvegicus (Rodentia, Muridae)

    Science.gov (United States)

    Biagioni, A.F.; Silva, J.A.; Coimbra, N.C.

    2012-01-01

    The hypothalamus is a forebrain structure critically involved in the organization of defensive responses to aversive stimuli. Gamma-aminobutyric acid (GABA)ergic dysfunction in dorsomedial and posterior hypothalamic nuclei is implicated in the origin of panic-like defensive behavior, as well as in pain modulation. The present study was conducted to test the difference between these two hypothalamic nuclei regarding defensive and antinociceptive mechanisms. Thus, the GABAA antagonist bicuculline (40 ng/0.2 µL) or saline (0.9% NaCl) was microinjected into the dorsomedial or posterior hypothalamus in independent groups. Innate fear-induced responses characterized by defensive attention, defensive immobility and elaborate escape behavior were evoked by hypothalamic blockade of GABAA receptors. Fear-induced defensive behavior organized by the posterior hypothalamus was more intense than that organized by dorsomedial hypothalamic nuclei. Escape behavior elicited by GABAA receptor blockade in both the dorsomedial and posterior hypothalamus was followed by an increase in nociceptive threshold. Interestingly, there was no difference in the intensity or in the duration of fear-induced antinociception shown by each hypothalamic division presently investigated. The present study showed that GABAergic dysfunction in nuclei of both the dorsomedial and posterior hypothalamus elicit panic attack-like defensive responses followed by fear-induced antinociception, although the innate fear-induced behavior originates differently in the posterior hypothalamus in comparison to the activity of medial hypothalamic subdivisions. PMID:22437484

  3. Defensive strategies in Geranium sylvaticum. Part 1: organ-specific distribution of water-soluble tannins, flavonoids and phenolic acids.

    Science.gov (United States)

    Tuominen, Anu; Toivonen, Eija; Mutikainen, Pia; Salminen, Juha-Pekka

    2013-11-01

    A combination of high-resolution mass spectrometry and modern HPLC column technology, assisted by diode array detection, was used for accurate characterization of water-soluble polyphenolic compounds in the pistils, stamens, petals, sepals, stems, leaves, roots and seeds of Geranium sylvaticum. The organs contained a large variety of polyphenols, five types of tannins (ellagitannins, proanthocyanidins, gallotannins, galloyl glucoses and galloyl quinic acids) as well as flavonoids and simple phenolic acids. In all, 59 compounds were identified. Geraniin and other ellagitannins dominated in all the green photosynthetic organs. The other organs seem to produce distinctive polyphenol groups: pistils accumulated gallotannins; petals acetylglucose derivatives of galloylglucoses; stamens kaempferol glycosides, and seeds and roots accumulated proanthocyanidins. The intra-plant distribution of the different polyphenol groups may reflect the different functions and importance of various types of tannins as the defensive chemicals against herbivory.

  4. Comparison of Radiation Dose Studies of the 2011 Fukushima Nuclear Accident Prepared by the World Health Organization and the U.S. Department of Defense

    Science.gov (United States)

    2012-11-01

    R T Comparison of Radiation Dose Studies of the 2011 Fukushima Nuclear Accident Prepared by the World Health Organization and the U.S. Department...AND SUBTITLE Comparison of Radiation Dose Studies of the 2011 Fukushima Nuclear Accident Prepared by the World Health Organization and the U.S... Fukushima Nuclear Accident Prepared by the World Health Organization and the U.S. Department of Defense Table of Contents 1. Introduction

  5. Secretions from the ventral eversible gland of Spodoptera exigua caterpillars activate defense-related genes and induce emission of volatile organic compounds in tomato, Solanum lycopersicum.

    Science.gov (United States)

    Zebelo, Simon; Piorkowski, Jill; Disi, Joseph; Fadamiro, Henry

    2014-05-20

    Plant induced defense against herbivory are generally associated with metabolic costs that result in the allocation of photosynthates from growth and reproduction to the synthesis of defense compounds. Therefore, it is essential that plants are capable of sensing and differentiating mechanical injury from herbivore injury. Studies have shown that oral secretions (OS) from caterpillars contain elicitors of induced plant responses. However, studies that shows whether these elicitors originated from salivary glands or from other organs associated with feeding, such as the ventral eversible gland (VEG) are limited. Here, we tested the hypothesis that the secretions from the VEG gland of Spodoptera exigua caterpillars contain elicitors that induce plant defenses by regulating the expression of genes involved in the biosynthesis of volatile organic compounds (VOCs) and other defense-related genes. To test this hypothesis, we quantified and compared the activity of defense-related enzymes, transcript levels of defense-related genes and VOC emission in tomato plants damaged by S. exigua caterpillars with the VEG intact (VEGI) versus plants damaged by caterpillars with the VEG ablated (VEGA). The quantified defense-related enzymes (i.e. peroxidase, polyphenol oxidase, and lipoxigenase) were expressed in significantly higher amounts in plants damaged by VEGI caterpillars than in plants damaged by VEGA caterpillars. Similarly, the genes that encode for the key enzymes involved in the biosynthesis of jasmonic acid and terpene synthase genes that regulate production of terpene VOCs, were up-regulated in plants damaged by VEGI caterpillars. Moreover, the OS of VEGA caterpillars were less active in inducing the expression of defense genes in tomato plants. Increased emissions of VOCs were detected in the headspace of plants damaged by VEGI caterpillars compared to plants damaged by VEGA caterpillars. These results suggest that the VEG of S. exigua caterpillars contains elicitors

  6. BMDO Raptor/Talon Program

    Science.gov (United States)

    1993-06-01

    example, asbestos, radon , lead, and radioactive materials), electromagnetic emanations , energy conservation, hazardous waste cleanup, and...supply. To do so would require major advances in fuel cell technology. Use of fuel cells to store energy would permit continuous, 24-hour operation...the Bay Area Air Quality Management District. Air quality issues include concern for radionuclide emissions (tritium, plutonium, uranium ) and

  7. BMDO Technologies for Biomedical Applications.

    Science.gov (United States)

    2007-11-02

    biofilm . Even bacteria that are normally eradicable by antibiotics can avoid harm by col- onizing implants in this manner. In addition, rough surfaces on... dental applications 86, 87 Users, carbon dioxide 86, 87 Users, radiofrcquency-direct current 86, 87 Lens implant , photochemical treatment 82, 83...Nanophosphors 56 Optical Biopsy 58 Sagebrush Gimbal for Needle Biopsy 60 CHAPTER 3 - INTERVENTION TECHNOLOGIES Section A - Implants MEMS Sensor for

  8. BMDO Technology Applications in Biomedicine

    Science.gov (United States)

    1996-01-01

    feeling human brain, helping to unlock the mysteries of mental illness. Laser technologies that today are used in health centers to treat vascular and...Grande Medical Technologies, Inc. (page 53) Mr. Tom Fortin 915 Camino de Salud Box 603 Albuquerque, NM 87131-5271 Telephone (505) 277-9145

  9. Effects of diets based on foods from conventional versus organic production on intake and excretion of flavonoids and markers of antioxidative defense in humans

    DEFF Research Database (Denmark)

    Grinder-Pedersen, Lisbeth; Rasmussen, Salka E.; Bügel, Susanne

    2003-01-01

    Different food production methods may result in differences in the content of secondary metabolites such as polyphenolic compounds. The present study compared conventionally (CPD) and organically produced (OPD) diets in a human crossover intervention study (n = 16) with respect to the intake...... both interventions. Most markers of antioxidative defense did not differ between the diets, but intake of OPD resulted in an increased protein oxidation and a decreased total plasma antioxidant capacity compared to baseline (P

  10. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  11. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  12. Borderline personality organization in violent offenders: correlations of identity diffusion and primitive defense mechanisms with antisocial features, neuroticism, and interpersonal problems.

    Science.gov (United States)

    Leichsenring, Falk; Kunst, Heike; Hoyer, Jürgen

    2003-01-01

    Although theoretical assumptions and empirical evidence suggest an association between borderline personality disorder (BPD) and antisocial behavior or even antisocial personality disorder (APD), there is no study relating the psychodynamic aspects of BPD to antisocial behavior. In this study, the authors tested the correlation between the structural criteria of borderline personality organization (BPO)--that is, identity diffusion, primitive defense mechanisms, and reality testing--and antisocial features, neuroticism, and interpersonal problems. A sample of imprisoned violent offenders (N = 91) was studied using the Antisocial Personality Questionnaire (APQ), the Borderline Personality Inventory (BPI), the Neo-Five-Factor-Inventory (Neo-FFI), and the Inventory of Interpersonal Problems (IIP). Significant correlations were predicted and found between the BPI scales of identity diffusion, primitive defense mechanisms, impaired reality testing, and fear of closeness and antisocial features, neuroticism, agreeableness, and interpersonal problems. The results are consistent with both object relations theory and attachment theory.

  13. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    total defense expenditure figures were calculated using the European Central Bank ( ECB ) fixed rates to the euro in 1999 where possible, or the...earliest available annual average exchange rate provided by the ECB . For 2007 figures, where necessary, the ECB annual average exchange rates of the

  14. Defense Small Business Innovation Research Program (SBIR). Volume 3. Air Force Abstracts of Phase 1 Awards 1993

    Science.gov (United States)

    1993-01-01

    Vapor Phase Epitaxy Abstract: Brimrose Corporation, Phase I objective is to use the in house developed " multipolar " low temperature/low energy, mixed...the number of neurons in the filter increases. All the three main formulations for the INS and GPS integration, namely the direct, indirect feed...INTELLIGENT NEURONS , INC. ARMY Topic#: 92-046 BMDO Topic#: 93-011 JC ASSOC. INTELLIGENT REASONING SYSTEMS BMDO Topic#: 93-013 ARMY Topic#: 92-172 BMDO

  15. Inter-organ defense networking: Leaf whitefly sucking elicits plant immunity to crown gall disease caused by Agrobacterium tumefaciens.

    Science.gov (United States)

    Park, Yong-Soon; Ryu, Choong-Min

    2015-01-01

    Plants have elaborate defensive machinery to protect against numerous pathogens and insects. Plant hormones function as modulators of defensive mechanisms to maintain plant resistance to natural enemies. Our recent study suggests that salicylic acid (SA) is the primary phytohormone regulating plant responses to Agrobacterium tumefaciens infection. Tobacco (Nicotiana benthamiana Domin.) immune responses against Agrobacterium-mediated crown gall disease were activated by exposure to the sucking insect whitefly, which stimulated SA biosynthesis in aerial tissues; in turn, SA synthesized in aboveground tissues systemically modulated SA secretion in root tissues. Further investigation revealed that endogenous SA biosynthesis negatively modulated Agrobacterium-mediated plant genetic transformation. Our study provides novel evidence that activation of the SA-signaling pathway mediated by a sucking insect infestation has a pivotal role in subsequently attenuating Agrobacterium infection. These results demonstrate new insights into interspecies cross-talking among insects, plants, and soil bacteria.

  16. Evaluation of the Defense Criminal Investigative Organizations’ Compliance with the Lautenberg Amendment Requirements and Implementing Guidance

    Science.gov (United States)

    2015-02-06

    Forces Armory. Introduction DODIG-2015-078│ 3 DoDI 6400.06 further requires commanders to ensure that military criminal investigative and law ...investigations are so thorough. The USACIDC suitability investigation includes national-level law enforcement records checks to identify criminal involvement... law . Defense Criminal Investigative Service Comments The Deputy Inspector General for Investigations, DoD Office of Inspector General, agreed and

  17. GlpC gene is responsible for biofilm formation and defense against phagocytes and imparts tolerance to pH and organic solvents in Proteus vulgaris.

    Science.gov (United States)

    Wu, Y L; Liu, K S; Yin, X T; Fei, R M

    2015-09-09

    Biofilm-forming bacteria are highly resistant to antibiotics, host immune defenses, and other external conditions. The formation of biofilms plays a key role in colonization and infection. To explore the mechanism of biofilm formation, mutant strains of Proteus vulgaris XC 2 were generated by Tn5 random transposon insertion. Only one biofilm defective bacterial species was identified from among 500 mutants. Inactivation of the glpC gene coding an anaerobic glycerol-3-phosphate dehydrogenase subunit C was identified by sequence analysis of the biofilm defective strain. Differences were detected in the growth phenotypes of the wild-type and mutant strains under pH, antibiotic, and organic solvent stress conditions. Furthermore, we observed an increase in the phagocytosis of the biofilm defective strain by the mouse macrophage RAW264.7 cell line compared to the wild-type strain. This study shows that the glpC gene plays an important role in biofilm formation, in addition to imparting pH, organic solvent, and antibiotic tolerance, and defense against phagocytosis to Proteus sp. The results further clarified the mechanism of biofilm formation at the genomic level, and indicated the importance of the glpC gene in this process. This data may provide innovative therapeutic measures against P. vulgaris infections; furthermore, as an important crocodile pathogen, this study also has important significance in the protection of Chinese alligators.

  18. Two Volatile Organic Compounds Trigger Plant Self-Defense against a Bacterial Pathogen and a Sucking Insect in Cucumber under Open Field Conditions

    Directory of Open Access Journals (Sweden)

    Choong-Min Ryu

    2013-05-01

    Full Text Available Systemic acquired resistance (SAR is a plant self-defense mechanism against a broad-range of pathogens and insect pests. Among chemical SAR triggers, plant and bacterial volatiles are promising candidates for use in pest management, as these volatiles are highly effective, inexpensive, and can be employed at relatively low concentrations compared with agrochemicals. However, such volatiles have some drawbacks, including the high evaporation rate of these compounds after application in the open field, their negative effects on plant growth, and their inconsistent levels of effectiveness. Here, we demonstrate the effectiveness of volatile organic compound (VOC-mediated induced resistance against both the bacterial angular leaf spot pathogen, Pseudononas syringae pv. lachrymans, and the sucking insect aphid, Myzus persicae, in the open field. Using the VOCs 3-pentanol and 2-butanone where fruit yields increased gave unexpectedly, a significant increase in the number of ladybird beetles, Coccinella septempunctata, a natural enemy of aphids. The defense-related gene CsLOX was induced by VOC treatment, indicating that triggering the oxylipin pathway in response to the emission of green leaf volatiles can recruit the natural enemy of aphids. These results demonstrate that VOCs may help prevent plant disease and insect damage by eliciting induced resistance, even in open fields.

  19. Two volatile organic compounds trigger plant self-defense against a bacterial pathogen and a sucking insect in cucumber under open field conditions.

    Science.gov (United States)

    Song, Geun Cheol; Ryu, Choong-Min

    2013-05-08

    Systemic acquired resistance (SAR) is a plant self-defense mechanism against a broad-range of pathogens and insect pests. Among chemical SAR triggers, plant and bacterial volatiles are promising candidates for use in pest management, as these volatiles are highly effective, inexpensive, and can be employed at relatively low concentrations compared with agrochemicals. However, such volatiles have some drawbacks, including the high evaporation rate of these compounds after application in the open field, their negative effects on plant growth, and their inconsistent levels of effectiveness. Here, we demonstrate the effectiveness of volatile organic compound (VOC)-mediated induced resistance against both the bacterial angular leaf spot pathogen, Pseudononas syringae pv. lachrymans, and the sucking insect aphid, Myzus persicae, in the open field. Using the VOCs 3-pentanol and 2-butanone where fruit yields increased gave unexpectedly, a significant increase in the number of ladybird beetles, Coccinella septempunctata, a natural enemy of aphids. The defense-related gene CsLOX was induced by VOC treatment, indicating that triggering the oxylipin pathway in response to the emission of green leaf volatiles can recruit the natural enemy of aphids. These results demonstrate that VOCs may help prevent plant disease and insect damage by eliciting induced resistance, even in open fields.

  20. A 205 Hour Krypton Propellant Life Test of the SPT-100 Operating at 3 kW

    Science.gov (United States)

    2013-09-01

    Ballistic Missile Defense Organization (BMDO) led efforts to transfer SPT technology to the United States so that western spacecraft could benefit from their...the performance of the SPT-100 operating on krypton was characterized using an inverted pendulum thrust stand over a wide range of thruster operating

  1. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  2. BMDO Technology and the Electric Utility Industry

    Science.gov (United States)

    2007-11-02

    diameters, both units were continuously wound solenoids using low-temperature niobium- titanium (Nb-Ti) superconducting materials cooled by superfluid...for Electromechanics (page 71) Technology: Air-core compulsator Dr. Theodore Aanstoos (principal investigator) JJ. Pickle Research Campus Mail Code

  3. A scientific assessment of a new technology orbital telescope

    Science.gov (United States)

    1995-01-01

    As part of a program designed to test the Alpha chemical laser weapons system in space, the Ballistic Missile Defense Organization (BMDO) developed components of an agile, lightweight, 4-meter telescope, equipped with an advanced active-optics system. BMDO had proposed to make space available in the telescope's focal plane for instrumentation optimized for scientific applications in astrophysics and planetary astronomy for a potential flight mission. Such a flight mission could be undertaken if new or additional sponsorship can be found. Despite this uncertainty, BMDO requested assistance in defining the instrumentation and other design aspects necessary to enhance the scientific value of a pointing and tracking mission. In response to this request, the Space Studies Board established the Task Group on BMDO New Technology Orbital Observatory (TGBNTOO) and charged it to: (1) provide instrumentation, data management, and science-operations advice to BMDO to optimize the scientific value of a 4-meter mission; and (2) support a space studies board assessment of the relative scientific merit of the program. This report deals with the first of these tasks, assisting the Advanced Technology Demonstrator's (ATD's) program scientific potential. Given the potential scientific aspects of the 4-meter telescope, this project is referred to as the New Technology Orbital Telescope (NTOT), or as the ATD/NTOT, to emphasize its dual-use character. The task group's basic conclusion is that the ATD/NTOT mission does have the potential for contributing in a major way to astronomical goals.

  4. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  5. The Effects of Transition from DoD (Department of Defense) to ISO (international Standards Organization) OSI (Open Systems Interconnection) Communication Protocols

    Science.gov (United States)

    1987-11-01

    Alpert , Director 1 copy Center for Advanced Study University of Illinois 912 W. Illinois Street Dr. Barry W. Boehm 1 copy TRW Defense Systems Group MS...Dr. Larry E. Druffel 1 copy Software Engineering Institute Carnegie-Mellon University Pittsburgh, PA 15213-3890 Dr. C.E. Hutchinson, Dean 1 copy

  6. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  7. 32 CFR 383a.4 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Organization. 383a.4 Section 383a.4 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) ORGANIZATIONAL CHARTERS DEFENSE COMMISSARY AGENCY (DeCA) § 383a.4 Organization. (a) The DeCA is established as an...

  8. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  9. Reserves accumulated in non-photosynthetic organs during the previous growing season drive plant defenses and growth in aspen in the subsequent growing season.

    Science.gov (United States)

    Najar, Ahmed; Landhäusser, Simon M; Whitehill, Justin G A; Bonello, Pierluigi; Erbilgin, Nadir

    2014-01-01

    Plants store non-structural carbohydrates (NSC), nitrogen (N), as well as other macro and micronutrients, in their stems and roots; the role of these stored reserves in plant growth and defense under herbivory pressure is poorly understood, particularly in trees. Trembling aspen (Populus tremuloides) seedlings with different NSC and N reserves accumulated during the previous growing season were generated in the greenhouse. Based on NSC and N contents, seedlings were assigned to one of three reserve statuses: Low N-Low NSC, High N-Medium NSC, or High N-High NSC. In the subsequent growing season, half of the seedlings in each reserve status was subjected to defoliation by forest tent caterpillar (Malacosoma disstria) while the other half was left untreated. Following defoliation, the effect of reserves was measured on foliar chemistry (N, NSC) and caterpillar performance (larval development). Due to their importance in herbivore feeding, we also quantified concentrations of phenolic glycoside compounds in foliage. Seedlings in Low N-Low NSC reserve status contained higher amounts of induced phenolic glycosides, grew little, and supported fewer caterpillars. In contrast, aspen seedlings in High N-Medium or High NSC reserve statuses contained lower amounts of induced phenolic glycosides, grew faster, and some of the caterpillars which fed on these seedlings developed up to their fourth instar. Furthermore, multiple regression analysis indicated that foliar phenolic glycoside concentration was related to reserve chemistry (NSC, N). Overall, these results demonstrate that reserves accumulated during the previous growing season can influence tree defense and growth in the subsequent growing season. Additionally, our study concluded that the NSC/N ratio of reserves in the previous growing season represents a better measure of resources available for use in defense and growth than the foliar NSC/N ratios.

  10. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  11. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses.

    Science.gov (United States)

    Boyd, Robert S

    2012-10-01

    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  12. Defense Acquisition Workforce: DOD Has Opportunities to Further Enhance Use and Management of Development Fund

    Science.gov (United States)

    2017-03-01

    and Responsibilities of Key Department of Defense (DOD) Organizations Involved in Defense Acquisition Workforce Development Fund (DAWDF) Management 7...DEFENSE ACQUISITION WORKFORCE DOD Has Opportunities to Further Enhance Use and Management of Development Fund...House of Representatives March 2017 DEFENSE ACQUISITION WORKFORCE DOD Has Opportunities to Further Enhance Use and Management of Development Fund

  13. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  14. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  15. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  16. In defense of the reverence of all life: Heideggerean dissolution of the ethical challenges of organ donation after circulatory determination of death.

    Science.gov (United States)

    Isch, D J

    2007-12-01

    During the past 50 years since the first successful organ transplant, waiting lists of potential organ recipients have expanded exponentially as supply and demand have been on a collision course. The recovery of organs from patients with circulatory determination of death is one of several effective alternative approaches recommended to reduce the supply-and-demand gap. However, renewed debate ensues regarding the ethical management of the overarching risks, pressures, challenges and conflicts of interest inherent in organ retrieval after circulatory determination of death. In this article, the author claims that through the engagement of a Heideggerean existential phenomenological and hermeneutic framework what are perceived as ethical problems dissolve, including collapse of commitment to the dead donor rule. The author argues for a revisioned socially constructed conceptual and philosophical responsibility of humankind to recognize the limits of bodily finitude, to responsibly use the capacity of the transplantable organs, and to grant enhanced or renewed existence to one with diminished or life-limited capacity; thereby making the locus of ethical concern the donor-recipient as unitary ''life.'' What ethically matters in the life-cycle (life-world) of donor-recipient is the viability of the organs transplanted; thereby granting reverence to all life.

  17. In situ immobilization of Cd by organic amendments and their effect on antioxidant enzyme defense mechanism in mung bean (Vigna radiata L.) seedlings.

    Science.gov (United States)

    Ramzani, Pia Muhammad Adnan; Coyne, Mark S; Anjum, Shazia; Khan, Waqas-Ud-Din; Iqbal, Muhammad

    2017-09-01

    In situ immobilization of Cd is desirable due to the damaging effects of ex situ remediation techniques on soil. In this greenhouse study, the role of biochar (BC), chitosan (CH), and green waste (GW) was studied for in-situ Cd immobilization and alleviating Cd toxicity in mung bean seedlings. Amendments were applied at rates of 0.5% and 1% (w/w). The minimum mean value of Cd, in root, shoot, and soil (DTPA-Cd) (12.2, 4.7, and 0.7 mg kg(-1), respectively), occurred in the Cd + 1% CH treatment compared to all Cd amended treatments. Shoot dry weight (21%) increased significantly in Cd + 1% BC amended soil compared to the control. Reactive oxygen species were affected significantly, with the lowest increased value of hydrogen peroxide (4%) in the Cd + 1% CH treatment while the minimum increase in the value of superoxide (O2(•-)) occurred in the Cd + 1% BC soil compared to the control. Malondialdehyde (20%) increased lowest with Cd + 1% CH treatment. Protein, ascorbate (AsA) contents, and catalase (CAT) activity increased the most (3, 2, and 15%, respectively) in the Cd + 1% BC treatment while dehydroascorbate reductase (DHAR) and superoxide dismutase (SOD) activity increased the most (9 and 234%, respectively) in the Cd + 1% CH soil compared to the control. Glutathione reductase (GR), ascorbate peroxidase (APX), and glutathione peroxidase (GPX), activity were reduced the most in the Cd + 1.0% BC treatment while dehydroascorbate (DHA) and glutathione S-transferase (GST) activity decreased the most in the Cd + 1% CH soil. Overall, in situ immobilization by amendments improved growth and antioxidant defense mechanisms of mung bean seedlings and was reflected by tolerance to Cd-toxicity. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  18. 32 CFR 18.3 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Organization. 18.3 Section 18.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY COMMISSIONS APPOINTING AUTHORITY FOR MILITARY COMMISSIONS § 18.3 Organization. (a) The Appointing Authority for Military Commissions...

  19. 32 CFR 48.602 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Organization. 48.602 Section 48.602 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN RETIRED SERVICEMAN'S FAMILY PROTECTION PLAN Miscellaneous § 48.602 Organization. (a) The Joint Board for the...

  20. Expeditionary Civilians: Creating a Viable Practice of Civilian Deployment Within the U.S. Interagency Community and Among Foreign Defense Organizations

    Science.gov (United States)

    2016-01-01

    decisionmakers in country-level and international organizations who are tasked with developing strategies for civilian deployment and to military offi ...reactive sourcing is necessary, sourcing offi - cials may need direct or expedited hiring authorities to enhance their capabilities to source

  1. Effect of long dose exposure of Podophyllum hexandrum methanol extract on antioxidant defense system and body and organ weight changes of albino rats

    Institute of Scientific and Technical Information of China (English)

    Showkat Ahmad Ganie; Bilal Ahmad Zargar; Akbar Masood; Mohmmad Afzal Zargar

    2012-01-01

    Objective: The present study was undertaken to investigate the effect of long dose administration of methanol rhizome extract of Podophyllum hexandrum and hydrogen peroxide on lipid peroxidation of erythrocytes, antioxidant enzyme status of rat liver, kidney, lung and brain tissue and body weight and organ weight changes of albino rats. Methods: The body and organ weight was monitored with digital scale balance and lipid peroxidation of RBC ghost membrane was monitored by measuring malonaldehyde (MDA). Antioxidant enzymes were assayed by standard procedures. Results: Our study showed that administration of H2O2 (0.1%) in drinking water of the rats for 25 weeks increased the malondialdehyde levels in erythrocytes of all the rats. However, rats receiving Podophyllum hexandrum extract and α- tocopherol had lower MDA levels in a dose dependent manner, which indicates decreased lipid peroxidation in these rats. Our results also showed decrease in the activity of glutathione reductase, glutathione-S-transferase and reduced glutathione levels in different organs of H2O2 treated rats. Rats receiving methanolic extract of Podophyllum hexandrum at the concentration of 5, 10 and 15mg% for 25 weeks increased the activity of glutathione reductase, glutathione-S-transferase and glutathione levels in different organs of the rats indicates the protective effect of the plant in combating oxidative stress undergone by the rats. No significant variation (P< 0.05) in the organ weights between the control and the treated groups was observed after 25 weeks of treatment. Conclusions: In conclusion, this study presents strong evidence of the nontoxic effect of the methanol extract of Podophyllumhexandrum. The findings also demonstrate that Podophyllum hexandrum methanol extract increased the levels of antioxidant enzymes and decreased lipid peroxidation in albino rats and explained the extensive utilization of the plant in traditional medicine.

  2. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  3. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  4. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  5. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  6. Desarrollo del epitelio del tracto intestinal y su participación en la defensa del organismo en mamíferos -Development of the epithelium of the intestinal tract and its participation in the defense of the organism in mammals.

    Directory of Open Access Journals (Sweden)

    Vásquez Cachay, María

    2012-07-01

    Full Text Available RESUMENEl presente trabajo se planteó con el objetivo de revisar los mecanismos de desarrollo y diferenciación del epitelio intestinal (EI y su participación en la defensa del organismo.ABSTRACTThis document aims was review the mechanism of development and differentiation of intestinal epithelium (IE and is participation in the defense of the organism.

  7. A Performance and Plume Comparison of Xenon and Krypton Propellant on the SPT-100

    Science.gov (United States)

    2012-07-02

    HET (1.35 kW), performance measurements were made using an inverted pendulum thrust stand. The plume was also characterized by a Faraday probe and RPA...performance reduction for the case of the flight model SPT-100 HET (1.35 kW), per- formance measurements were made using an inverted pendulum thrust stand...break up of the Soviet Union, the Ballistic Missile Defense Organization (BMDO) lead efforts to transfer SPT technology to the United States so that

  8. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  9. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  10. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  11. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  12. Molecular sabotage of host plant defenses by spider mites

    NARCIS (Netherlands)

    Villarroel Figueroa, C.A.

    2016-01-01

    Plants constitute an ample source of nutrients for a diversity of organisms that include viruses, microbes, nematodes, insects, and mites. To protect their resources, plants possess a robust immune system that establishes structural and biochemical defenses to fight invaders. Some of these defenses

  13. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  14. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  15. Analyzing blends of herbivore-induced volatile organic compounds with factor analysis: revisiting "cotton plant, Gossypium hirsutum L., defense in response to nitrogen fertilization".

    Science.gov (United States)

    Chen, Yigen

    2013-04-01

    Many herbivorous, predaceous, and parasitic insects use constitutive and herbivore-induced volatile organic compounds (VOCs) to locate their respective host plant, prey, and hosts. Multivariate statistical tools (e.g., factor analysis) are recognized increasingly as an appropriate approach for analyzing intercorrelated data such as presence/absence or quantities of VOCs. One challenge of implementing factor analysis is determining how many new variables (factors) to retain in the final analysis. I demonstrate a method proposed by Johnson and Wichern to mitigate this problem by using VOC data published in Chen et al. The advantage of using loading (or weight) transformation in interpretation of new variables was also illustrated in the example. Factor analysis found similar nitrogen fertilization effects on VOC production as those in Chen et al. Similarities were 1) nitrogen fertilization interacted with herbivore damage status on VOC production: at low nitrogen (42 ppm) level, beet armyworm, Spodoptera exigua (Hübner) (Lepidoptera: Noctuidae), damage elicited increases in VOC production, whereas at high nitrogen (196 ppm) VOC production was suppressed; 2) nitrogen fertilization did not affect limonene, alpha-pinene, and beta-pinene production. The seven individual VOCs significantly affected by nitrogen fertilization in Chen et al. were (Z)-3-hexenal, (E)-2-hexenal, (E)-beta-farnesene, (E)-4,8-dimethyl-1,3,7-nonatriene (DMNT), alpha-bergamotene, gamma-bisabolene, and bisabolol, of which only three ((E)-beta-farnesene, gamma-bisabolene, and bisabolol) weighed heavily on factor 1 in the current study.

  16. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  17. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  18. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  19. Plant antiherbivore defenses in Fabaceae species of the Chaco

    Directory of Open Access Journals (Sweden)

    T. E. Lima

    Full Text Available Abstract The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defensedefense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species, leaves (67%, and reproductive organs (56%. The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  20. Interactive effects of supplemental UV-B and temperature in European aspen seedlings: Implications for growth, leaf traits, phenolic defense and associated organisms.

    Science.gov (United States)

    Randriamanana, Tendry R; Lavola, Anu; Julkunen-Tiitto, Riitta

    2015-08-01

    Past studies reveal opposite effects of elevated UV-B and temperature on plant growth and concentrations of UV-B absorbing compounds, yet few studies have dealt with the combined and interactive effects of these two climate change factors on woody dioecious plants. We investigated the interactive effects of UV-B and temperature treatments on growth, leaf traits and phenolic concentrations in Populus tremula L. (European aspen) seedlings. We also considered the consequences of these effects on their associated organisms: herbivorous insects, rust pathogens, the presence of endophytic fungi and whether or not the responses differ between genders and genotypes. Supplemental temperature and UV-B were modulated to +2 °C and +30.77% above ambient conditions, respectively. Warming increased growth, photosynthesis and foliar nitrogen concentration but reduced leaf thickness and phenolic concentrations. On the other hand, supplemental UV-B increased total phenolic glycosides, mainly flavonols and phenolic acids, and partially counteracted the positive effects of warming on growth. Fast growing genotypes were less susceptible to the growth-reducing effect of combined UVB + T, less infected with rust disease and less prone to insect damage probably due to their higher salicylate and lower nitrogen concentrations. Under ambient temperature, the males of European aspen were taller and had bigger leaves than the females, while under elevated temperature, females grew bigger and, under UV-B, had more tremulacin than males. The multiple interactive effects of UV-B and temperature on growth, leaf traits and phenolic compounds, highlight the importance of multifactor experiments as a realistic predictor of plant responses to climate change.

  1. Kurumsal içerik yönetimi bileşenlerinin bir savunma sanayii organizasyonu örneğinde değerlendirilmesi = Evaluation of enterprise content management components within the example of defense industry organization

    Directory of Open Access Journals (Sweden)

    Çakmak, Tolga

    2011-01-01

    Full Text Available Organizasyonlar doküman, belge, web içerik ve e-posta yönetimi gibi farklı amaçlarla geliştirdikleri bilgi sistemlerini kurumsal içerik yönetimi altında bütünleştirmeye yönelmektedirler. Çalışmamızda bu çerçevede Türkiye'de bir savunma sanayii kuruluşundaki koşulların ve beklentilerin kurumsal içerik yönetimi bileşenleri açısından analiz edilmesi amaçlanmıştır. Belirlenen bu amaç kapsamında geliştirilen web tabanlı bir anket uygulaması ile çalışanların günlük işlerinde kullanmış oldukları doküman yönetimi sistemleri, elektronik posta sistemleri, Web içerik yönetimi uygulamaları ve Evrak/Belge Sistemleri 167 birimden 337 kullanıcı ile analiz edilmiştir. Yapılan analizlere göre; kurumda elektronik posta yönetimi sistemlerinin diğer sistemlere göre daha iyi düzeyde olduğu, en çok kurumsal belge yönetimi sistemlerinin geliştirilmesi, kurumun bütününü kapsayan bir sistem yaklaşımının yapılandırılması ve bu yöndeki farkındalığın artırılması gerektiği vurgulanmıştır. / Organizations tend to integrate the systems, such as document, records, web content and e-mail management that they develop for various purposes under enterprise content management. In this respect, the aim of this study is to analyze the current conditions and expectations of a defense industry organization in Turkey. According to this aim, the document management systems, electronic mail systems, Web content management applications used by the employees while running their day-to-day activities and the document/records systems used for official correspondence in 167 departments by 337 users within an organization specialized in defense industry in Turkey have been analyzed with a web based survey. Results show that the electronic mail management systems in the related organization are at a higher level than the other systems, and records management systems should be developed more than other

  2. 论武术课教学中攻防实用技术的组织与教法%On the Class Organization of Practical Attack and Defense Skills in the Martial Arts Class

    Institute of Scientific and Technical Information of China (English)

    张天熙

    2012-01-01

    武术的动作都要求具有攻防技击特点,无论是套路演练形式,还是技击格斗形式,都是以踢、打、摔、拿、击和刺等技击法为主要内容。在教学过程中,对攻防实用技术、组织与教法的研究,应有它一套独特方法。从一般教学过程到特有的组织方法,以及必须坚持的几项原则进行学术探讨,对改革课堂教学模式,优化教学方法,提高技术功作质量,圆满地完成教学任务起着积极重要的作用。%Martial arts movements show the characteristics of skillful attack and defense.whether routines drill forms,or combat combative form,are playing,hit and fell,and against the spurs and skillful method as the main content,etc,in the course of teaching to attack the practical technology,organization methods and research,should have it a unique method,from the general teaching process to special organization methods,as well as a few must adhere to the principle of academic study.To reform the classroom teaching mode,teaching methods,improve the technology work for quality and successfully complete the teaching task plays an important role.

  3. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  4. Cellular self-defense: how cell-autonomous immunity protects against pathogens

    National Research Council Canada - National Science Library

    Randow, Felix; MacMicking, John D; James, Leo C

    2013-01-01

    .... Here, we discuss the organizing principles that govern cellular self-defense and how intracellular compartmentalization has shaped its activities to provide effective protection against a wide...

  5. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  6. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  7. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  8. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  9. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  10. The Legal Structure of Defense Organization.

    Science.gov (United States)

    1986-01-15

    Montesquieu and Blackstone.....................................................81 B. The Constitutional Grants of Power...executive, in large part for the purpose of ensuring efficiency. 2 A. The Theories of Locke, Montesquieu , and Blackstone 0 Prevailing theory, as well...34’" _" "" " " " " " " ’" "A""A" " ’""""-" "-7" • . l’. s ", were the writings of Locke, 3 Montesquieu , 4 and Blackstone, 5 whose works were dubbed "the political Bibles

  11. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  12. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  13. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  14. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  15. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  16. Organizations

    DEFF Research Database (Denmark)

    Hatch, Mary Jo

    Most of us recognize that organizations are everywhere. You meet them on every street corner in the form of families and shops, study in them, work for them, buy from them, pay taxes to them. But have you given much thought to where they came from, what they are today, and what they might become...... in the future? How and why do they have so much influence over us, and what influences them? How do they contribute to and detract from the meaningfulness of lives, and how might we improve them so they better serve our needs and desires? This Very Short Introductions addresses all of these questions...

  17. 32 CFR 752.2 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Organization. 752.2 Section 752.2 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY CLAIMS ADMIRALTY CLAIMS § 752.2 Organization. (a) Administrative authority of the Secretary of the Navy. The Secretary of the Navy...

  18. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  19. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  20. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  1. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  2. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  3. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  4. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  5. Support Assistants for Fire Emergencies; Student Manual, Part A. Firefighting for Civil Defense Emergencies.

    Science.gov (United States)

    International Association of Fire Chiefs, New York, NY.

    A manual intended to help fire departments and Civil Defense organizations train people to support regular fire forces during a national emergency is presented. It contains 11 chapters: Introduction, Modern Weapons and Radioactive Fallout, Role of Fire Service in Civil Defense, Local Fire Department Organization, Role of Support Assistants in…

  6. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  7. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  8. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  9. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  10. Defense suppression benefits herbivores that have a monopoly on their feeding site but can backfire within natural communities

    NARCIS (Netherlands)

    Glas, J.J.; Alba, J.M.; Simoni, S.; Villarroel, C.A.; Stoops, M.; Schimmel, B.C.J.; Schuurink, R.C.; Sabelis, M.W.; Kant, M.R.

    2014-01-01

    Background: Plants have inducible defenses to combat attacking organisms. Hence, some herbivores have adapted to suppress these defenses. Suppression of plant defenses has been shown to benefit herbivores by boosting their growth and reproductive performance. Results: We observed in field-grown toma

  11. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  12. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  13. Defense Acquisition Research Journal. Volume 21, Number 2, Issue 69

    Science.gov (United States)

    2014-04-01

    Competition, sponsored by our partner organization, the Defense Acquisition University Alumni Association (DAUAA) at http://www.dauaa.org. For 2014...initiation to satisfaction . Organizations Involved in Resolution of Urgent Needs The organizations examined in this article that support, develop...sef c c = > Where: ef = measure of effectiveness on interval (0, 1) os = level of satisfaction of the objective (rated on a scale of 0 to 1) oc = cost

  14. Inducible Defenses with a "Twist": Daphnia barbata Abandons Bilateral Symmetry in Response to an Ancient Predator

    OpenAIRE

    2016-01-01

    Predation is one of the most important drivers of natural selection. In consequence a huge variety of anti-predator defenses have evolved in prey species. Under unpredictable and temporally variable predation pressure, the evolution of phenotypically plastic defensive traits is favored. These "inducible defenses", range from changes in behavior, life history, physiology to morphology and can be found in almost all taxa from bacteria to vertebrates. An important group of model organisms in eco...

  15. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits, such as...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  16. Antiviral Defenses in Plants through Genome Editing

    Science.gov (United States)

    Romay, Gustavo; Bragard, Claude

    2017-01-01

    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  17. DEFENSE RESOURCES MANAGEMENT USING GAME THEORY

    Directory of Open Access Journals (Sweden)

    Marian NEDELCU

    2014-04-01

    Full Text Available Game theory provides a number of analytical tools designed to assist in developing a more comprehensive understanding of phenomena emerging when decision makers interact. A game describes the strategic interactions between players who act guided by their interests and with the consciousness that their actions affect each other. The basic entity in all game theory models is the player. A player may be understood as an individual, group of individuals or any kind of organization, even countries or alliances facing decisions-making challenges and opportunities. In this respect, the concept providing the dimensions and variables informing on the planning “game” elements required for an optimal defense resource allocation is that of ‘capabilities’. The model developed in this paper is focused on allocations of the available defense resources over the assumed capabilities in order to achieve the best response to national security. I consider as a game the competition between strategic decision-makers involved in defense resource management and the threats to the national security.

  18. (abstract) JPL Cryocooler Development and Test Program Overview

    Science.gov (United States)

    Ross, R. G.

    1994-01-01

    Many near-term and future space-instrument programs within NASA and the Ballistic Missile Defense Organization (BMDO) depend on the successful development of long-life, low-vibration space cryocoolers. The most demanding near-term programs include a number of science instruments selected for NASA's Earth Observing System (Eos) program, and a number of space reconnaissance instruments associated with the BMDO's Brilliant Eyes program; both of these programs require delivery of similar types of flight coolers in the next few years. To help ensure the success of these cooler commitments, JPL has implemented an extensive cryocooler program in support of the NASA/JPL AIRS project, the Air Force Phillips Laboratory (AFPL), and the Air Force Space and Missiles Systems Division (SMC). This program is directed at assisting industry in developing advanced cryocoolers that successfully address the broad array of complex performance requirements needed for NASA and BMDO long-life space instruments. The JPL cryocooler program includes extensive characterization and life testing of industry-developed cryocoolers, development and flight testing of advanced sorption cooler systems for detector cooling to 10 K , development of mechanical cryocooler enhancement technologies, and flight tests of advanced low-vibration Stirling-cooler systems.

  19. 32 CFR 298.2 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Organization. 298.2 Section 298.2 National... Organization. (a) The DIS organization includes a Headquarters located in Alexandria, Virginia; four Regions... (CONUS), Alaska, Hawaii, and Puerto Rico; the Defense Industrial Security Clearance Office (DISCO...

  20. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  1. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  2. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  3. Molecular and structural antioxidant defenses against oxidative stress in animals.

    Science.gov (United States)

    Pamplona, Reinald; Costantini, David

    2011-10-01

    In this review, it is our aim 1) to describe the high diversity in molecular and structural antioxidant defenses against oxidative stress in animals, 2) to extend the traditional concept of antioxidant to other structural and functional factors affecting the "whole" organism, 3) to incorporate, when supportable by evidence, mechanisms into models of life-history trade-offs and maternal/epigenetic inheritance, 4) to highlight the importance of studying the biochemical integration of redox systems, and 5) to discuss the link between maximum life span and antioxidant defenses. The traditional concept of antioxidant defenses emphasizes the importance of the chemical nature of molecules with antioxidant properties. Research in the past 20 years shows that animals have also evolved a high diversity in structural defenses that should be incorporated in research on antioxidant responses to reactive species. Although there is a high diversity in antioxidant defenses, many of them are evolutionary conserved across animal taxa. In particular, enzymatic defenses and heat shock response mediated by proteins show a low degree of variation. Importantly, activation of an antioxidant response may be also energetically and nutrient demanding. So knowledge of antioxidant mechanisms could allow us to identify and to quantify any underlying costs, which can help explain life-history trade-offs. Moreover, the study of inheritance mechanisms of antioxidant mechanisms has clear potential to evaluate the contribution of epigenetic mechanisms to stress response phenotype variation.

  4. Regulatory roles of NPR1 in plant defense: regulation and function

    NARCIS (Netherlands)

    Spoel, S.H.; Mou, Z.; Zhang, X.; Pieterse, C.M.J.; Dong, X.

    2006-01-01

    Overcoming infection is a struggle that all eukaryotic organisms have to face in order to survive and evolve among ubiquitous microorganisms. Extensive research on plant defenses has revealed that defense signal transduction pathways form an interconnected network in which the signaling molecules sa

  5. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  6. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  7. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  8. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  9. 32 CFR 643.121 - Private organizations on DA installations.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Private organizations on DA installations. 643.121 Section 643.121 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... DA installations. (a) AR 210-1 defines and classifies private organizations, such as thrift shops...

  10. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  11. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  12. Strategic Planning and Management in Defense Systems Acquisition

    Science.gov (United States)

    2014-04-30

    between top and working levels, coupled with micromanagement and multilevel approvals in both defense and nondefense organizations. In both types of...national security, not profit- or market -driven considerations. In fact, respondents noted that sometimes performance must be achieved at all costs

  13. Contract Audit Followup: Its Impact on Defense Contracting.

    Science.gov (United States)

    1983-12-01

    partici- pation would depend on an assurance of complete anonymity. B. TBE SANPLE Research was limited to personal interviews conducted in California...organizations pe:form these reviews. The Assistant Inspector General for Auditng shall review the Defense Agencies’ followup systems. .. The Inspector General

  14. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  15. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  16. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  17. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    Science.gov (United States)

    2015-06-01

    Companies in US and Their Sales Sales Number of Companies 41 products that reflect consumers’ tastes and preferences, and prices that reflect the...SUSTAINABLE DOMESTIC DEFENSE INDUSTRIES 5. FUNDING NUMBERS 6. AUTHOR(S) Roni Marzah and Budi Setiawan 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES...Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND

  18. An Update of the Defensive Barrier Function of Skin

    OpenAIRE

    Lee, Seung Hun; Jeong, Se Kyoo; Ahn, Sung Ku

    2006-01-01

    Skin, as the outermost organ in the human body, continuously confronts the external environment and serves as a primary defense system. The protective functions of skin include UV-protection, anti-oxidant and antimicrobial functions. In addition to these protections, skin also acts as a sensory organ and the primary regulator of body temperature. Within these important functions, the epidermal permeability barrier, which controls the transcutaneous movement of water and other electrolytes, is...

  19. Honduras Defense Policy.

    Science.gov (United States)

    1986-04-22

    and its Organization .......... 14 Civil -Military Relations ............................17 Impact of the Military on the Government ........... 18 Ill...Discovered by Columbus in his last voyage in August 1502, Honduras was part of the Mayan Empire that flourished throughout Southern Mexico, Guatemala...34 + " ’- " - ’ ] , . i + .°, +,.o .r+ .* -- 7--- -. * - I . .. .. early 1930’s. Civil wars, armed revolts and political struggle for power was the common denominator

  20. Foreign Internal Defense

    Science.gov (United States)

    2010-07-12

    basis for today’s FID doctrine. d. In recent times, the United States has provided the same type of NA in El Salvador, Colombia , Kuwait, the...transfers and related services have reached enormous dimensions and involve most of the world’s nations, either as a seller /provider or buyer...measures and consideration of the following: (1) Street or organized crime. (2) Foreign intelligence services. (3) Local populace animosity

  1. Defense Spending and Reform

    Science.gov (United States)

    2012-04-02

    world, attributes the success of Koch Industries to Market Based Management ( MBM ). Koch describes MBM as the “application of the Science of Human...Action in an organization.”38 There are both financial and non-financial incentives that motivate individuals; the key of MBM is to apply the... MBM is a holistic system that must be understood in order to be implemented correctly, but one of its main tenets is motivating an individual within

  2. 75 FR 58347 - Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors

    Science.gov (United States)

    2010-09-24

    ...; ] DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors AGENCY: Forest Service, USDA. ACTION: Notice; request for comment. SUMMARY: In... interested individuals and organizations on the new information collection, Overcoming Barriers to...

  3. 北宋西京洛阳监护城壕的发掘%Excavation of the defensive Ditch of Luoyangjian,the Supreme Administrative and Judicial Organ in the Western Capital the Northern Song Period

    Institute of Scientific and Technical Information of China (English)

    中国社会科学院考古研究所洛阳唐城队

    2004-01-01

    In 1999, the Tang Luoyang City Archaeological Team, IA, CASS, discovered and excavated vestiges of a defensive ditch of the Northern Song period and the remaining city-wall and protecting slope related to them in the old-city area of Luoyang. The excavation covered an area of about 935sq m. The ditch runs in the north-south direction, has an inverted trapezoidal section and contains mainly alluvial deposits. The protecting slope lies on the western side of the ditch and is built of rammed earth.The city-wall is constructed from the foundation trench surviving from the eastern wall of the East City of Luoyang. The unearthed objects include pottery, porcelain, coppers and bronzes and iron artifacts, with copper coins, bronze mirrors and porcelain articles of the Northern Song period as the main part. The excavation provided material data for understanding the location of and spatial distance between the city-wall and the moat in ancient China, as well as the building method and characteristic features of the moat.

  4. Genome Defense Mechanisms in Neurospora and Associated Specialized Proteins

    Directory of Open Access Journals (Sweden)

    Ranjan Tamuli

    2010-06-01

    Full Text Available Neurospora crassa, the filamentous fungus possesses widest array of genome defense mechanisms known to any eukaryotic organism, including a process called repeat-induced point mutation (RIP. RIP is a genome defense mechanism that hypermutates repetitive DNA sequences; analogous to genomic imprinting in mammals. As an impact of RIP, Neurospora possesses many fewer genes in multigene families than expected. A DNA methyltransferase homologue, RID was shown to be essential for RIP. Recently, a variant catalytic subunit of translesion DNA polymerase zeta (Pol zeta has been found to be essential for dominant RIP suppressor phenotype. Meiotic silencing and quelling are two other genome defense mechanisms in Neurospora, and proteins required for these two processes have been identified through genetic screens.

  5. Concurrency Attacks and Defenses

    Science.gov (United States)

    2016-10-04

    Administration, Morningside 615 West 131st Street, Room 254, Mail Code 8725 New York, NY 10027-7922 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING...on desktops (e.g., word processing), are now served from distributed “clouds” of servers to meet the current computing demands for high scalability...Document - Text Analysis Report Document - Text Analysis Appendix Documents 2. Thank You E- mail user Sep 28, 2016 18:09:13 Success: Email Sent to: junfeng@cs.columbia.edu

  6. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  7. The role of earthworm defense mechanisms in ecotoxicity studies

    Directory of Open Access Journals (Sweden)

    R Roubalová

    2015-08-01

    Full Text Available Earthworms are important soil organisms that affect the soil structure by influencing organic and inorganic matter breakdown. Earthworms are in permanent contact with soil particles via their permeable skin and digestive tract and are thus strongly affected by pollutants present in the soil. Earthworms often live in very hostile environments with an abundant microflora and therefore have developed very potent defense mechanisms. These mechanisms have been described to be influenced by various types of organic and inorganic pollutants and also by the nanoparticles that reach the soil system. Reduced abilities of earthworms to protect themselves against pathogenic microorganisms result in lower reproduction rates and increased mortality. In this review, a summary of the up-to-date data describing the effects of contaminants on the natural defense barriers and immune system of earthworms is presented.

  8. Neural substrates of defensive reactivity in two subtypes of specific phobia.

    Science.gov (United States)

    Lueken, Ulrike; Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-11-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5-10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear.

  9. Effects of generalized and specialized adaptive defense by shared prey on intra-guild predation.

    Science.gov (United States)

    Ikegawa, Yusuke; Ezoe, Hideo; Namba, Toshiyuki

    2015-01-07

    Intra-guild predation (IGP), predation on consumers which share common prey with the predators, is an important community module to understand a mechanism for persistence of complex food webs. However, classical theory suggests that persistence of an IGP system is unlikely particularly at high productivity, while empirical data do not support the prediction. Recently, adaptive defense by shared prey has been recognized to enhance coexistence of species and stability of the system. Some organisms having multiple predators in IGP systems employ two types of defenses; generalized defense that is effective against multiple predators and specialized one that is effective against only a specific predator species. We consider an IGP model including shared prey that can use the two types of defenses in combination against the consumer or omnivore. Assuming that the shared prey can change the allocation of defensive effort to increase its fitness, we show that the joint use of two types of adaptive defenses promotes three species coexistence and enhances stability of the IGP system when the specialized defense is more effective than the generalized one. When the system is unstable, a variety of oscillations appear and both the population densities and defensive efforts or only the population densities oscillate. Joint use of defenses against the consumer tends to increase the equilibrium population density of the shared prey with the defense efficiencies. In contrast, efficient generalized and specialized defenses against the omnivore often decrease the prey population. Consequently, adaptive defense by shared prey may not necessarily heighten the population size of the defender but sometimes increases densities of both the attackers and defender in IGP systems. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  11. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  12. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  13. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  14. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  15. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  16. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  17. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  18. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  19. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  20. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  1. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  2. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  3. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  4. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  5. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  6. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  7. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  8. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes.

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens.

  9. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens. PMID:28360923

  10. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  11. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  12. A Transactions Cost Economics Approach to Defense Acquisition Management

    Science.gov (United States)

    2006-12-30

    and economic organization. American Economic Review , 62, 777-795. Ashby, W. R. (1960). An introduction to cybernetics. London: Chapman & Hall... American Economic Review , 77, 168-185. Kadish et al. (2005, December). Defense acquisition performance assessment for the Acting Deputy Secretary...k^s^i=mlpqdo^ar^qb=p`elli= = Krueger, A. (1974). The political economy of the rent-seeking society. American Economic Review , 64, 291-303. Levy, B

  13. Total Quality Management Implementation Plan: Defense Depot, Ogden

    Science.gov (United States)

    1989-07-01

    NUMBERS Total Quality Management Implementation Plan Defense Depot Ogden 6. AUTHOR(S) 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING...PAGES TQM ( Total Quality Management ), Continuous Process Improvement, Depot Operations, Process Action Teams 16. PRICE CODE 17. SECURITY...034 A Message From The Commander On Total Quality Management i fully support the DLA aoproacii to Total Quality Management . As stated by General

  14. Overview of Peroxiredoxins in oxidant defense and redox regulation

    OpenAIRE

    Poole, Leslie B.; Hall, Andrea; Nelson, Kimberly J.

    2011-01-01

    Peroxiredoxins are important hydroperoxide detoxification enzymes, yet have only come to the fore in recent years relative to the other major players in peroxide detoxification, heme-containing catalases and peroxidases, and glutathione peroxidases. These cysteine-dependent peroxidases exhibit high reactivity with hydrogen peroxide, organic hydroperoxides and peroxynitrite and play major roles not only in peroxide defense, but also in regulating peroxide-mediated cell signaling. This overview...

  15. Defense Science Board (DSB) Summer Study Report on Strategic Surprise

    Science.gov (United States)

    2015-07-01

    DSB Summer Study Report on Strategic Surprise July 2015 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden...SUBTITLE DSB Summer Study Report on Strategic Surprise 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Defense Science Board ( DSB ),The Pentagon ,OUSD(AT&L

  16. JPRS Report Central Eurasia Military Affairs Defense Industry and Conversion

    Science.gov (United States)

    2007-11-02

    and organizing complex, ecologi - high interest among defense workers. But let us begin cally clean production operations. The state conversion with...51%, in 1991 it was reduced Ecology " program. These programs will be carried out by to 44% and, based upon 1992’s results, this share will hundreds of...PO "More", Feodosiya Passenger hydrofoil motor ships 7. Program for producing equipment for the "Almaz" Plant, Kiev Equipment for creating plants for

  17. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  18. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  19. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  20. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  1. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  2. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  3. Inducible Defenses with a "Twist": Daphnia barbata Abandons Bilateral Symmetry in Response to an Ancient Predator.

    Science.gov (United States)

    Herzog, Quirin; Rabus, Max; Wolfschoon Ribeiro, Bernard; Laforsch, Christian

    2016-01-01

    Predation is one of the most important drivers of natural selection. In consequence a huge variety of anti-predator defenses have evolved in prey species. Under unpredictable and temporally variable predation pressure, the evolution of phenotypically plastic defensive traits is favored. These "inducible defenses", range from changes in behavior, life history, physiology to morphology and can be found in almost all taxa from bacteria to vertebrates. An important group of model organisms in ecological, evolutionary and environmental research, water fleas of the genus Daphnia (Crustacea: Cladocera), are well known for their ability to respond to predators with an enormous variety of inducible morphological defenses. Here we report on the "twist", a body torsion, as a so far unrecognized inducible morphological defense in Daphnia, expressed by Daphnia barbata exposed to the predatory tadpole shrimp Triops cancriformis. This defense is realized by a twisted carapace with the helmet and the tail spine deviating from the body axis into opposing directions, resulting in a complete abolishment of bilateral symmetry. The twisted morphotype should considerably interfere with the feeding apparatus of the predator, contributing to the effectiveness of the array of defensive traits in D. barbata. As such this study does not only describe a completely novel inducible defense in the genus Daphnia but also presents the first report of a free living Bilateria to flexibly respond to predation risk by abandoning bilateral symmetry.

  4. Inducible Defenses with a "Twist": Daphnia barbata Abandons Bilateral Symmetry in Response to an Ancient Predator.

    Directory of Open Access Journals (Sweden)

    Quirin Herzog

    Full Text Available Predation is one of the most important drivers of natural selection. In consequence a huge variety of anti-predator defenses have evolved in prey species. Under unpredictable and temporally variable predation pressure, the evolution of phenotypically plastic defensive traits is favored. These "inducible defenses", range from changes in behavior, life history, physiology to morphology and can be found in almost all taxa from bacteria to vertebrates. An important group of model organisms in ecological, evolutionary and environmental research, water fleas of the genus Daphnia (Crustacea: Cladocera, are well known for their ability to respond to predators with an enormous variety of inducible morphological defenses. Here we report on the "twist", a body torsion, as a so far unrecognized inducible morphological defense in Daphnia, expressed by Daphnia barbata exposed to the predatory tadpole shrimp Triops cancriformis. This defense is realized by a twisted carapace with the helmet and the tail spine deviating from the body axis into opposing directions, resulting in a complete abolishment of bilateral symmetry. The twisted morphotype should considerably interfere with the feeding apparatus of the predator, contributing to the effectiveness of the array of defensive traits in D. barbata. As such this study does not only describe a completely novel inducible defense in the genus Daphnia but also presents the first report of a free living Bilateria to flexibly respond to predation risk by abandoning bilateral symmetry.

  5. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  6. Mycorrhiza-induced resistance and priming of plant defenses.

    Science.gov (United States)

    Jung, Sabine C; Martinez-Medina, Ainhoa; Lopez-Raez, Juan A; Pozo, Maria J

    2012-06-01

    Symbioses between plants and beneficial soil microorganisms like arbuscular-mycorrhizal fungi (AMF) are known to promote plant growth and help plants to cope with biotic and abiotic stresses. Profound physiological changes take place in the host plant upon root colonization by AMF affecting the interactions with a wide range of organisms below- and above-ground. Protective effects of the symbiosis against pathogens, pests, and parasitic plants have been described for many plant species, including agriculturally important crop varieties. Besides mechanisms such as improved plant nutrition and competition, experimental evidence supports a major role of plant defenses in the observed protection. During mycorrhiza establishment, modulation of plant defense responses occurs thus achieving a functional symbiosis. As a consequence of this modulation, a mild, but effective activation of the plant immune responses seems to occur, not only locally but also systemically. This activation leads to a primed state of the plant that allows a more efficient activation of defense mechanisms in response to attack by potential enemies. Here, we give an overview of the impact on interactions between mycorrhizal plants and pathogens, herbivores, and parasitic plants, and we summarize the current knowledge of the underlying mechanisms. We focus on the priming of jasmonate-regulated plant defense mechanisms that play a central role in the induction of resistance by arbuscular mycorrhizas.

  7. Homology-dependent gene silencing and host defense in plants.

    Science.gov (United States)

    Matzke, Marjori A; Aufsatz, Werner; Kanno, Tatsuo; Mette, M Florian; Matzke, Antonius J M

    2002-01-01

    Analyses of transgene silencing phenomena in plants and other organisms have revealed the existence of epigenetic silencing mechanisms that are based on recognition of nucleic acid sequence homology at either the DNA or RNA level. Common triggers of homology-dependent gene silencing include inverted DNA repeats and double-stranded RNA, a versatile silencing molecule that can induce both degradation of homologous RNA in the cytoplasm and methylation of homologous DNA sequences in the nucleus. Inverted repeats might be frequently associated with silencing because they can potentially interact in cis and in trans to trigger DNA methylation via homologous DNA pairing, or they can be transcribed to produce double-stranded RNA. Homology-dependent gene silencing mechanisms are ideally suited for countering natural parasitic sequences such as transposable elements and viruses, which are usually present in multiple copies and/or produce double-stranded RNA during replication. These silencing mechanisms can thus be regarded as host defense strategies to foreign or invasive nucleic acids. The high content of transposable elements and, in some cases, endogenous viruses in many plant genomes suggests that host defenses do not always prevail over invasive sequences. During evolution, slightly faulty genome defense responses probably allowed transposable elements and viral sequences to accumulate gradually in host chromosomes and to invade host genes. Possible beneficial consequences of this "foreign" DNA buildup include the establishment of genome defense-derived epigenetic control mechanisms for regulating host gene expression and acquired hereditary immunity to some viruses.

  8. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  9. 32 CFR 705.4 - Communication directly with private organizations and individuals.

    Science.gov (United States)

    2010-07-01

    ... Communication directly with private organizations and individuals. (a) Questions from the public and requests... 32 National Defense 5 2010-07-01 2010-07-01 false Communication directly with private organizations and individuals. 705.4 Section 705.4 National Defense Department of Defense (Continued) DEPARTMENT...

  10. 32 CFR 22.100 - Purpose, relation to other parts, and organization.

    Science.gov (United States)

    2010-07-01

    ... organization. 22.100 Section 22.100 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE....100 Purpose, relation to other parts, and organization. (a) This part outlines grants officers' and Do...) Administrative requirements for grants and agreements awarded to specific types of recipients: (i) For State...

  11. Developing a supply chain management certification for the Department of Defense

    OpenAIRE

    Griffin, Timothy R.; Trinrud, Scott A.

    2007-01-01

    MBA Professional Report The purpose of this project is to develop a Supply Chain Management (SCM) certification within the Department of Defense (DoD). The report provides background information on certification and SCM. This report defines SCM and describes some potential benefits of SCM for the DoD. The report discusses what the DoD will gain from a formal SCM certification program that could be outsourced to civilian universities or provided by organizations within the Defense Acquisiti...

  12. Prospects for Finland and Sweden to Pursue Closer Defense Cooperation With NATO

    Science.gov (United States)

    2016-09-01

    FINLAND AND SWEDEN TO PURSUE CLOSER DEFENSE COOPERATION WITH NATO by Daniel J. Pedrotty September 2016 Thesis Advisor: David S. Yost Second...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE PROSPECTS FOR FINLAND AND SWEDEN TO PURSUE CLOSER DEFENSE COOPERATION WITH NATO...for Finland and Sweden in pursuing closer cooperation with the North Atlantic Treaty Organization (NATO) and possible membership. The security

  13. Defense Additive Manufacturing: DOD Needs to Systematically Track Department-wide 3D Printing Efforts

    Science.gov (United States)

    2015-10-01

    DEFENSE ADDITIVE MANUFACTURING DOD Needs to Systematically Track Department-wide 3D Printing Efforts Report to...2015 to 00-00-2015 4. TITLE AND SUBTITLE Defense Additive Manufacturing: DOD Needs to Systematically Track Department-wide 3D Printing Efforts 5a... 3D ) printing —has the potential to improve aspects of DOD’s mission and operations. DOD and other organizations, such as America Makes, are

  14. Contaminants at Arctic formerly used defense sites

    Directory of Open Access Journals (Sweden)

    DO Carpenter

    2012-11-01

    Full Text Available This study was conducted in order to determine if the source of contaminants at formerly used defense sites (FUDS in Alaska were deposited as a result of military occupancy or from long-­-distance transport. This determination largely influences whether remediation will occur, and, if so, to what extent. For this reason, plant samples (rinsed and unrinsed and sediment cores were collected at military and remote sites on St. Lawrence Island (SLI and Norton Sound, Alaska during the summers of 2002, 2006, and 2007 and analyzed for persistent organic pollutants. On St. Lawrence Island sediment core samples were collected at the Northeast Cape FUDS, also a traditional fishing/hunting camp, and were sectioned and analyzed for concentrations of Polychlorinated biphenyl (PCB congeners, Mirex, Dichlorodiphenyldichloroethylene (DDE, Hexachlorobenzene (HCB, Mercury and Cesium-­-137 (137Cs. Differences in the total concentrations and distributions of PCB congeners, Mirex, DDE and Mercury in sediment cores and in plants collected from the two SLI and three Norton Sound mainland formerly used defense sites indicate the majority of the contaminants found can be temporally related to releases during military occupancy and subsequent redistribution of contaminants. Contaminants in plant samples at the SLI sites are elevated relative to the two remote sites located on St. Lawrence Island and the three mainland Norton Sound FUDS at Elim, Unalakleet, and Wales. The concentrations, lateral and vertical distribution of the total PCBs, and congener-­-specific differences in sediments and plants readily differentiate locally derived from globally transported contaminants. The relative contaminant concentrations in sediment cores and between rinsed and unrinsed plants collected from the NEC FUDS indicate contaminants were remobilized and redistributed during recent site remediation activities.

  15. Flexible resource allocation during plant defense responses

    Directory of Open Access Journals (Sweden)

    Jack C. Schultz

    2013-08-01

    Full Text Available Plants are organisms composed of modules connected by xylem and phloem transport streams. Attack by both insects and pathogens elicits sometimes rapid defense responses in the attacked module. We have also known for some time that proteins are often reallocated away from pathogen-infected tissues, while the same infection sites may draw carbohydrates to them. This has been interpreted as a tug of war in which the plant withdraws critical resources to block microbial growth while the microbes attempt to acquire more resources. Sink-source regulated transport among modules of critical resources, particularly carbon and nitrogen, is also altered in response to attack. Insects and jasmonate can increase local sink strength, drawing carbohydrates that support defense production. Shortly after attack, carbohydrates may also be drawn to the root. The rate and direction of movement of photosynthate or signals in phloem in response to attack is subject to constraints that include branching, degree of connection among tissues, distance between sources and sinks, proximity, strength, and number of competing sinks, and phloem loading/unloading regulators. Movement of materials (e.g., amino acids, signals to or from attack sites in xylem is less well understood but is partly driven by transpiration. The root is an influential sink and may regulate sink-source interactions and transport above and below ground as well as between the plant and the rhizosphere and nearby, connected plants. Research on resource translocation in response to pathogens or herbivores has focused on biochemical mechanisms; whole-plant research is needed to determine which, if any, of these plant behaviors actually influence plant fitness.

  16. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  17. Phased-Array Monolithic PEM for FT Spectrometry With Applications in Explosive Detection and CB Defense

    Science.gov (United States)

    2008-12-01

    1 PHASED-ARRAY MONOLITHIC PEM FOR FT SPECTROMETRY WITH APPLICATIONS IN EXPLOSIVE DETECTION AND CB DEFENSE Tudor N. Buican* Semiotic ...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Semiotic Engineering Associates LLC Albuquerque, NM 87108 8. PERFORMING ORGANIZATION REPORT NUMBER 9

  18. Plant STAND P-loop NTPases: a current perspective of genome distribution, evolution, and function : Plant STAND P-loop NTPases: genomic organization, evolution, and molecular mechanism models contribute broadly to plant pathogen defense.

    Science.gov (United States)

    Arya, Preeti; Acharya, Vishal

    2017-09-12

    STAND P-loop NTPase is the common weapon used by plant and other organisms from all three kingdoms of life to defend themselves against pathogen invasion. The purpose of this study is to review comprehensively the latest finding of plant STAND P-loop NTPase related to their genomic distribution, evolution, and their mechanism of action. Earlier, the plant STAND P-loop NTPase known to be comprised of only NBS-LRRs/AP-ATPase/NB-ARC ATPase. However, recent finding suggests that genome of early green plants comprised of two types of STAND P-loop NTPases: (1) mammalian NACHT NTPases and (2) NBS-LRRs. Moreover, YchF (unconventional G protein and members of P-loop NTPase) subfamily has been reported to be exceptionally involved in biotic stress (in case of Oryza sativa), thereby a novel member of STAND P-loop NTPase in green plants. The lineage-specific expansion and genome duplication events are responsible for abundance of plant STAND P-loop NTPases; where "moderate tandem and low segmental duplication" trajectory followed in majority of plant species with few exception (equal contribution of tandem and segmental duplication). Since the past decades, systematic research is being investigated into NBS-LRR function supported the direct recognition of pathogen or pathogen effectors by the latest models proposed via 'integrated decoy' or 'sensor domains' model. Here, we integrate the recently published findings together with the previous literature on the genomic distribution, evolution, and distinct models proposed for functional molecular mechanism of plant STAND P-loop NTPases.

  19. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  20. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  1. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  2. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  3. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  4. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  5. Recognition of the Frontier Defensive Organization in Early China---Centered by the jiaqu houguan’ s Beacon Tower with a Definite Name or with an Ordinal Number Name%早期中国边塞防御组织再认识--以甲渠候官的实名燧、序数燧为中心

    Institute of Scientific and Technical Information of China (English)

    蒋丹丹; 孙兆华

    2015-01-01

    There are rich materials about jiaqu houguan’ s beacon tower names in Han bamboo slips.Study centered by the beacon tower with a definite name or an ordinal number name will get a new understanding about the frontier defensive organization in early China.The function of jiaqu houguan’ s beacon tower name with a definite name or an ordinal number name is to defense or detect.Respectively speaking, some of the beacon towers with definite names in jiaqu’ s Henan frontier are accessible by postal communication, while the beacon towers with ordinal number names or some with definite names in jiaqu’ s Hebei frontier are hard to be got the difference from the former ones.There are similarities between jiaqu houguan ’ s beacon towers with definite names or ordinal number names and people’ s names or streets’ names in Qin and Han dynasties, for instance, to show the opposed relationships between Han and Xionglu, the pursuit to Kongfu, the pursuit to long life and propitiousness and so on.The nomination of the beacon tower’ s name and the street’ s name may also have a contact with the relative location.%汉简中关于甲渠候官烽燧名称的材料极为丰富,以实名隧与序数燧为中心进行研究,可以对早期中国边塞防御组织有新的认识。甲渠候官的实名燧、序数燧的职能,主要是防御和候望。分而言之,甲渠河南道上塞的部分实名燧承担着通邮的职能,而甲渠河北塞的序数燧和部分实名燧目前难以探求到其区别于前者的独特职能。甲渠候官的实名燧、序数燧的命名特点与秦汉时代的人名、里名有相似之处,如体现汉匈关系对立、追求武功、追求长寿和吉祥等。燧名和里名的命名或许还有地理位置上的联系。

  6. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  7. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  8. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  9. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  10. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  11. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  12. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  13. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  14. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  15. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  16. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  17. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  18. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  19. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  20. Application of passive defense in urban housing planning

    Directory of Open Access Journals (Sweden)

    H. Kamran

    2013-01-01

    national resolute determination of relevant organizations which is possible with the cooperation and synergy of organizations.5- Suggestions In order to reach housing programs with an appropriate level of safety based on passive defense principles the following suggestions are offered: Comprehensive housing plan for the development of quality of buildings along its quantitative development.Considering the safety of the buildings.Preparation of passive defense guidelines based on safe housing planning.Compilation of architectural document requirements in the design of buildings with passive defense approach.Planning for reducing physical instability of residential buildings in the historic fabric and marginal areas.Paying special attention to textures and old residential areas in central cities, and granting support from government facilities for strengthening, upgrading and refurbishment of old buildings.Key words: Urban planning, urban housing, building architecture, passive defenseReferencesAfshari Basir, Nafiseh and Afshari Basir, Mohammadreza (2011. Proceedings of the National Conference of passive defense, Ilam University.Daeinezhad, Faramarz (2006. Principles and guidelines for designing and furnishing the outdoor space of open houses in order to passive defense, Proceedings of the Seminar on Mass Housing Development Policies in October, the Department of Housing and Urban Development, Building and Housing Research Center, TehranDraft of National Building Regulations in passive defense (topic 21, 2009Faraji Mollaei, Amin and Azimi, Azadeh (2011. Techniques of passive defense in municipal facilities, Proceedings of the Third Conference of passive defense, Ilam University.Farzad Behtash, Mohammadreza and Aghababaei, Mohammadtaghi (2011. Passive defense concepts in urban management, focusing on the city of Tehran, Tehran, Center of City Planning: No. 37.Farzamshad, Mostafa (2009. Theoretical foundations of the architecture in passive defense, Jam-e-Jam publishing

  1. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  2. 32 CFR 37.710 - What standards do I include for purchasing systems of nonprofit organizations?

    Science.gov (United States)

    2010-07-01

    ... systems of nonprofit organizations? 37.710 Section 37.710 National Defense Department of Defense OFFICE OF... standards do I include for purchasing systems of nonprofit organizations? (a) So as not to force system... governmental organization. (2) 32 CFR 32.40 through 32.49 if the participant is a nonprofit organization...

  3. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  4. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  5. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  6. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours

    2012-07-01

    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  7. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  8. Visualization techniques for computer network defense

    Science.gov (United States)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  9. Visualization Techniques for Computer Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Beaver, Justin M [ORNL; Steed, Chad A [ORNL; Patton, Robert M [ORNL; Cui, Xiaohui [ORNL; Schultz, Matthew A [ORNL

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  10. Roadmap for an EArth Defense Initiative (READI)

    Science.gov (United States)

    Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.

    2015-12-01

    During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.

  11. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  12. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  13. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  14. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  15. 32 CFR Appendix C to Part 77 - DD Form 2581-1, Public and Community Service Organization Validation

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2581-1, Public and Community Service Organization Validation C Appendix C to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY..., App. C Appendix C to Part 77—DD Form 2581-1, Public and Community Service Organization...

  16. Optimal defense strategy: storage vs. new production.

    Science.gov (United States)

    Shudo, Emi; Iwasa, Yoh

    2002-12-07

    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  17. As entidades do Serviço Social Brasileiro na defesa da formação profissional e do projeto ético-político The Brazilian Social Service organizations in defense of the professional training and the ethical-political project

    Directory of Open Access Journals (Sweden)

    2011-12-01

    Full Text Available O objetivo deste texto é trazer elementos para o debate sobre a formação profissional no contexto da contrarreforma da educação superior no Brasil e suas implicações para o Projeto Ético-Político do Serviço Social. Será explicitado como se tem evidenciado a lógica quantitativa em detrimento da qualidade do ensino. Retomam-se os princípios formativos que orientam a formação profissional em Serviço Social, ressaltando as Diretrizes Gerais da Abepss (1996. Por fim, busca-se resgatar as lutas e estratégias de enfrentamento construídas democraticamente e incorporadas pelas entidades organizativas do Serviço Social brasileiro a fim de ampliar este debate e reafirmar a defesa do projeto profissional.The aim of this paper is to bring elements to the debate on professional training in the context of the counter-reform of higher education in Brazil and its implications for the ethical-political social work project. It will be explained as the quantitative logic has been made evident at the expense of the quality of education. We resume the principles that guide the professional training in social work, highlighting the Abepss General Guidelines (1996. Finally, we try to rescue the struggles and coping strategies democratically constructed and incorporated by organizing entities of the Brazilian Social Service to extend this debate and reassure the defense of the professional project.

  18. "Neuropeptides in the brain defense against distant organ damage".

    Science.gov (United States)

    Hamasaki, Mike Yoshio; Barbeiro, Hermes Vieira; Barbeiro, Denise Frediani; Cunha, Débora Maria Gomes; Koike, Marcia Kiyomi; Machado, Marcel Cerqueira César; Pinheiro da Silva, Fabiano

    2016-01-15

    Delirium, or acute confusional state, is a common manifestation in diseases that originate outside the central nervous system, affecting 30-40% of elderly hospitalized patients and up to 80% of the critically ill, even though it remains unclear if severe systemic inflammation is able or not to induce cellular disturbances and immune activation in the brain. Neuropeptides are pleotropic molecules heterogeneously distributed throughout the brain and possess a wide spectrum of functions, including regulation of the inflammatory response, so we hypothesized that they would be the major alarm system in the brain before overt microglia activation. In order to investigate this hypothesis, we induced acute pancreatitis in 8-10week old rats and collected brain tissue, 12 and 24h following pancreatic injury, to measure neuropeptide and cytokine tissue levels. We found significantly higher levels of β-endorphin, orexin and oxytocin in the brain of rats submitted to pancreatic injury, when compared to healthy controls. Interestingly, these differences were not associated with increased local cytokine levels, putting in evidence that neuropeptide release occurred independently of microglia activation and may be a pivotal alarm system to initiate neurologic reactions to distant inflammatory non-infectious aggression.

  19. The Special Forces Organization for Foreign Internal Defense in 2010.

    Science.gov (United States)

    2007-11-02

    statistics . He ties together the major strategic and tactical operations of the Malayan Emergency into a truly comprehensive analysis. Thomas R...studies. Malaya In 1786, England acquired Penang in the northwest portion of the Malay Peninsula, thus initiating the long relationship between the two...example, in the Pampanga Province alone, 70 percent of the farmers were tenants. The other provinces in the Philippines shared similar statistics . 3 6

  20. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  1. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  2. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  3. Strategies for Dealing with the Defense Budget

    Science.gov (United States)

    1983-08-17

    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  4. Predators shape distribution and promote diversification of morphological defenses in Leucorrhinia , Odonata

    Science.gov (United States)

    Petrin, Zlatko; Schilling, Emily Gaenzle; Loftin, Cyndy; Johansson, Frank

    2010-01-01

    Predators strongly influence species assemblages and shape morphological defenses of prey. Interestingly, adaptations that constitute effective defenses against one type of predator may render the prey susceptible to other types of predators. Hence, prey may evolve different strategies to escape predation, which may facilitate adaptive radiation of prey organisms. Larvae of different species in the dragonfly genus Leucorrhinia have various morphological defenses. We studied the distribution of these larvae in relation to the presence of predatory fish. In addition, we examined the variation in morphological defenses within species with respect to the occurrence of fish. We found that well-defended species, those with more and longer spines, were more closely associated with habitats inhabited by predatory fish and that species with weakly developed morphological defenses were more abundant in habitats without fish. The species predominantly connected to lakes with or without fish, respectively, were not restricted to a single clade in the phylogeny of the genus. Our data is suggestive of phenotypic plasticity in morphological defense in three of the studied species since these species showed longer spines in lakes with fish. We suggest that adaptive phenotypic plasticity may have broadened the range of habitats accessible to Leucorrhinia. It may have facilitated colonization of new habitats with different types of predators, and ultimately, speciation through adaptive radiation.

  5. The interaction among the CADE, ANEEL and ANP in the concurrence defense; A interacao entre CADE, ANEEL e ANP na defesa da concorrencia

    Energy Technology Data Exchange (ETDEWEB)

    Borges, Heloisa

    2007-07-01

    The deregulation of some segments and the entry of new enterprises are not sufficient to guarantee a competitive market because some characteristics are presents in industry that can present some problems in the context of consumer defense. This article highlights the question of superposition of competencies among the regulator sectors and the organism for consumer defense.

  6. Jasmonic acid causes short- and long-term alterations to the transcriptome and the expression of defense genes in sugarbeet roots

    Science.gov (United States)

    Jasmonic acid (JA) induces native defense responses in plants and increases the resistance of postharvest sugarbeet roots to three common storage-rot causing organisms. To gain insight into the defense responses induced by JA in harvested sugarbeet roots, RNA was isolated from roots treated with wat...

  7. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  8. The evolution of antiherbivore defenses and their contribution to species coexistence in the tropical tree genus Inga

    Science.gov (United States)

    Kursar, Thomas A.; Dexter, Kyle G.; Lokvam, John; Pennington, R. Toby; Richardson, James E.; Weber, Marjorie G.; Murakami, Eric T.; Drake, Camilla; McGregor, Ruth; Coley, Phyllis D.

    2009-01-01

    Plants and their herbivores constitute more than half of the organisms in tropical forests. Therefore, a better understanding of the evolution of plant defenses against their herbivores may be central for our understanding of tropical biodiversity. Here, we address the evolution of antiherbivore defenses and their possible contribution to coexistence in the Neotropical tree genus Inga (Fabaceae). Inga has >300 species, has radiated recently, and is frequently one of the most diverse and abundant genera at a given site. For 37 species from Panama and Peru we characterized developmental, ant, and chemical defenses against herbivores. We found extensive variation in defenses, but little evidence of phylogenetic signal. Furthermore, in a multivariate analysis, developmental, ant, and chemical defenses varied independently (were orthogonal) and appear to have evolved independently of each other. Our results are consistent with strong selection for divergent defensive traits, presumably mediated by herbivores. In an analysis of community assembly, we found that Inga species co-occurring as neighbors are more different in antiherbivore defenses than random, suggesting that possessing a rare defense phenotype increases fitness. These results imply that interactions with herbivores may be an important axis of niche differentiation that permits the coexistence of many species of Inga within a single site. Interactions between plants and their herbivores likely play a key role in the generation and maintenance of the conspicuously high plant diversity in the tropics. PMID:19805183

  9. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  10. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  11. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  12. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  13. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force

    Science.gov (United States)

    2007-06-01

    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  14. Defense Downsizing and Blacks in the Military

    Science.gov (United States)

    1993-06-01

    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  15. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  16. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  17. Carp erythrodermatitis: host defense-pathogen interaction.

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  18. The Future of Theater Missile Defense

    Science.gov (United States)

    1994-06-01

    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  19. Department of Defense Recovering Warrior Task Force

    Science.gov (United States)

    2014-09-02

    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from http://www.armytimes.com/article...Coordination briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from http://www.defense.gov/news/newsarticle.aspx?id=121796.  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  20. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  1. The Defense Committees of Sleepy Lagoon: A Convergent Struggle against Fascism, 1942-1944

    Science.gov (United States)

    Barajas, Frank P.

    2006-01-01

    The Sleepy Lagoon Defense Committee originated as an ad hoc committee and evolved to a broad-based movement for legal justice on behalf of seventeen youth convicted of murder and assault charges in connection with the Sleepy Lagoon case in Los Angeles in January 1943. This essay chronicles the multidimensional organizing to shift public opinion in…

  2. Soviet Post-Strike Civil Defense Rescue, Damage-Limiting, Repair and Restoration Operations.

    Science.gov (United States)

    1982-08-01

    transportation accidents or acts of terrorism is recognized in all countries. The actual organization of forces and capabilities naturally varies from country to...V. G. Strekozov, Oboronnaya Rabota Mestnykh Sovetov (Defense Work of Local Soviets), (Moscow: Yuridicheskaya literatura , 1981), pp. 50-58. 4. M. N

  3. Parasitism by Cuscuta pentagona attenuates host plant defenses against insect herbivores

    Science.gov (United States)

    Justin B. Runyon; Mark C. Mescher; Consuelo M. De Moraes

    2008-01-01

    Considerable research has examined plant responses to concurrent attack by herbivores and pathogens, but the effects of attack by parasitic plants, another important class of plant-feeding organisms, on plant defenses against other enemies has not been explored. We investigated how attack by the parasitic plant Cuscuta pentagona impacted tomato (

  4. The Defense Committees of Sleepy Lagoon: A Convergent Struggle against Fascism, 1942-1944

    Science.gov (United States)

    Barajas, Frank P.

    2006-01-01

    The Sleepy Lagoon Defense Committee originated as an ad hoc committee and evolved to a broad-based movement for legal justice on behalf of seventeen youth convicted of murder and assault charges in connection with the Sleepy Lagoon case in Los Angeles in January 1943. This essay chronicles the multidimensional organizing to shift public opinion in…

  5. Department of Defense Enterprise Architecture Transition Strategy, Version 2.0

    Science.gov (United States)

    2008-02-29

    organization, training, materials , leadership and education, personnel, and facilities (DOTMLPF) implications for making information available on a...processes such as the Systems Development Lifecycle (http://akss.dau.mil/dag/) and Information Resources Management (DoD IRM Plan) have also occurred...Enterprise Information Decision Support (EIDS) investment: risks to medical and dental readiness and medical surveillance  Defense Message

  6. Defense Acquisitions: Update on DOD’s Efforts to Implement a Common Contractor Manpower Data System

    Science.gov (United States)

    2014-05-19

    inventory, such as the funding source and contracting organization, the Army relied on the Army Contract Business Intelligence System (ACBIS) and...Generation (FPDS- NG), Army Contract Business Intelligence System (ACBIS) FPDS-NG ACBIS, FPDS-NG Funding activity Funding source Defense Finance and

  7. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  8. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  9. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  10. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  11. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  12. Marine biofilm bacteria evade eukaryotic predation by targeted chemical defense.

    Directory of Open Access Journals (Sweden)

    Carsten Matz

    Full Text Available Many plants and animals are defended from predation or herbivory by inhibitory secondary metabolites, which in the marine environment are very common among sessile organisms. Among bacteria, where there is the greatest metabolic potential, little is known about chemical defenses against bacterivorous consumers. An emerging hypothesis is that sessile bacterial communities organized as biofilms serve as bacterial refuge from predation. By testing growth and survival of two common bacterivorous nanoflagellates, we find evidence that chemically mediated resistance against protozoan predators is common among biofilm populations in a diverse set of marine bacteria. Using bioassay-guided chemical and genetic analysis, we identified one of the most effective antiprotozoal compounds as violacein, an alkaloid that we demonstrate is produced predominately within biofilm cells. Nanomolar concentrations of violacein inhibit protozoan feeding by inducing a conserved eukaryotic cell death program. Such biofilm-specific chemical defenses could contribute to the successful persistence of biofilm bacteria in various environments and provide the ecological and evolutionary context for a number of eukaryote-targeting bacterial metabolites.

  13. The evolutionary strategies of plant defenses have a dynamic impact on the adaptations and interactions of vectors and pathogens

    Institute of Scientific and Technical Information of China (English)

    Ordom Brian Huot; Punya Nachappa; Cecilia Tamborindeguy

    2013-01-01

    Plants have evolved and diversified to reduce the damages imposed by infectious pathogens and herbivorous insects.Living in a sedentary lifestyle,plants are constantly adapting to their environment.They employ various strategies to increase performance and fitness.Thus,plants developed cost-effective strategies to defend against specific insects and pathogens.Plant defense,however,imposes selective pressure on insects and pathogens.This selective pressure provides incentives for pathogens and insects to diversify and develop strategies to counter plant defense.This results in an evolutionary arms race among plants,pathogens and insects.The ever-changing adaptations and physiological alterations among these organisms make studying plant-vector-pathogen interactions a challenging and fascinating field.Studying plant defense and plant protection requires knowledge of the relationship among organisms and the adaptive strategies each organism utilize.Therefore,this review focuses on the integral parts of plant-vectorpathogen interactions in order to understand the factors that affect plant defense and disease development.The review addresses plant-vector-pathogen co-evolution,plant defense strategies,specificity of plant defenses and plant-vector-pathogen interactions.Improving the comprehension of these factors will provide a multi-dimensional perspective for the future research in pest and disease management.

  14. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  15. Disorganized attachment and defense: exploring John Bowlby's unpublished reflections.

    Science.gov (United States)

    Reisz, Samantha; Duschinsky, Robbie; Siegel, Daniel J

    2017-09-27

    Main and Solomon were the first to create a formal infant Strange Situation classification of attachment disorganization. Bowlby's reflections on the underlying psychological processes of such behaviors, however, began early in his career, including the term "disorganization." Most of these remained unpublished but are available through the John Bowlby Archive. Bowlby saw affective experiences as the source of the attachment behavioral system's organization and regulation, and he introduced the term "effector equipment" to describe the emergent organization of attention, expectation, affect, and behavior to orchestrate responses to the environment. In his thinking, disorganization results from threat conflict, safe haven ambiguity, and/or activation without assuagement, which interfere with coordination and integration across a behavioral system. Bowlby's unpublished writings also amplify his published work on segregated systems and defensive exclusion. Bowlby's insights are relevant today and can provide greater background and clarity to current work, as researchers and clinicians consider the origins, manifestations, and meaning of disorganization.

  16. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  17. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  18. Poblaciones expuestas a agrotóxicos: autoorganización ciudadana en la defensa de la vida y la salud, Ciudad de Córdoba, Argentina Populations exposed to agrotoxics: citizens' self-organization in the defense of life and health, Córdoba City, Argentina

    Directory of Open Access Journals (Sweden)

    Mauricio Berger

    2010-01-01

    reclamos de justicia para sus demandas.This paper presents a preview of our doctoral research work, based in the political action of the groups selfdenominated "Madres de Barrio Ituzaingó Anexo" in the city of Córdoba, Argentina. Since late 2001, the members of this group started fighting for life, health and environment, in the context of an environmental problem that produces over 200 illnesses and deaths in a population of 5,000 habitants in the neigborghood, mainly caused by fumigations with agrotoxics in the soybean fields adjacent to the houses. The modes of self-organization displayed by "las Madres" against the infringement of their rights plus the inefficiency and also abandonment of the State in the protection of the ones affected by the pollution, made this citizenship practice an example to think about the struggle for rights. This paper is divided into three sections. First, we present the methodological and conceptual elections that frame our reflections: the contributions of pragmatism (Dewey and Joas, the narrative turn (Ricoeur and contemporary discussions in biopolitics (Agamben, Hardt y Negri, Virno. Second, we join the fight of the Madres de Barrio Ituzaingó Anexo and their contexts. Third, we describe some scenes of the fight of the Madres against the fumigation with agrotoxics, and to that purpose we introduce three notions to think the citizen self-organization: body, experience, narrative. These will be considered key aspects of the political practice in which the sense of politics as action is played, as the power of making and speaking of the citizenship that acts in self-defense. Through the act of their affective, cognitive and linguistic capacities, these citizens create learnings, practical wisdoms and achievements in the defense of their rights, but they are not free from problems and obstacles in their claim for justice.

  19. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims

    Science.gov (United States)

    2013-01-01

    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  20. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Science.gov (United States)

    2010-10-25

    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  1. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  2. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  3. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  4. Oxidative Stress and Antioxidant Defense

    OpenAIRE

    2012-01-01

    Abstract Reactive oxygen species (ROS) are produced by living organisms as a result of normal cellular metabolism and environmental factors, such as air pollutants or cigarette smoke. ROS are highly reactive molecules and can damage cell structures such as carbohydrates, nucleic acids, lipids, and proteins and alter their functions. The shift in the balance between oxidants and antioxidants in favor of oxidants is termed “oxidative stress.” Regulation of reducing and oxidizing (redox) state i...

  5. Local Area Defense (LAD) Demonstration

    Science.gov (United States)

    2004-09-01

    leucopenia , which is worst on day 10. Thrombocytopenia on macromolecular proteins, such as DNA and enzymes. and, less commonly, anaemia are seen...delivered by aerosol (one to 10 organisms intensive care management. Early leucopenia is followed by produce clinical infection) and have high morbidity and...splenomegaly are seen. Leucopenia smallpox in an attempt to eradicate hostile North American or leucocytosis may occur. Septic shock and MOF ensue

  6. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  7. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  8. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  9. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  10. Antioxidant Defense by Thioredoxin Can Occur Independently of Canonical Thiol-Disulfide Oxidoreductase Enzymatic Activity

    Directory of Open Access Journals (Sweden)

    Miryoung Song

    2016-03-01

    Full Text Available The thiol-disulfide oxidoreductase CXXC catalytic domain of thioredoxin contributes to antioxidant defense in phylogenetically diverse organisms. We find that although the oxidoreductase activity of thioredoxin-1 protects Salmonella enterica serovar Typhimurium from hydrogen peroxide in vitro, it does not appear to contribute to Salmonella’s antioxidant defenses in vivo. Nonetheless, thioredoxin-1 defends Salmonella from oxidative stress resulting from NADPH phagocyte oxidase macrophage expression during the innate immune response in mice. Thioredoxin-1 binds to the flexible linker, which connects the receiver and effector domains of SsrB, thereby keeping this response regulator in the soluble fraction. Thioredoxin-1, independently of thiol-disulfide exchange, activates intracellular SPI2 gene transcription required for Salmonella resistance to both reactive species generated by NADPH phagocyte oxidase and oxygen-independent lysosomal host defenses. These findings suggest that the horizontally acquired virulence determinant SsrB is regulated post-translationally by ancestrally present thioredoxin.

  11. METHODOLOGY FOR EVALUATING AND IMPROVING THE EFFECTIVENESS OF THE STATE DEFENSE CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Vikulov S. F.

    2015-04-01

    Full Text Available In the article we have developed a methodology to assess the effectiveness of various types of military and economic activities, the effectiveness of which determines the value of the defense capabilities of the state; we have also revealed the economic substance of defense capabilities and combat readiness of troops, justified approaches to determining the significance of ongoing military-oriented activities, identified main activities of the specific conditions of defense industries which leave their marks on the cost-effectiveness in the production of material resources for the Russian military service. The analysis of the flow direction of monetary environment of estimated units indicates that the current practice of planning and cost accounting is not fully adapted for military-economic analysis of measures to ensure the establishment of the defense capabilities of the state, and this makes it difficult to study and make recommendations to improve the efficiency of the use of military and economic resources. The authors propose a unified system of methodological support planning, estimating the size of consumed resources (regardless of funding source and attainable defense results. Methodical resolution of this problem is based on the use of program-target approach to modeling the processes of the defense-industrial complex and the structural elements of the military organization. The article substantiates that the evaluation of the effectiveness of the use of defense capabilities should be carried out not only by the criterion of "cost - effect", but with all the manifestations of the time factor. In the most general form of the criterion of effectiveness should be provided by the triad "cost - effect - time." An important result of this study is also in the development of the integral index of evaluating the effectiveness of the use of military and economic

  12. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  13. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  14. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  15. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  16. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  17. Current knowledge and future research perspectives on cassava (Manihot esculenta Crantz) chemical defenses: An agroecological view.

    Science.gov (United States)

    Pinto-Zevallos, Delia M; Pareja, Martín; Ambrogi, Bianca G

    2016-10-01

    Cassava (Manihot esculenta Crantz) is one of the most important staple crops worldwide. It constitutes the major source of carbohydrates for millions of low-income people living in rural areas, as well as a cash crop for smallholders in tropical and sub-tropical regions. The Food and Agriculture Organization of the United Nations predicts that cassava plantations will increase and production systems will intensify in the future, highlighting the need for developing strategies that improve the sustainability of production. Plant chemical defenses hold the potential for developing pest management strategies, as these plant traits can influence the behavior and performance of both pests and beneficial arthropods. Cassava plants are well-defended and produce a number of compounds involved in direct defense, such as cyanogenic glycosides, flavonoid glycosides, and hydroxycoumarins. In addition, volatile organic compounds induced upon herbivory and the secretion of extrafloral nectar act as indirect defense against herbivores by recruiting natural enemies. Here, cassava chemical defenses against pest arthropods are reviewed, with the aim of identifying gaps in our knowledge and areas of research that deserve further investigation for developing sound pest control strategies to improve sustainable production of this crop, and how these defenses can be used to benefit other crops. Cyanogenic content in cassava is also highly toxic to humans, and can cause irreversible health problems even at sub-lethal doses when consumed over prolonged periods. Therefore, the promotion of chemical defense in this crop should not aggravate these problems, and must be accompanied with the education on processing methods that reduce human exposure to cyanide.

  18. Directed Energy Missions for Planetary Defense

    OpenAIRE

    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  19. Convergent evolution of defense mechanisms in oribatid mites (Acari, Oribatida) shows no "ghosts of predation past".

    Science.gov (United States)

    Pachl, Patrick; Domes, Katja; Schulz, Garvin; Norton, Roy A; Scheu, Stefan; Schaefer, Ina; Maraun, Mark

    2012-11-01

    Oribatid mites are diverse and abundant terrestrial soil arthropods that are involved in decomposition of organic matter and nutrient cycling. As indicated by fossils starting from the Devonian, they evolved varied mechanisms and structures for defense from predators. We investigated four of these defensive structures (ptychoid body, hologastry, mineralization and opisthonotal glands) and used ancestral character state reconstruction to determine whether they evolved convergently and how many times this may have happened. Phylogenetic trees based on 18S rDNA were constructed for 42 oribatid mite species and two outgroup taxa using likelihood and Bayesian algorithms. The results suggest that at least three of the four defensive structures evolved convergently several times; for opisthonotal glands convergent evolution remains equivocal. This high level of convergence indicates that predation has been an important factor throughout the evolution of oribatid mites, contributing to morphological diversity and potentially also to species richness, as there are indications that some taxa radiated after the evolution of defense structures. Despite the ancientness of oribatid mites, defense structures seems to have been rarely lost, suggesting that they still are functional and necessary to reduce predation, rather than being 'ghosts of predation past'. Copyright © 2012 Elsevier Inc. All rights reserved.

  20. The Effects of Silica Fertilizer as an Anti-Herbivore Defense in Cucumber

    Directory of Open Access Journals (Sweden)

    Callis-Duehl Kristine L.

    2017-06-01

    Full Text Available This study aims to improve our understanding of silicon’s role in deterring herbivores from Cucumis sativa. We hypothesized that silicon’s role in plant defense is due to the presence of silica augmenting other physical and/or chemical defenses used by the plant. Using C. sativa plants treated with either a silica fertilizer treatment (Si+ or a control solution (Si-, we monitored feeding preferences of two types of herbivores, a chewing herbivore (Diabrotica balteata and a piercing/sucking herbivore (Bemisia tabaci. Leaves from treatment plants were visited less and eaten less than leaves from control plants. We then assessed the differences in physical defenses by comparing the leaf structural components, nutrient and water content, and trichome density between treatment and control plants. For chemical plant defenses, we measured leaf carbon and nitrogen levels in, and volatile organic compounds (VOCs from treatment and control plants. We found no significant difference between treatment and control plants in: lignin content, most elemental plant nutrients, water content, trichome density, and quantity of carbon and nitrogen. We did see an increase in the VOC Indole, known for plant defense priming, an increase in phosphorous levels and a decrease in cellulose levels in silica treated plants.

  1. Strategic variation in mobbing as a front line of defense against brood parasitism.

    Science.gov (United States)

    Welbergen, Justin A; Davies, Nicholas B

    2009-02-10

    Coevolutionary arms races, where adaptations in one party select for counter-adaptations in another and vice versa, are fundamental to interactions between organisms and their predators, pathogens, and parasites [1]. Avian brood parasites and their hosts have emerged as model systems for studying such reciprocal coevolutionary processes [2, 3]. For example, hosts have evolved changes in egg appearance and rejection of foreign eggs in response to brood parasitism from cuckoos, and cuckoos have evolved host-egg mimicry as a counter-response [4-6]. However, the host's front line of defense is protecting the nest from being parasitized in the first place [7-10], yet little is known about the effectiveness of nest defense as an antiparasite adaptation, and its coevolutionary significance remains poorly understood [10]. Here we show first that mobbing of common cuckoos Cuculus canorus by reed warblers Acrocephalus scirpaceus is an effective defense against parasitism. Second, mobbing of cuckoos is a phenotypically plastic trait that is modified strategically according to local parasitism risk. This supports the view that hosts use a "defense in-depth strategy," with successive flexible lines of defense that coevolve with corresponding offensive lines of the parasite. This highlights the need for more holistic research into the coevolutionary consequences when multiple adaptations and counter-adaptations evolve in concert [11].

  2. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    Science.gov (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  3. Heavy Metal Stress and Some Mechanisms of Plant Defense Response

    Directory of Open Access Journals (Sweden)

    Abolghassem Emamverdian

    2015-01-01

    Full Text Available Unprecedented bioaccumulation and biomagnification of heavy metals (HMs in the environment have become a dilemma for all living organisms including plants. HMs at toxic levels have the capability to interact with several vital cellular biomolecules such as nuclear proteins and DNA, leading to excessive augmentation of reactive oxygen species (ROS. This would inflict serious morphological, metabolic, and physiological anomalies in plants ranging from chlorosis of shoot to lipid peroxidation and protein degradation. In response, plants are equipped with a repertoire of mechanisms to counteract heavy metal (HM toxicity. The key elements of these are chelating metals by forming phytochelatins (PCs or metallothioneins (MTs metal complex at the intra- and intercellular level, which is followed by the removal of HM ions from sensitive sites or vacuolar sequestration of ligand-metal complex. Nonenzymatically synthesized compounds such as proline (Pro are able to strengthen metal-detoxification capacity of intracellular antioxidant enzymes. Another important additive component of plant defense system is symbiotic association with arbuscular mycorrhizal (AM fungi. AM can effectively immobilize HMs and reduce their uptake by host plants via binding metal ions to hyphal cell wall and excreting several extracellular biomolecules. Additionally, AM fungi can enhance activities of antioxidant defense machinery of plants.

  4. Global Change Effects on Plant Chemical Defenses against Insect Herbivores

    Institute of Scientific and Technical Information of China (English)

    M. Gabriela Bidart-Bouzat; Adebobola Imeh-Nathaniel

    2008-01-01

    This review focuses on individual effects of major global change factors, such as elevated CO2, Oa, UV light and temperature,on plant secondary chemistry. These secondary metabolites are well-known for their role in plant defense against insect herbivory. Global change effects on secondary chemicals appear to be plant species-specific and dependent on the chemical type. Even though plant chemical responses induced by these factors are highly variable, there seems to be some specificity in the response to different environmental stressors. For example, even though the production of phenolic compounds is enhanced by both elevated CO2 and UV light levels, the latter appears to primarily increase the concentrations of fiavonoids. Likewise, specific phenolic metabolites seem to be induced by O3 but not by other factors, and an increase in volatile organic compounds has been particularly detected under elevated temperature. More information is needed regarding how global change factors influence inducibility of plant chemical defenses as well as how their indirect and direct effects impact insect performance and behavior, herbivory rates and pathogen attack. This knowledge is crucial to better understand how plants and their associated natural enemies will be affected in future changing environments.

  5. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  6. 32 CFR 37.1315 - Nonprofit organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Nonprofit organization. 37.1315 Section 37.1315... of the organization. (b) The term includes any nonprofit institution of higher education or nonprofit... REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Definitions of Terms Used in This Part § 37.1315...

  7. The Full Costs of Ballistic Missile Defense

    Science.gov (United States)

    2003-01-01

    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  8. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  9. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  10. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  11. Enhancing Air Base Defense Through Joint Doctrine

    Science.gov (United States)

    2009-01-01

    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  12. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  13. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this doctrine...to forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  14. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  15. Defense Advanced Research Projects Agency Strategic Plan

    Science.gov (United States)

    2007-02-01

    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  16. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  17. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  18. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  19. Rigorous Cyberspace Defense Expert Training Moves Forward

    Science.gov (United States)

    2012-09-01

    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  20. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  1. Host Defense against Opportunist Microorganisms Following Trauma.

    Science.gov (United States)

    1988-06-30

    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  2. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  3. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  4. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  5. The equal effectiveness of different defensive strategies

    Science.gov (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming

    2015-01-01

    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  6. Phenotypic plasticity in the green algae Desmodesmus and Scenedesmus with special reference to the introduction of defensive morphology

    OpenAIRE

    Lürling, M.F.L.L.W.

    2003-01-01

    Organisms belonging to the green algal genera Desmodesmus and Scenedesmus are characterized by a high degree of flexibility allowing them to be true cosmopolitans and to withstand harsh conditions. The environmental conditions determine which phenotypes are being produced and one of the most dangerous situations for the algae is when the organisms are confronted with strong grazing pressure from numerous zooplankton organisms. An overview is given of several aspect of an induced defense in ma...

  7. Plant neighbor identity influences plant biochemistry and physiology related to defense

    Directory of Open Access Journals (Sweden)

    Callaway Ragan M

    2010-06-01

    Full Text Available Abstract Background Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. Results In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa or heterospecific (Festuca idahoensis plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Conclusions Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  8. Choose your weapon: defensive behavior is associated with morphology and performance in scorpions.

    Science.gov (United States)

    van der Meijden, Arie; Lobo Coelho, Pedro; Sousa, Pedro; Herrel, Anthony

    2013-01-01

    Morphology can be adaptive through its effect on performance of an organism. The effect of performance may, however, be modulated by behavior; an organism may choose a behavioral option that does not fully utilize its maximum performance. Behavior may therefore be decoupled from morphology and performance. To gain insight into the relationships between these levels of organization, we combined morphological data on defensive structures with measures of defensive performance, and their utilization in defensive behavior. Scorpion species show significant variation in the morphology and performance of their main defensive structures; their chelae (pincers) and the metasoma ("tail") carrying the stinger. Our data show that size-corrected pinch force varies to almost two orders of magnitude among species, and is correlated with chela morphology. Chela and metasoma morphology are also correlated to the LD50 of the venom, corroborating the anecdotal rule that dangerously venomous scorpions can be recognized by their chelae and metasoma. Analyses of phylogenetic independent contrasts show that correlations between several aspects of chela and metasoma morphology, performance and behavior are present. These correlations suggest co-evolution of behavior with morphology and performance. Path analysis found a performance variable (pinch force) to partially mediate the relationship between morphology (chela aspect ratio) and behavior (defensive stinger usage). We also found a correlation between two aspects of morphology: pincer finger length correlates with the relative "thickness" (aspect ratio) of the metasoma. This suggests scorpions show a trade-off between their two main weapon complexes: the metasoma carrying the stinger, and the pedipalps carrying the chelae.

  9. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata

    2016-01-01

    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  10. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  11. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore

    2016-01-01

    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  12. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  13. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and will...management systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden survivability...technology for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  14. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  15. 32 CFR 2001.36 - Classified information in the custody of private organizations or individuals.

    Science.gov (United States)

    2010-07-01

    ... information by a private organization or individual provided that all access and safeguarding requirements of... 32 National Defense 6 2010-07-01 2010-07-01 false Classified information in the custody of private organizations or individuals. 2001.36 Section 2001.36 National Defense Other Regulations Relating to National...

  16. Anti-antimicrobial peptides: folding-mediated host defense antagonists.

    Science.gov (United States)

    Ryan, Lloyd; Lamarre, Baptiste; Diu, Ting; Ravi, Jascindra; Judge, Peter J; Temple, Adam; Carr, Matthew; Cerasoli, Eleonora; Su, Bo; Jenkinson, Howard F; Martyna, Glenn; Crain, Jason; Watts, Anthony; Ryadnov, Maxim G

    2013-07-12

    Antimicrobial or host defense peptides are innate immune regulators found in all multicellular organisms. Many of them fold into membrane-bound α-helices and function by causing cell wall disruption in microorganisms. Herein we probe the possibility and functional implications of antimicrobial antagonism mediated by complementary coiled-coil interactions between antimicrobial peptides and de novo designed antagonists: anti-antimicrobial peptides. Using sequences from native helical families such as cathelicidins, cecropins, and magainins we demonstrate that designed antagonists can co-fold with antimicrobial peptides into functionally inert helical oligomers. The properties and function of the resulting assemblies were studied in solution, membrane environments, and in bacterial culture by a combination of chiroptical and solid-state NMR spectroscopies, microscopy, bioassays, and molecular dynamics simulations. The findings offer a molecular rationale for anti-antimicrobial responses with potential implications for antimicrobial resistance.

  17. PERSPECTIVES ON INTEROPERABILITY INTEGRATION WITHIN NATO DEFENSE PLANNING PROCESS

    Directory of Open Access Journals (Sweden)

    Florian CIOCAN

    2011-01-01

    Full Text Available Interoperability is not a new area of effort at NATO level. In fact, interoperability and more specifi cally standardization, has been a key element of the Alliance’s approach to fi elding forces for decades. But as the security and operational environment has been in a continuous change, the need to face the new threats and the current involvement in challenging operations in Afghanistan and elsewhere alongside with the necessity to interoperate at lower and lower levels of command with an increasing number of nations, including non-NATO ISAF partners, NGOs, and other organizations, have made the task even more challenging. In this respect Interoperability Integration within NATO Defense Planning Process will facilitate the timely identifi cation, development and delivery of required forces and capabilities that are interoperable and adequately prepared, equipped, trained and supported to undertake the Alliance’s full spectrum of missions.

  18. The US-Japan Alliance: Sharing the Burden of Defense

    Science.gov (United States)

    1983-01-01

    expenditures to GNP. Japan Is also far down the list in defense spending per capita, behind nations such as Sweden, Australia, and Canada. Table 1.2 compares...TABLES Figures 1.1 Trends in Japanese Defense Spending ................. 14 Tables 1.1 Defense Expenditures of Major Countries ............... 12 1.2...Percentage Breakdown of Japanese Defense Expenditures by Category, FY 1977-1981 ............ 40 3.3 Disposition of US Forces in Japan

  19. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that the Defense Intelligence Agency Advisory Board, will meet on March 22 and 23, 2010....

  20. 76 FR 20336 - Defense Audit Advisory Committee (DAAC)

    Science.gov (United States)

    2011-04-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Defense Audit Advisory Committee (DAAC) AGENCY: Under Secretary of Defense... (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as...

  1. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain

    Science.gov (United States)

    2015-10-28

    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  2. Urban Youth, Fear of Crime, and Resulting Defensive Actions.

    Science.gov (United States)

    Williams, J. Sherwood; And Others

    1994-01-01

    Used data from 1,775 urban youth collected in 1986 to examine fear of crime and defensive actions taken by youth. Results revealed that only 11% reported having taken no defensive actions as result of fear of crime. Nearly three-fifths took precaution of having escort at night. Learning self-defense techniques was reported by 19%; 10% indicated…

  3. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  4. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  5. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  6. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  7. Children's Use of Defenses and Self-Esteem Management.

    Science.gov (United States)

    Hay, Deborah

    Children's use of defenses to maintain or enhance self-esteem was investigated. Attention was given to four questions: Do children with different levels of self-esteem differ in (1) the frequency with which they employ defenses? (2) kinds of emotions they defend against? (3) the kinds of social situations which elicit their defensive responses?…

  8. 32 CFR 644.333 - Screening for defense needs.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Screening for defense needs. 644.333 Section 644... Screening for defense needs. Real property which becomes excess to the needs of any element of the Army or... the property is excess to the needs of the using command, without screening for other requirements....

  9. Defense Institution Reform Initiative Program Elements Need to Be Defined

    Science.gov (United States)

    2012-11-09

    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership Strategy...to the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  10. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.

    2003-01-01

    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  11. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    P.G.J. Roosenboom (Peter); T. van der Goot

    2003-01-01

    textabstractThe central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO

  12. Chemical defense of Hymeniacidon heliophila (Porifera: halichondrida against tropical predators

    Directory of Open Access Journals (Sweden)

    Suzi Meneses Ribeiro

    2010-12-01

    Full Text Available Various benthic organisms have chemical defenses which reduce their predators' consumption. Although their efficiency may be noticed in many organisms, many of their effects are not well- known yet. Multiple ecological roles of secondary metabolites are shown in some sponges, which may represent an adaptative advantage considering the high amount of energy used to produce these chemical compounds. The goal of this work was to investigate the defensive property of the extracts from the sponge Hymeniacidon heliophila against the tropical predators: hermit crabs (Calcinus tibicens, sea urchins (Lytechinus variegatus and generalist fishes. Extracts obtained with n-hexane, ethyl acetate and acetone/methanol were used in assays and all of them were effective in reducing the consumption by C. tibicens; n-hexane extract reduced the consumption by L. variegatus; and medium polarity extracts reduced fish consumption. Either the variation in action or the multiple ecological roles of the extracts indicates that different types of compounds can be associated to the defensive system produced by H. heliophila.Diversos organismos bênticos possuem defesas químicas que ajudam a diminuir a predação. Embora sua eficácia seja comprovada, muitos de seus efeitos são ainda desconhecidos. Múltiplas funções dos metabolitos secundários foram evidenciadas em algumas esponjas e isso pode representar uma vantagem adaptativa, considerando o alto valor energético gasto pelas espécies para produzí-los. O objetivo desse trabalho foi investigar as propriedades defensivas de extratos da esponja Hymeniacidon heliophila contra predadores tropicais: paguros (Calcinus tibicens, ouriços-do-mar (Lytechinus variegatus e peixes generalistas. Extratos em n-hexano, acetato de etila e acetona/metanol foram usados nos ensaios e todos foram eficientes na redução do consumo por C. tibicen; extratos em n-hexano reduziram o consumo por L. variegatus; e extratos de m

  13. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence... a closed meeting of the Defense Intelligence Agency National Intelligence University Board...

  14. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  15. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  16. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    Science.gov (United States)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  17. Control Systems Cyber Security: Defense-in-Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  18. Apogee, Perigee, and Recovery: Chronology of Army Exploitation of Space

    Science.gov (United States)

    1989-01-01

    Huntsville, Alabama ........................... 43 14. The high-acceleration Sprint missile blasts out of its White Sands Missile Range launch cell ...Defense BMDATC Ballistic Missile Defense Advanced Technology Center - xxii - BMDC Ballistic Missile Defense Center BMDO Ballistic Missile Defense...9- - 44 - PlBe 14-The high-acceleration Sprint missile blasts out of its White Sands Missile Range launch cell during flight testing. 45 E cc. - 46

  19. A cognitive and economic decision theory for examining cyber defense strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  20. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  1. Validity of Self-Report Measures of Defense Mechanisms

    Science.gov (United States)

    Mehlman; Slane

    1994-06-01

    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  2. Insect response to plant defensive protease inhibitors.

    Science.gov (United States)

    Zhu-Salzman, Keyan; Zeng, Rensen

    2015-01-07

    Plant protease inhibitors (PIs) are natural plant defense proteins that inhibit proteases of invading insect herbivores. However, their anti-insect efficacy is determined not only by their potency toward a vulnerable insect system but also by the response of the insect to such a challenge. Through the long history of coevolution with their host plants, insects have developed sophisticated mechanisms to circumvent antinutritional effects of dietary challenges. Their response takes the form of changes in gene expression and the protein repertoire in cells lining the alimentary tract, the first line of defense. Research in insect digestive proteases has revealed the crucial roles they play in insect adaptation to plant PIs and has brought about a new appreciation of how phytophagous insects employ this group of molecules in both protein digestion and counterdefense. This review provides researchers in related fields an up-to-date summary of recent advances.

  3. National Defense Budget Estimates for FY 2012

    Science.gov (United States)

    2011-03-01

    Military Construction, Navy Reserve 21,708 26,299 26,299 26,299 Military Construction, Air Force Reserve 25,986 33,620 33,620 33,620 Chemical Demil ...Air Force Reserve 7,634 Chemical Demil Construction, Defense 75,312 13,071,701 Appropriation 13,071,701 Budget Authority 13,071,701 TOA...7.00 3.00 Defense Prod Act 59.00 25.00 16.00 Chemical Demil 53.00 30.00 15.00 2.00 RDT&E Army 34.28 48.72 11.33 3.17 1.70 0.80 Navy 36.87 50.51 9.82

  4. Understanding Complexity and Self-Organization in a Defense Program Management Organization (Experimental Design)

    Science.gov (United States)

    2016-03-18

    start of the program. Earned value management data will be used to determine program schedule variance. Program Performance Program performance will...and schedule of the program. Table 4 provides a definition of key earned value terms. Table 4. Earned Value Management Key Terms Subsequent...Sasieni, M. W. (1968). The engineering and management of an effective system. Management Science, 14(12), B-721–B-730. Fredrickson, J. W

  5. Assessment of Logistics improvements made by Department of Defense reinvention laboratories

    OpenAIRE

    Jenkins, Todd M

    1997-01-01

    Approved for public release; distribution is unlimited This thesis examines the logistics accomplishments of Reinvention Laboratories in attempting to improve business practices within the Department of Defense. It documents five cases in which over $342 million in annual savings were achieved to show The potential of continuous improvement. It also provides recommendations for further research and for investment of resources to permit DoD logistics organizations to obtain greater savings....

  6. Defense Management in the 1980s: The Role of the Service Secretaries,

    Science.gov (United States)

    1980-10-01

    defense." In assessing the significance of the 1949 amendments on the role of Service Secretaries, Professor John C. Ries has written: As the Secretary of...in military organizations those difficulties are 24 particularly acute. In his classic study of innovation and the military. Edward Katzenbach ...Secretaries often do provide DOD with unique managerial capabilities unavailable from other sources. 48 ENDNOTES 1. The literature is extensive. John

  7. Congressionally-Direct Homeland Defense and Civil Support Threat Information Collection

    Science.gov (United States)

    2008-09-01

    PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) St. Mary’s University of San Antonio 1 Camino Santa Maria Street San Antonio, TX 78228-5433 8...law Start/End Dates: 10-12 October 2006 Location: University of Guadalajara at Ocotlan, Mexico Attendees: Jeffrey Addicott, Roberto Rosas ...the Ministry of Defense and the Legal Affairs Office of the French Embassy in Lima , Peru with the diplomatic chancellery as the diplomat’s personal

  8. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    bs./gallon EROS H0JRFGEl)ADY NA V e non cbt casualties reconerable/da~vjES] 0011 REFON/DAY s O;I eh losses reoverable, dav [B21 CAS REGEN COFF Ne 0.33...Organization and Equipment," Military Review, Vol. 62, No. 12, December 1982, pp. 2-12. Jacobs, G., "Air-Land Battle 2000," Asian Defense Journal

  9. DRMS (Defense Reutilization and Marketing Service) Total Quality Management (TQM) Implementation Plan

    Science.gov (United States)

    1989-07-01

    ORGANIZATION -j’ Defense Reutilization and Marketing Service. (DR:S) REPORT NUMBER Battle Creek, MI 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS...to assure continuing improvement and maintenance of high quality service to customers worldwide. EDUCATION The heart of our effort is the continuous...Workshops (Operations, Reutilization, Precious Metals, Environmental and Marketing ). In addition, we will strive to incorporate them into all

  10. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  11. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  12. Information on Japanese Defensive Installations and Tactics

    Science.gov (United States)

    1945-01-01

    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  13. Research on Nonlinear Dynamics with Defense Applications

    Science.gov (United States)

    2006-04-01

    numerical verifications, we have experimentally realized the scheme by using a Duffing -type of nonlinear electronic oscillator (originally developed by C...circuits In defense applications it may be desirable to induce chaos in nonlinear oscillators operating in a stable regime. Examples of such oscillators ...evolutions of the target Duffing circuit and deliver resonant perturbations to generate robust chaotic attractors. A brief account of the work has been

  14. Defense Trade Data: Sources and Recommendations

    Science.gov (United States)

    2010-11-01

    detailed trade information on such products may be difficult. Recent U.S. concerns have ranged from dependency on rare earths and first level products...BHUTAN BR INDIAN OCEAN TERR EGYPT INDIA IRAN IRAQ ISRAEL JORDAN KOWAIT LEBANON LIBYA MALDIVES MOROCCO NEPAL OMAN PAKISTAN QATAR SAODI...specifically designed or developed for military application and any computer specifically modified for use with any defense article in any category of

  15. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  16. Russian Ballistic Missile Defense: Rhetoric and Reality

    Science.gov (United States)

    2015-06-01

    2012/06/08/russia_installs_new_radars_as_a_ deterrent_15834.html. 130. “Direct Line with Vladimir Putin ,” President of Russia , April 17, 2014...and increases the danger of war. In his 2012 pre-election treatise on defense policy and national security, Rus- sian President Vladimir Putin ...Kontsern PVO Almaz-Antey) was established by President Vladimir Putin in 2002 uniting no fewer than 46 enterprises, including factories, research and

  17. Implications of Germany's declining defense spending

    OpenAIRE

    Merrath, Jurgen

    2000-01-01

    With its reunification on 3 October 1990, Germany regained its full sovereignty and stands now in a position of greater global responsibility. Faced with dramatically increased demands on and expectations for Germany's armed forces, it must answer the question of how much it is willing to invest for safety and stability in Europe and for protection of peace in the world. In determining the level of commitment behind Germany's foreign and security policy, defense spending is an important indic...

  18. The Defense of Henderson Field, Guadalcanal

    Science.gov (United States)

    2011-03-31

    of US airpower an4 know disruption ofsuch power is critical to achieving their goals. Most US airpower operates from airbases, which can be...Vandegrift remained in his defensive positions because he did not know the size, strength, location, or intentions of the Japanese main body.67 Ichiki...Parachute/Raider Battalion. 75 Edson deployed his 830 men South of Henderson Field in a series of mut ~ally supporting strongnolds. He was flanked to

  19. A Content Analysis of Defense Budget Rhetoric

    Science.gov (United States)

    2011-06-01

    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  20. Affordability Constraints in Major Defense Acquisitions

    Science.gov (United States)

    2016-11-01

    price , this is actually an inverse supply curve. In competitive markets, the inverse supply curve is the firm’s marginal cost curve. When firms have a...support features and functions. The vertical axis represents the unit sale price , inclusive of all life-cycle or total ownership costs as appropriate...Three Defense Programs 3 We can easily extend the example to incorporate cost - plus payment schemes

  1. Defense Horizons. Number 78, March 2015

    Science.gov (United States)

    2015-03-01

    databases , National Defense University researchers have identified 124 examples of effective P4s across a wide spectrum of industries and...environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000 examples of public-public and public...Partnering,” SONRI, Inc., 2010. 8 Farming First, “Innovation and Incentives for Farmers Needed to Protect World’s Biodiversity ,” press release, May 21

  2. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  3. Department of Defense Energy Management Plan, 1980

    Science.gov (United States)

    1980-07-01

    Energy Usage in Existing Buildings . .......... .111-29 111-11 Timetable for Developing Utility Efficiency Standards ................. .......... 111-30...in the Defense Energy Emergency Planning System (DEEMS) document (Appendix A). The purpose of the DEEMS is to assure the availabilty of fuels to the...unleaded gasoline usage , y 1985. It is anticipated that sufficient supplies of ’alcohol and non-petroleum derived fuel will be available. DoD’s

  4. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral...

  5. Inducible defenses in prey intensify predator cannibalism.

    Science.gov (United States)

    Kishida, Osamu; Trussell, Geoffrey C; Nishimura, Kinya; Ohgushi, Takayuki

    2009-11-01

    Trophic cascades are often a potent force in ecological communities, but abiotic and biotic heterogeneity can diffuse their influence. For example, inducible defenses in many species create variation in prey edibility, and size-structured interactions, such as cannibalism, can shift predator diets away from heterospecific prey. Although both factors diffuse cascade strength by adding heterogeneity to trophic interactions, the consequences of their interactioh remain poorly understood. We show that inducible defenses in tadpole prey greatly intensify cannibalism in predatory larval salamanders. The likelihood of cannibalism was also strongly influenced by asymmetries in salamander size that appear to be most important in the presence of defended prey. Hence, variation in prey edibility and the size structure of the predator may synergistically affect predator-prey population dynamics by reducing prey mortality and increasing predator mortality via cannibalism. We also suggest that the indirect effects of prey defenses may shape the evolution of predator traits that determine diet breadth and how trophic dynamics unfold in natural systems.

  6. Tsunami Defense Efforts at Samcheok Port, Korea

    Science.gov (United States)

    Cho, Y. S.

    2016-02-01

    Tsunamis mainly triggered by impulsive undersea motions are long waves and can propagate a long distance. Thus, they can cause huge casualties not only neighboring countries but also distant countries. Recently, several devastating tsunamis have been occurred around the Pacific Ocean rim. Among them, the Great East Japan tsunami occurred on March 11, 2011 is probably recorded as one of the most destructive tsunamis during last several decades. The Tsunami killed more than 20,000 people (including missing people) and deprived of property damage of approximately 300 billion USD. The eastern coast of the Korean Peninsula has been attacked historically by unexpected tsunami events. These tsunamis were generated by undersea earthquakes occurred off the west coast of Japan. For example, the Central East Sea Tsunami occurred on May 26, 1983 killed 3 people and caused serious property damage at Samcheok Port located at the eastern coast of Korea. Thus, a defense plan against unexpected tsunami strikes is an essential task for the port authority to protect lives of human beings and port facilities. In this study, a master plan of tsunami defense is introduced at Samcheok Port. A tsunami hazard map is also made by employing both propagation and inundation models. Detailed defense efforts are described including the procedure of development of a tsunami hazard map. Keywords: tsunami, hazard map, run-up height, emergency action plan

  7. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  8. Extracellular DNA: the tip of root defenses?

    Science.gov (United States)

    Hawes, Martha C; Curlango-Rivera, Gilberto; Wen, Fushi; White, Gerard J; Vanetten, Hans D; Xiong, Zhongguo

    2011-06-01

    This review discusses how extracellular DNA (exDNA) might function in plant defense, and at what level(s) of innate immunity this process might operate. A new role for extracellular factors in mammalian defense has been described in a series of studies. These studies reveal that cells including neutrophils, eosinophils, and mast cells produce 'extracellular traps' (ETs) consisting of histone-linked exDNA. When pathogens are attracted to such ETs, they are trapped and killed. When the exDNA component of ETs is degraded, trapping is impaired and resistance against invasion is reduced. Conversely, mutation of microbial genes encoding exDNases that degrade exDNA results in loss of virulence. This discovery that exDNases are virulence factors opens new avenues for disease control. In plants, exDNA is required for defense of the root tip. Innate immunity-related proteins are among a group of >100 proteins secreted from the root cap and root border cell populations. Direct tests revealed that exDNA also is rapidly synthesized and exported from the root tip. When this exDNA is degraded by the endonuclease DNase 1, root tip resistance to fungal infection is lost; when the polymeric structure is degraded more slowly, by the exonuclease BAL31, loss of resistance to fungal infection is delayed accordingly. The results suggest that root border cells may function in a manner analogous to that which occurs in mammalian cells.

  9. Electroconvulsive Therapy Malpractice: Verdict for the Defense.

    Science.gov (United States)

    Goodman, Theodore; McCall, W Vaughn

    2015-09-01

    Malpractice cases involving electroconvulsive therapy (ECT) are rare. Even rarer are those malpractice cases alleging ECT-related brain damage. The few cases of ECT malpractice lawsuits are not described in the medical literature in detail. We provide a detailed account of a case of a patient and subsequent alleged ECT-related malpractice. The details of the case were collated using the handwritten notes of one of the authors who was present at the trial and the pretrial documents of discovery that were entered into evidence. The plaintiff alleged complete autobiographical amnesia after ECT, supposedly as a result of ECT-related brain damage. The defense was aided by the presence of extensive neurological examination and brain imaging both before and after ECT. The defense team also offered to the jury the concept of "dissociative amnesia" as an alternative explanation for the plaintiff's memory complaints. The case went to trial and was successfully defended. Electroconvulsive therapy malpractice cases alleging brain damage can be successfully defended, and the successful defense is aided by adequate documentation before, during, and after ECT. Malpractice cases, especially if they are baseless, can occur unpredictably, but they can be defended if the medical documentation is thorough.

  10. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  11. Organization within Organization Studies

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    This paper explores how prevalent contemporary problematizations of organizations coincide with a widespread assessment that Organization Studies (OS) has run out of steam. This impasse, the paper argues, is largely due to the emergence of an organization-phobia that has come to seize several...... strands of theorizing. By attending to the wide-ranging and far-reaching history of this organization-phobia, the paper argues that OS has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming...

  12. Circumstances for excluding unlawfulness and the legal institute of necessary defense

    Directory of Open Access Journals (Sweden)

    Albulena U. Ukimeraj

    2016-07-01

    Full Text Available There are reasons or circumstances provided for by the legal-criminal norms which in the concrete case and situation due to coexistence of certain circumstances make the offence permissible despite the fact that it contains all the traits of a criminal offence. The need for selfdefense, remains present considering the scale in which terrorism has spread, and considering that there are criminal individuals and organizations which endanger public safety by attacking people and buildings for the purpose of perpetrating a robbery, retaliation or other acts in pursuit of economic or political ends. The necessary defense is a lawful action of every individual or group in protection of itself from undue attacks which pose a threat to social order, life, health, property or other rights and interests, whereby the criminal liability and guilt is suspended as defense is considered as a “right” of a person whose rights were under attack. Alongside the punishments and measures imposed by the state against perpetrators of crimes, the criminal law also provides for individual defense, which can be done by citizens themselves under certain conditions and circumstances, a defense that is in line with the fundamental principles of a democratic state, international law and fundamental human rights and freedoms.

  13. Function of ABA in Stomatal Defense against Biotic and Drought Stresses

    Directory of Open Access Journals (Sweden)

    Chae Woo Lim

    2015-07-01

    Full Text Available The plant hormone abscisic acid (ABA regulates many key processes involved in plant development and adaptation to biotic and abiotic stresses. Under stress conditions, plants synthesize ABA in various organs and initiate defense mechanisms, such as the regulation of stomatal aperture and expression of defense-related genes conferring resistance to environmental stresses. The regulation of stomatal opening and closure is important to pathogen defense and control of transpirational water loss. Recent studies using a combination of approaches, including genetics, physiology, and molecular biology, have contributed considerably to our understanding of ABA signal transduction. A number of proteins associated with ABA signaling and responses—especially ABA receptors—have been identified. ABA signal transduction initiates signal perception by ABA receptors and transfer via downstream proteins, including protein kinases and phosphatases. In the present review, we focus on the function of ABA in stomatal defense against biotic and abiotic stresses, through analysis of each ABA signal component and the relationships of these components in the complex network of interactions. In particular, two ABA signal pathway models in response to biotic and abiotic stress were proposed, from stress signaling to stomatal closure, involving the pyrabactin resistance (PYR/PYR-like (PYL or regulatory component of ABA receptor (RCAR family proteins, 2C-type protein phosphatases, and SnRK2-type protein kinases.

  14. A common toxin fold mediates microbial attack and plant defense.

    Science.gov (United States)

    Ottmann, Christian; Luberacki, Borries; Küfner, Isabell; Koch, Wolfgang; Brunner, Frédéric; Weyand, Michael; Mattinen, Laura; Pirhonen, Minna; Anderluh, Gregor; Seitz, Hanns Ulrich; Nürnberger, Thorsten; Oecking, Claudia

    2009-06-23

    Many plant pathogens secrete toxins that enhance microbial virulence by killing host cells. Usually, these toxins are produced by particular microbial taxa, such as bacteria or fungi. In contrast, many bacterial, fungal and oomycete species produce necrosis and ethylene-inducing peptide 1 (Nep1)-like proteins (NLPs) that trigger leaf necrosis and immunity-associated responses in various plants. We have determined the crystal structure of an NLP from the phytopathogenic oomycete Pythium aphanidermatum to 1.35A resolution. The protein fold exhibits structural similarities to cytolytic toxins produced by marine organisms (actinoporins). Computational modeling of the 3-dimensional structure of NLPs from another oomycete, Phytophthora parasitica, and from the phytopathogenic bacterium, Pectobacterium carotovorum, revealed a high extent of fold conservation. Expression of the 2 oomycete NLPs in an nlp-deficient P. carotovorum strain restored bacterial virulence, suggesting that NLPs of prokaryotic and eukaryotic origins are orthologous proteins. NLP mutant protein analyses revealed that identical structural properties were required to cause plasma membrane permeabilization and cytolysis in plant cells, as well as to restore bacterial virulence. In sum, NLPs are conserved virulence factors whose taxonomic distribution is exceptional for microbial phytotoxins, and that contribute to host infection by plasma membrane destruction and cytolysis. We further show that NLP-mediated phytotoxicity and plant defense gene expression share identical fold requirements, suggesting that toxin-mediated interference with host integrity triggers plant immunity-associated responses. Phytotoxin-induced cellular damage-associated activation of plant defenses is reminiscent of microbial toxin-induced inflammasome activation in vertebrates and may thus constitute another conserved element in animal and plant innate immunity.

  15. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  16. OVERTURES TO REDUCING ROMANIAN MINISTRY OF NATIONAL DEFENSE TENUITY IN INFORMATION RESOURCE MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Lucian BIBO

    2014-10-01

    Full Text Available Information Resources Management (IRM means planning, budgeting, organizing, directing, training and controlling information. It encompasses both information itself and related resources such as personnel, equipment, funds and technology. For many organizations, information and the technology that supports it represent their most valuable, but often least understood assets. The Romanian Ministry of National Defense (MoND has to face this fragile issue, too. Hence an analysis of the AS IS situation is more than necessary if future endeavors in the field are to succeed. Moreover, the identification of possible solutions and of their likely constraints is another aim of this article

  17. Report of the Defense Science Board Subcommittee on Department of Defense Research Policy. Part 1. Policy on Support of Basic Research

    Science.gov (United States)

    1963-12-31

    f. .. AD-A955 482 Report of the Defen e Science Board Subcomtnittee on Depart•eat of Defense RESEARCH POLICY OTIC SELECTED NOV 2 91J88 0(/H...ACCESSION NO NA 11 TITLE (inc/ud* Stcunty Oassificat/on) Report of the Defense Science Board Subcomittee on Department of Defense Research Policy , Part...Defense Research Policy Office of the Director of Defense Research and Engineering Washington, D. C. 31 December 1963 OFFICE OF THE DIRECTOR OF DEFENSE

  18. Toward a defense-dominated world

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  19. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  20. Stop or move: Defensive strategies in humans.

    Science.gov (United States)

    Bastos, Aline F; Vieira, Andre S; Oliveira, Jose M; Oliveira, Leticia; Pereira, Mirtes G; Figueira, Ivan; Erthal, Fatima S; Volchan, Eliane

    2016-04-01

    Threatening cues and surrounding contexts trigger specific defensive response patterns. Potential threat evokes attentive immobility; attack evokes flight when escape is available and immobility when escape is blocked. Tonic immobility installs when threat is overwhelming and life-risky. In humans, reduced body sway characterizes attentive and tonic immobility, the former with bradycardia, and the later with expressive tachycardia. Here, we investigate human defensive strategies in the presence or absence of an escape route. We employed pictures depicting a man carrying a gun and worked with participants exposed to urban violence. In pictures simulating more possibility of escape, the gun was directed away from the observer; in those simulating higher risk and less chance of escape, the gun was directed toward the observer. Matched control pictures depicted similar layouts, but a non-lethal object substituted the gun. Posturographic and electrocardiographic recordings were collected. Amplitude of sway and heart rate were higher for gun directed-away and lower for gun direct-toward. Compared to their respective matched controls, there was a general increase in the amplitude of sway for the gun directed-away pictures; and a reduction in back-and-forth sway and in heart rate for gun directed-toward pictures. Taken together, those measures suggest that, when exposed to threat invading their margin of safety in a context indicating possible escape route, humans, as non-human species, engage in active escape, resembling the flight stage of the defensive cascade. When facing threat indicating less possibility of escape, humans present an immobile response with bradycardia.

  1. Directed energy missions for planetary defense

    Science.gov (United States)

    Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-09-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.

  2. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    Science.gov (United States)

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  3. The Reagan Defense Budget: Prospects and Pressures,

    Science.gov (United States)

    1981-12-01

    policy and to stimulate U.S. economic growth; and ( ii ) the urgent requirement to build up America’s defense capabilities. The former theme is a traditional...Paris in the Fall of 1981: a ver- sion of it will appear in the Ramses conference proceedings. -2- Unfortunately, it now seems as though these two...Proposed OMB Cut Alternatives (August) Level I 221.9 183.6 247.3 219.2 278.4 246.9 Level II 221.4 183.4 238.5 217.4 276.9 243.5 Level III 216.0 182.0

  4. The Relationship between Inflation and Defense Expenditures.

    Science.gov (United States)

    1979-12-01

    resources they would be bid up in the expanding sector. See Robert Solow , "Evaluation," in After the Phillips Curve: Persistence of High Inflation and...can be explained by the respective rates of growth of money supply per unit of national product. ’𔃼 IF’risch, op. cit., p. 1311. Robert J. Gordon...Statistical Approach for Forecasting Defense Expenditures in the Short-run," in William F. Butler, Robert A. Kavesh, and Robert B. Platt, eds., "Methods and

  5. Bacterial gasotransmitters: an innate defense against antibiotics.

    Science.gov (United States)

    Luhachack, Lyly; Nudler, Evgeny

    2014-10-01

    In recent decades, there has been growing interest in the field of gasotransmitters, endogenous gaseous signaling molecules (NO, H2S, and CO), as regulators of a multitude of biochemical pathways and physiological processes. Most of the concerted effort has been on eukaryotic gasotransmitters until the subsequent discovery of bacterial counterparts. While the fundamental aspects of bacterial gasotransmitters remain undefined and necessitate further research, we will discuss a known specific role they play in defense against antibiotics. Considering the current dilemma of multidrug-resistant bacteria we consider it particularly prudent to exploring novel targets and approaches, of which the bacterial gasotransmitters, nitric oxide and hydrogen sulfide represent.

  6. TOPAZ II Anti-Criticality Device Rapid Prototype

    Science.gov (United States)

    Campbell, Donald R.; Otting, William D.

    1994-07-01

    The Ballistic Missile Defense Organization (BMDO) has been working on a Nuclear Electric Propulsion Space Test Project (NEPSTP) using an existing Russian Topaz II reactor system to power the NEPSTP satellite. Safety investigations have shown that it will be possible to safely launch the Topaz II system in the United States with some modification to preclude water flooded criticality. A ``fuel-out'' water subcriticality concept was selected by the Los Alamos National Laboratory (LANL) as the baseline concept. A fuel-out anti-criticality device (ACD) conceptual design was developed by Rockwell. The concept functions to hold the fuel from the four centermost thermionic fuel elements (TFEs) outside the reactor during launch and reliably inserts the fuel into the reactor once the operational orbit is achieved. A four-tenths scale ACD rapid prototype model, fabricated from the CATIA solids design model, clearly shows in three dimensions the relative size and spatial relationship of the ACD components.

  7. Knowledge Organization = Information Organization?

    DEFF Research Database (Denmark)

    Hjørland, Birger

    Are the terms ―information organization‖ (IO), ―organization of information‖ (OI) and ―information architecture‖ (IA) synonyms for knowledge organization (KO)? This study uses bibliometric methods, among others, to determine some relations between these terms and their meanings. Apparently the data...

  8. Knowledge Organization = Information Organization?

    DEFF Research Database (Denmark)

    Hjørland, Birger

    Are the terms ―information organization‖ (IO), ―organization of information‖ (OI) and ―information architecture‖ (IA) synonyms for knowledge organization (KO)? This study uses bibliometric methods, among others, to determine some relations between these terms and their meanings. Apparently the data...

  9. Synchronization of developmental processes and defense signaling by growth regulating transcription factors.

    Directory of Open Access Journals (Sweden)

    Jinyi Liu

    Full Text Available Growth regulating factors (GRFs are a conserved class of transcription factor in seed plants. GRFs are involved in various aspects of tissue differentiation and organ development. The implication of GRFs in biotic stress response has also been recently reported, suggesting a role of these transcription factors in coordinating the interaction between developmental processes and defense dynamics. However, the molecular mechanisms by which GRFs mediate the overlaps between defense signaling and developmental pathways are elusive. Here, we report large scale identification of putative target candidates of Arabidopsis GRF1 and GRF3 by comparing mRNA profiles of the grf1/grf2/grf3 triple mutant and those of the transgenic plants overexpressing miR396-resistant version of GRF1 or GRF3. We identified 1,098 and 600 genes as putative targets of GRF1 and GRF3, respectively. Functional classification of the potential target candidates revealed that GRF1 and GRF3 contribute to the regulation of various biological processes associated with defense response and disease resistance. GRF1 and GRF3 participate specifically in the regulation of defense-related transcription factors, cell-wall modifications, cytokinin biosynthesis and signaling, and secondary metabolites accumulation. GRF1 and GRF3 seem to fine-tune the crosstalk between miRNA signaling networks by regulating the expression of several miRNA target genes. In addition, our data suggest that GRF1 and GRF3 may function as negative regulators of gene expression through their association with other transcription factors. Collectively, our data provide new insights into how GRF1 and GRF3 might coordinate the interactions between defense signaling and plant growth and developmental pathways.

  10. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  11. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  12. Defense Intelligence Agency: 50 Years Committed to Excellence in Defense of the Nation

    Science.gov (United States)

    2011-01-01

    to the September 11th terrorist attacks on the Pentagon. Rosa Chapa , Sandra Foster, Robert Hymel, Shelley Marshall, Patricia Mickley, Charles...the Nation MASTER SERGEANT WILLIAM W. BULTMEIER, USA, (RET) Defense Attaché Offi ce, Niamey 23 December 2000 ROSA M. CHAPA Offi ce of the Comptroller

  13. The silent defense: Micro-RNA directed defense against HIV-1 replication

    Directory of Open Access Journals (Sweden)

    Kumar Ajit

    2007-04-01

    Full Text Available Abstract MicroRNAs play critical role in regulating gene expression. MicroRNA profile of particular cell type bears the signature of cell type specific gene expression. Given that viral pathogens replicate by evading host defenses, research is now focused on the miRNA-regulated genes that critically regulate HIV-1 propagation in human host cells.

  14. Plant chemical defense against herbivores and pathogens: generalized defense or trade-offs?

    NARCIS (Netherlands)

    Biere, A.; Marak, H.B.; Van Damme, J.M.M.

    2004-01-01

    Plants are often attacked by multiple enemies, including pathogens and herbivores. While many plant secondary metabolites show specific effects toward either pathogens or herbivores, some can affect the performance of both these groups of natural enemies and are considered to be generalized defense

  15. Transitioning Defense Organizational Initiatives: An Assessment of Key 2001-2008 Defense Reforms

    Science.gov (United States)

    2008-12-01

    Pierre Chao Dr. Daniel Y. Chiu Mr. Raymond F. DuBois Ms. Michèle A. Flournoy Gen Ronald R. Fogleman, USAF (Ret.) Dr. Jacques S. Gansler Mr. Paul R.S...transformation was the Defense Business Board. First chaired by General Gus Pagonis (U. S. Army, Ret.), the chair since 2007 has been Michael Bayer . This

  16. Making Department of Defense Basic Research Purple (Joint), but NOT the Department of Defense Laboratories

    Science.gov (United States)

    2013-12-01

    outside of government, where they report to the chief executive officer (CEO) or to the CEO through a chief technology officer ( CTO ). The panel...Technology ASDR&E Assistant Secretary of Defense for Research and Engineering CEO chief executive officer COE Center of Excellence CTO chief

  17. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2011-07-25

    ... presented by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated... offered price. These provisions must also be used in acquisitions of commercial items conducted using part...--ACQUISITION OF COMMERCIAL ITEMS 4. Add new section 212.205 to read as follows: 212.205 Offers. (c) When...

  18. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    Science.gov (United States)

    2015-06-01

    should be done by using the IAS for a modeling situation (for instance, JWARS—Joint Warfare System) or IAS which can carry out a SWOT analysis (IAS...43  C.  MISTAKE ANALYSIS OF CONDUCTED DEFENSE REVIEW IN MDU...PROGRAMS ...................................................64  B.  ANALYSIS OF PLANNING AND EXECUTING FINANCIAL RESOURCES OF MDU

  19. STUDY OF THE DEFENSIVE PERFORMANCE INDICATORS IN PEAK PERFORMANCE BASKETBALL

    Directory of Open Access Journals (Sweden)

    Alejandro \\u00C1lvarez

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the different defensive performance indicators in basketball, analyzing the difference in relation to success (efficacious or non-efficacious defenses and the game result (win or loss. All halfcourt offenses (n=1045 from the quarterfinal, semifinal, consolation game, and final of the 2008 Olympics Games were analyzed. In each defense phase, the following variables were analyzed with regard to the team on defense: (1 Type of defense used, (2 Pressure in offense transition, (3 Defensive switches, (4 Helping on defense, (5 Inside passes, (6 Degree of opposition when shooting, (7 Points allowed, (8 Final result of the game, and (9 Defensive efficacy. The most significant results show that: : a the type of defense that was most used was quarter-court an-on-man (man-on-man at 6.25m, but the one that was most efficacious was the half-court zone defense; b transition pressure was used in 23.83% of the game phases; c defensive switches were done in 7.85% of the game phases; d helping on defense was used in 60% of the game phases; e inside passes were taken in 30.9% of the game phases; f 38.9% of the shots were done with high opposition; and g points were scored in 42.28% of the game phases, such that winning teams allowed the opponent to score in 38.81% of the game phases, and losing teams in 45.77%.

  20. Extracellular Alkalinization as a Defense Response in Potato Cells

    OpenAIRE

    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-de...

  1. Deming's Management Philosophy and the defense industrial base.

    OpenAIRE

    Graff, David Jacques

    1991-01-01

    Approved for public release: distribution is unlimited The purpose of this thesis is to analyze why firms are leaving the defense industrial base and to determine if Dr. Edwards Deming's Management Philosophy can offer a more constructive way of doing business in the Defense Acquisition System. A comparative analysis was conducted between industry's reasons for wanting to leave the defense sector and Deming's Management Philosophy. This analysis determined if adoption of Deming's Managemen...

  2. Assessing Future Trends in the Defense Burdens of Western Nations

    Science.gov (United States)

    1993-04-01

    Summary Table 1). A weighted average for the four allies that spend most heavily on defense -- Japan , France, Germany, and the United Kingdom--is projected...military was dismantled. Among the largest allies, Japan represents the other extreme. Japanese defense spending as a percentage of GDP is projected to...January 1993. d. Weighted average for Japan , France, Germany, and the United Kingdom--countries that spend the greatest amounts on defense . e The 1990

  3. Defense Exportability Features Initiative: A New Paradigm for International Cooperation

    Science.gov (United States)

    2015-02-01

    exportability process. Consequently DEF should en- hance these traditional benefits in two important ways: • By providing advanced capability to allies and...Defense AT&L: January–February 2015 24 Defense Exportability Features Initiative A New Paradigm for International Cooperation Frank D. Kenlon n...Jay Mandelbaum Kenlon is a professor of international acquisition management (intermittent) in the Defense Systems Management College’s International

  4. Analysis of Defense Products Contract Trends, 1990-2014

    Science.gov (United States)

    2015-04-30

    Analysis of Defense Products Contract Trends , 1990–2014 Andrew Hunter—is a senior fellow in the International Security Program and director of the Defense...a decade, the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies (CSIS) has analyzed and reported on trends ...countervailing trend of divestments, including Northrop Grumman’s divestment of its shipbuilding business into Huntington Ingalls Industries. As

  5. Defense: FY2012 Budget Request, Authorization and Appropriations

    Science.gov (United States)

    2012-02-13

    Senate versions of the bill would have done). The ships for which most of the total cost is authorized in FY2012 include two Virginia -class submarines, a...New START Treaty: Central Limits and Key Provisions, by Amy F. Woolf . Defense: FY2012 Budget Request, Authorization and Appropriations...Missile Defense and Offensive Arms Reductions: A Review of the Historical Record, by Steven A. Hildreth and Amy F. Woolf . Defense: FY2012 Budget

  6. Department of Defense Laboratories: Finding a Future in Technology Transfer

    Science.gov (United States)

    1993-04-01

    investment. There is no mention of DoD even trying. This, then, presents a problem for Defense technology transfer management. The President expects both...effort, but nonetheless felt unable to express their effort quantitatively. The potential size and demand for Defense technology transfer calls for some... Defense technology transfer is taking place, it is doing so on the enthusiasm and drive of a few key individuals. Political demand and legislation

  7. Total Quality Management in the Department of Defense

    Science.gov (United States)

    1989-09-01

    DTI ELECT SDu TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS BRUCE E. SPRINGS, B.S. CAPTAIN, USAF AFIT/GLN/LSR/ 89S -57 I1- DEPARTMENT...13 0 3 AFIT/GLM/LSR/89S-57 TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS BRUCE E. SPRINGS, B.S. CAPTAIN, USAF AFIT/GLH/LSR/89S-57...Defense. # AFIT/GLM/LSR/89S-57 TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS Presented to the Faculty of the School of Systems and Logistics

  8. Defense strategies used by two sympatric vineyard moth pests.

    Science.gov (United States)

    Vogelweith, Fanny; Thiéry, Denis; Moret, Yannick; Colin, Eloïse; Motreuil, Sébastien; Moreau, Jérôme

    2014-05-01

    Natural enemies including parasitoids are the major biological cause of mortality among phytophagous insects. In response to parasitism, these insects have evolved a set of defenses to protect themselves, including behavioral, morphological, physiological and immunological barriers. According to life history theory, resources are partitioned to various functions including defense, implying trade-offs among defense mechanisms. In this study we characterized the relative investment in behavioral, physical and immunological defense systems in two sympatric species of Tortricidae (Eupoecilia ambiguella, Lobesia botrana) which are important grapevine moth pests. We also estimated the parasitism by parasitoids in natural populations of both species, to infer the relative success of the investment strategies used by each moth. We demonstrated that larvae invest differently in defense systems according to the species. Relative to L. botrana, E. ambiguella larvae invested more into morphological defenses and less into behavioral defenses, and exhibited lower basal levels of immune defense but strongly responded to immune challenge. L. botrana larvae in a natural population were more heavily parasitized by various parasitoid species than E. ambiguella, suggesting that the efficacy of defense strategies against parasitoids is not equal among species. These results have implications for understanding of regulation in communities, and in the development of biological control strategies for these two grapevine pests.

  9. Law & psychiatry: Does the constitution require an insanity defense?

    Science.gov (United States)

    Appelbaum, Paul S

    2013-10-01

    Idaho is one of four states that have abolished the insanity defense. Hence, John Delling, on trial for two murders in Idaho, was unable to plead insanity or to argue that he lacked intent to kill, the only available option under Idaho law. After being sentenced to life in prison without parole, Delling challenged the constitutionality of Idaho's law. The state's supreme court rejected his appeal, holding that--despite the long history of the insanity defense and its widespread acceptance--there was no constitutional right to an insanity defense. Delling's petition to the U.S. Supreme Court was turned away, leaving the constitutional status of the insanity defense uncertain.

  10. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... Defense Health Board Subcommittees will present updates to the Board: National Capital Region Base... Forces, Military/ Occupational Health and Medical Surveillance, and the Psychological Health...

  11. Does self-defense training prevent sexual violence against women?

    Science.gov (United States)

    Hollander, Jocelyn A

    2014-03-01

    Self-defense classes are offered across the nation as a strategy for reducing women's vulnerability to sexual assault. Yet there has been little systematic research assessing the effectiveness of these classes. In this article, I use data from a mixed methods study of a 10-week, university-based, feminist self-defense class to examine the effectiveness of self-defense training over a 1-year follow-up period. My analyses indicate that women who participate in self-defense training are less likely to experience sexual assault and are more confident in their ability to effectively resist assault than similar women who have not taken such a class.

  12. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  13. Antioxidative defense mechanisms in the aging brain

    Directory of Open Access Journals (Sweden)

    Jovanović Zorica

    2014-01-01

    Full Text Available Aging is an extremely complex, multifactorial process that is characterized by a gradual and continuous loss of physiological functions and responses, particularly marked in the brain. A common hallmark in aging and age-related diseases is an increase in oxidative stress and the failure of antioxidant defense systems. Current knowledge indicates that the level of glutathione progressively declines during aging. Because nerve cells are the longest-living cells that exhibit a high consumption rate of oxygen throughout an individual’s lifetime, the brain may be especially vulnerable to oxidative damage and this vulnerability increases during aging. In addition, the brain contains high concentrations of polyunsaturated fatty acids and transition metals and low antioxidative defense mechanisms. Although aging is an inevitable event, a growing volume of data confirms that antioxidant supplementation in combination with symptomatic drug treatments reduces oxidative stress and improves cognitive function in aging and age-related diseases. The present review discusses the neuroprotective effects of antioxidants in the aging brain.

  14. Directed Energy Missions for Planetary Defense

    CERN Document Server

    Lubin, Philip; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathon; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional prop...

  15. Beryllium--important for national defense

    Science.gov (United States)

    Boland, M.A.

    2012-01-01

    Beryllium is one of the lightest and stiffest metals, but there was little industrial demand for it until the 1930s and 1940s when the aerospace, defense, and nuclear sectors began using beryllium and its compounds. Beryllium is now classified by the U.S. Department of Defense as a strategic and critical material because it is used in products that are vital to national security. The oxide form of beryllium was identified in 1797, and scientists first isolated metallic beryllium in 1828. The United States is the world's leading source of beryllium. A single mine at Spor Mountain, Utah, produced more than 85 percent of the beryllium mined worldwide in 2010. China produced most of the remainder, and less than 2 percent came from Mozambique and other countries. National stockpiles also provide significant amounts of beryllium for processing. To help predict where future beryllium supplies might be located, U.S.Geological Survey (USGS) scientists study how and where beryllium resources are concentrated in Earth's crust and use that knowledge to assess the likelihood that undiscovered beryllium resources may exist. Techniques to assess mineral resources have been developed by the USGS to support the stewardship of Federal lands and to better evaluate mineral resource availability in a global context. The USGS also compiles statistics and information on the worldwide supply of, demand for, and flow of beryllium. These data are used to inform U.S. national policymaking.

  16. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  17. Defense peptides secreted by helminth pathogens: antimicrobial and/or immunomodulator molecules?

    Science.gov (United States)

    Cotton, Sophie; Donnelly, Sheila; Robinson, Mark W.; Dalton, John P.; Thivierge, Karine

    2012-01-01

    Host defense peptides (HDPs) are an evolutionarily conserved component of the innate immune response found in all living species. They possess antimicrobial activities against a broad range of organisms including bacteria, fungi, eukaryotic parasites, and viruses. HDPs also have the ability to enhance immune responses by acting as immunomodulators. We discovered a new family of HDPs derived from pathogenic helminth (worms) that cause enormous disease in animals and humans worldwide. The discovery of these peptides was based on their similar biochemical and functional characteristics to the human defense peptide LL-37. We propose that these new peptides modulate the immune response via molecular mimicry of mammalian HDPs thus providing a mechanism behind the anti-inflammatory properties of helminth infections. PMID:22973271

  18. Defense peptides secreted by helminth pathogens: antimicrobial and/or immunomodulator molecules?

    Directory of Open Access Journals (Sweden)

    Sophie eCotton

    2012-08-01

    Full Text Available Host defense peptides (HDPs are an evolutionarily conserved component of the innate immune response found in all living species. They possess antimicrobial activities against a broad range of organisms including bacteria, fungi, eukaryotic parasites and viruses. HDPs also have the ability to enhance immune responses by acting as immunomodulators. We discovered a new family of HDPs derived from pathogenic helminthes (worms that cause enormous disease in animals and humans worldwide. The discovery of these peptides was based on their similar biochemical and functional characteristics to the human defense peptide LL-37. We propose that these new peptides modulate the immune response via molecular mimicry of mammalian HDPs thus providing a mechanism behind the anti-inflammatory properties of helminth infections.

  19. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    either an unmatched disbursement or a negative unliquidated obligation. Unmatched disbursements are disbursements recorded in the accounting system ...ledger that reflects the available budgetary spending authority of Federal agencies. Collections and disbursements by agencies increase or decrease the...With Treasury Accounts,” March 29, 2012. 5 This amount excludes Foreign Military Sales . Introduction DODIG-2016-064 │ 3 • DLA provides consumable

  20. Evaluation of the Defense Criminal Investigative OrganizationsDefense Incident-Based Reporting System Reporting and Reporting Accuracy

    Science.gov (United States)

    2014-10-29

    and management. Additional data collection and reporting requirements are contained in the Victims’ Rights and Restitution Act of 1990 (49 U.S.C...and reporting requirements of the Uniform Federal Crime Reporting Act of 1988, Victims’ Rights and Restitution , and Brady Handgun Violence Prevention...process instead of the back end (with FBI checks). The DIBRS Database Administrator is working with his FBI CJIS counterpart to work out a plan for the

  1. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  2. Chromosome-level genome map provides insights into diverse defense mechanisms in the medicinal fungus Ganoderma sinense.

    Science.gov (United States)

    Zhu, Yingjie; Xu, Jiang; Sun, Chao; Zhou, Shiguo; Xu, Haibin; Nelson, David R; Qian, Jun; Song, Jingyuan; Luo, Hongmei; Xiang, Li; Li, Ying; Xu, Zhichao; Ji, Aijia; Wang, Lizhi; Lu, Shanfa; Hayward, Alice; Sun, Wei; Li, Xiwen; Schwartz, David C; Wang, Yitao; Chen, Shilin

    2015-06-05

    Fungi have evolved powerful genomic and chemical defense systems to protect themselves against genetic destabilization and other organisms. However, the precise molecular basis involved in fungal defense remain largely unknown in Basidiomycetes. Here the complete genome sequence, as well as DNA methylation patterns and small RNA transcriptomes, was analyzed to provide a holistic overview of secondary metabolism and defense processes in the model medicinal fungus, Ganoderma sinense. We reported the 48.96 Mb genome sequence of G. sinense, consisting of 12 chromosomes and encoding 15,688 genes. More than thirty gene clusters involved in the biosynthesis of secondary metabolites, as well as a large array of genes responsible for their transport and regulation were highlighted. In addition, components of genome defense mechanisms, namely repeat-induced point mutation (RIP), DNA methylation and small RNA-mediated gene silencing, were revealed in G. sinense. Systematic bioinformatic investigation of the genome and methylome suggested that RIP and DNA methylation combinatorially maintain G. sinense genome stability by inactivating invasive genetic material and transposable elements. The elucidation of the G. sinense genome and epigenome provides an unparalleled opportunity to advance our understanding of secondary metabolism and fungal defense mechanisms.

  3. Evidence of maternal provisioning of alkaloid-based chemical defenses in the strawberry poison frog Oophaga pumilio.

    Science.gov (United States)

    Stynoski, Jennifer L; Torres-Mendoza, Yaritbel; Sasa-Marin, Mahmood; Saporito, Ralph A

    2014-03-01

    Many organisms use chemical defenses to reduce predation risk. Aposematic dendrobatid frogs sequester alkaloid-based chemical defenses from a diet of arthropods, but research on these defenses has been limited to adults. Herein, we investigate chemical defense across development in a dendrobatid frog, Oophaga pumilio. This species displays complex parental care: at hatching, mothers transport tadpoles to phytotelmata, and then return to supply them with an obligate diet of nutritive eggs for about six weeks. We collected eggs, tadpoles, juveniles, and adults of O. pumilio, and detected alkaloids in all life stages. The quantity and number of alkaloids increased with frog and tadpole size. We did not detect alkaloids in the earliest stage of tadpoles, but alkaloids were detected as trace quantities in nutritive eggs and as small quantities in ovarian eggs. Tadpoles hand-reared with eggs of an alkaloid-free heterospecific frog did not contain alkaloids. Alkaloids that are sequestered from terrestrial arthropods were detected in both adults and phytotelm-dwelling tadpoles that feed solely on nutritive eggs, suggesting that this frog may be the first animal known to actively provision post-hatch offspring with chemical defenses. Finally, we provide experimental evidence that maternally derived alkaloids deter predation of tadpoles by a predatory arthropod.

  4. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting Service • Defense Health Agency • Defense Human Resource Activity • Defense

  5. 32 CFR 37.1030 - What information must I report to the Defense Technical Information Center?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What information must I report to the Defense Technical Information Center? 37.1030 Section 37.1030 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing...

  6. 77 FR 29443 - 60-Day Notice of Two Proposed Directorate of Defense Trade Controls Information Collections...

    Science.gov (United States)

    2012-05-17

    ... collection: The export, temporary import, temporary export and brokering of defense articles, defense... Export Control Act. Those of the public who manufacture or export defense articles, defense services, and... personal delivery. Dated: May 14, 2012. Robert S. Kovac, Managing Director of Defense Trade...

  7. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program

    Science.gov (United States)

    1994-02-01

    Defense Technology Transfer Working Group AGENCY...Director, Defense Research and Engineering. ACTION: solicitation in inputs for defense technology transfer . The Defense Technology Transfer Working...DAILY, 2.3 July 1993 Detense Nuclear Agency, 6801 Telegraph Road, Alexandria,, VA 22310D-3398 A - SOURCES SOUGHT FOR INPUTS FOR DEFENSE TECHNOLOGY TRANSFER

  8. Defense Acquisition Research Journal. Volume 23, Number 3, Issue 78, July 2016

    Science.gov (United States)

    2016-07-01

    for National Security and Resource Strategy Dr. J. Ronald Fox Harvard Business School Mr. David Gallop Defense Acquisition University Dr. Jacques...Predator: The Secret Origins of the Drone Revolution Written by Richard Whittle Reviewed by Julien Demotes-Mainard Mr. Patrick Fitzgerald Defense...Defense Acquisition Research Journal, formerly the Defense Acquisition Review Journal, is published quarterly by the Defense Acquisition University (DAU

  9. Defense of breast cancer malpractice claims.

    Science.gov (United States)

    Zylstra, S; D'Orsi, C J; Ricci, B A; Halloran, E E; Resseguie, L J; Greenwald, L; Mondor, M C

    2001-01-01

    The goal of this study was to determine whether factors associated with the successful defense and cost of malpractice cases involving the failure to diagnose breast cancer could be identified in medical and legal records. Secondary goals were to develop a multidisciplinary clinical algorithm utilizing National Comprehensive Cancer Network (NCCN) practice guidelines with practitioner risk management strategies. Physician deviations from these guidelines were tracked to identify high-risk areas in the diagnosis of breast cancer. A multidisciplinary clinical algorithm was introduced and practitioner risk management issues were addressed. In this study specific medical, legal, and cost factors were retrospectively abstracted and analyzed to identify associations between medical and legal factors and medicolegal outcome. ProMutual handled 156 malpractice cases involving breast cancer between January 22, 1986, and November 20, 1997. Of the total, 124 cases involving 212 defendants were closed. The closed cases were analyzed, using multivariable stepwise logistic and linear regression, to identify associations between clinical factors and case outcome. Women's health practitioners (WHPs), including obstetrician-gynecologists (OB-GYNs), family medicine, and internal medicine clinicians, were the largest group of defendants (97). Others included radiologists (43), surgeons (33), and pathologists (3). OB-GYNs accounted for 31% of these defendants, with a cost of more than $16 million. The greatest number of specialists represented in the open cases were radiologists, with 38% of the total. The defense model predicts that the probability of successful defense is lessened with inadequate record keeping, a patient that has metastasis and is alive, and a delay in diagnosis of 12 months or more. The overall indemnity model predicts a higher indemnity with the spread of disease at the time of evaluation, a patient who has metastasis and is alive, and a date of occurrence closer

  10. 48 CFR 225.403 - World Trade Organization Government Procurement Agreement and Free Trade Agreements.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false World Trade Organization Government Procurement Agreement and Free Trade Agreements. 225.403 Section 225.403 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Trade...

  11. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... recognition by Congress of the remedial nature of the Fair Labor Standards Act and of the need...

  12. Applications of spatially offset Raman spectroscopy to defense and security

    Science.gov (United States)

    Guicheteau, Jason; Hopkins, Rebecca

    2016-05-01

    Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.

  13. Common loon nest defense against an American mink

    Science.gov (United States)

    McCarthy, Kyle P.; Destefano, Stephen

    2011-01-01

    We describe a successful nest defense strategy of an adult Gavia immer (Common Loon) during an attempted predation event by a Nevison vison (American Mink) at Umbagog National Wildlife Refuge, NH. It is suspected that mink occasionally depredate loon nests, but defense strategies have not been described previously.

  14. Influence of Organisational Defensive Patterns on Learning ICT

    Science.gov (United States)

    Yau, Hon Keung; Cheng, Alison Lai Fong

    2011-01-01

    Purpose: The purpose of this paper is to investigate whether the IT professionals in a Hong Kong public transport company have a general perception of influence of the organisational defensive patterns on learning of ICT; and whether skilled incompetence, organisational defensive routines and fancy footwork are positively associated with each…

  15. 76 FR 2246 - Defense Support of Civil Authorities (DSCA)

    Science.gov (United States)

    2011-01-13

    ... made the existing guidance outdated and inconsistent with current law and the current organizational structure of the Department of Defense. This final rule will facilitate civil authorities' access to the... Activities, and all other organizational entities within the Department of Defense (hereafter referred to...

  16. Molecular mechanisms of epithelial host defense in the airways

    NARCIS (Netherlands)

    Vos, Joost Bastiaan

    2007-01-01

    Airway epithelial cells are indispensable for the host defense system in the lungs. Various strategies by which epithelial cells protect the lungs against inhaled pathogens have been described. In spite of that, the molecular mechanisms by which epithelial cells initiate and control the host defense

  17. Defense Acquisition Research Journal. Volume 21, Number 1, Issue 68

    Science.gov (United States)

    2014-01-01

    exclusivity and the egos of A Publication of the Defense Acquisition University http://www.dau.mil 477 Defense ARJ, January 2014, Vol. 21 No. 1: 466–484...the decreasing strength of their fleet relative to Japan’s. As Professor John Kuehn emphasizes, this multidimensional threat drasti- cally altered

  18. 75 FR 9399 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-02

    ...: Notice of meeting. SUMMARY: Pursuant to the Federal Advisory Committee Act of 1972 (5 U.S.C., Appendix as... Prevention of Suicide by Members of the Armed Forces, a subcommittee of the Defense Health Board (DHB), will..., Department of Defense Task Force on the Prevention of Suicide by Members of the Armed Forces, One Skyline...

  19. Climate Change Impacts at Department of Defense Installations

    Science.gov (United States)

    2017-06-16

    ANL/EVS-17/9 Climate Change Impacts at Department of Defense Installations Environmental Science Division About...LLC. June 16, 2017 ANL/EVS-17/9 Climate Change Impacts at Department of Defense Installations prepared by Rao Kotamarthi...7 3.2 Use of Weather Data and Views on Climate Change among the DoD Site Contacts

  20. 78 FR 21826 - Defense Support of Civilian Law Enforcement Agencies

    Science.gov (United States)

    2013-04-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 182 Defense Support of Civilian Law Enforcement Agencies AGENCY... piracy operations conducted pursuant to title 10, U.S.C. Sec. 182.3 Definitions. The...

  1. Defense Spending and the Economy - An Econometric View

    Science.gov (United States)

    1994-01-01

    spend the peace dividend. Most people expect that dividend to be generated by improvements in the economy fueled by reductions in defense expenditure...There have been a myriad of articles written regarding the effects defense spending has on the economy . Many of the authors of these articles disagree

  2. The Personality Assessment Inventory (PAI) and the Detection of Defensiveness.

    Science.gov (United States)

    Cashel, Mary Louise; And Others

    1995-01-01

    The use of scales on the Personality Assessment Inventory (PAI) to detect defensiveness in criminal and nonclinical samples was evaluated with 45 male inmates and 38 male undergraduates under standard conditions or under instructions to feign a positive role. Results indicate that the PAI is susceptible to defensive dissimulation. (SLD)

  3. Defensive Operations in a Decisive Action Training Environment

    Science.gov (United States)

    2017-07-01

    Operations in a Decisive Action Training Environment Christopher L. Vowels W. Anthony Scroggins U.S. Army Research Institute Captain Kyle T...7260 Alabama Avenue Fort Polk, LA 71459 ii Research Report 2003 Defensive Operations in a Decisive Action Training Environment...the entirety of the project and his guidance ensured the research was successful. iv DEFENSIVE OPERATIONS IN A DECISIVE ACTION TRAINING

  4. Defense Infrastructure: Actions Needed to Strengthen Utility Resilience Planning

    Science.gov (United States)

    2016-11-01

    DEFENSE INFRASTRUCTURE Actions Needed to Strengthen Utility Resilience Planning Report to the Committee on Armed...to Strengthen Utility Resilience Planning What GAO Found Based on GAO’s survey of Department of Defense (DOD) owned utility systems, there were...Evaluation 40 Appendix I Scope and Methodology 42 Appendix II Survey on DOD-Owned Utility Resilience 48 Appendix III Comments from the

  5. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli

    2012-01-01

    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources o...

  6. Willingness to pay for defense against weapons of mass destruction.

    Science.gov (United States)

    Mulvaney, J M; LaBarre, D; Pastel, R; Landauer, M

    2001-12-01

    A survey assessed the willingness to pay for defense against weapons of mass destruction. The results were evaluated according to the benefit to society. The results indicated preferences for increased spending on intelligence gathering, training, and equipment. We concluded that the United States is spending less for weapons of mass destruction defense than the sample population was willing to pay.

  7. Department of Defense Homeland Security Joint Operating Concept

    Science.gov (United States)

    2004-02-01

    electronic warfare, physical attack and/or destruction, and special information operations, and could include computer network attack.”19 In 2015...electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while...security, counter-deception, counter- psychological operations, counter-intelligence, electronic warfare, and special information operations. Defensive

  8. Department of Defense Management of Unobligated Funds for Acquisition Programs

    Science.gov (United States)

    2015-04-30

    CGFM, MBA, Senior Staff Accountant, Office of the Under Secretary of Defense (Comptroller), Financial Improvement and Audit Readiness (FIAR), 703...This research analyzes financial obligation rates for acquisition programs and acquisition program contract awards made in the last quarter of the...Postgraduate School since September 2010. Prior to that, he taught acquisition and business, cost estimating, and financial management courses at the Defense

  9. Defense Reform: An Out of the Box Approach.

    Science.gov (United States)

    2007-11-02

    O’Hanlon, Michael, Defense Planning for the Late 1990s, Beyond the Desert Storm Framework, Brookings, 1995, page 34 Ibid., page 31 Muradian, Vago ...Closure Rounds", GAO/NSIAD-97-151. May 1997 Muradian, Vago , "Bumpers Questions Navy of F/A-18E/F, Overall Shipbuilding Plan", Defense Daily. 12

  10. Silicon-inducible defenses of Zinnia elegans against Myzus persicae

    Science.gov (United States)

    Several examples exist of silicon (Si) amendment inducing plant chemical defenses against plant pathogens, but few studies have focused on Si-induced defenses against phloem-feeding herbivores. The current study examined Si treatment of Zinnia elegans Jacq. cv. Oklahoma White (Compositae) on the pe...

  11. Globalization and Its Implications for the Defense Industrial Base

    Science.gov (United States)

    2007-02-01

    pursued three strategies: buying relatively small defense units from diversified U.S. conglomerates (like General Motors and TRW); acquiring defense...13.9 percent).121 European companies have been very successful in China: Volkswagen makes the country’s most popular brand of cars, and Siemens is the

  12. 41 CFR 60-300.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-300.22 Section 60-300.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-300.22 Direct threat defense. The contractor may use as...

  13. 41 CFR 60-250.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Direct threat defense. 60-250.22 Section 60-250.22 Public Contracts and Property Management Other Provisions Relating to Public... VETERANS Discrimination Prohibited § 60-250.22 Direct threat defense. The contractor may use as...

  14. A Forensic Psychology Exercise: Role Playing and the Insanity Defense.

    Science.gov (United States)

    Fass, Michael E.

    1999-01-01

    Presents a role playing exercise that provides students with an introduction to forensic psychology and the insanity defense. Reports that 87% of the students found this exercise to be an enjoyable teaching technique and useful in providing an understanding of the insanity defense. Concludes that the exercise increases student interest and…

  15. Department of Defense Dictionary of Military and Associated Terms

    Science.gov (United States)

    2016-02-15

    distribution and deployment. f. level VI - personnel: detail expressed by name, Service , military occupational specialty and unique identification...of one or more weapons with all related equipment, materials, services , personnel, and means of delivery and deployment (if applicable) required for...2016 A-46 JP 1-02 DCRF defense chemical, biological, radiological, and nuclear response force DCS Defense Courier Service ; deputy chief

  16. 77 FR 46425 - Federal Advisory Committee; Defense Health Board Meeting

    Science.gov (United States)

    2012-08-03

    ... of the Secretary Federal Advisory Committee; Defense Health Board Meeting AGENCY: Department of Defense (DoD). ACTION: Notice of meeting. SUMMARY: Pursuant to the Federal Advisory Committee Act of 1972... amended), and 41 CFR 102-3.150, and in accordance with section 10(a)(2) of Public Law, a meeting of...

  17. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  18. Issues in defense training systems immersive displays

    Science.gov (United States)

    Gaylord, Philip

    2006-05-01

    Display technology for DOD immersive projector-based flight training systems are at a crossroads as CRT technology slowly disappears from the market place. From the DOD perspective, emerging technologies arrive poorly matched to satisfy training needs. The DOD represents a minority voice in the marketplace. Current issues include: Satisfying requirements for black level, brightness and contrast ratio, Establishing standard metrics for resolution, system performance and reliability, Obtaining maintainability and self-calibration in multi-channel arrays, Reducing screen cross-reflection in wrap-around immersive display arrays. Laser, DLP, and LCOS projector systems are compared for their current acceptance and problems in defense flight training systems. General requirements of visual display systems are discussed and contrasted for flight trainers for low flyers (helicopters) high flyers (tactical aircraft) in real-time immersive, networked systems. FLIR and NVG simulation techniques are described.

  19. Animal defense strategies and anxiety disorders

    Directory of Open Access Journals (Sweden)

    Rosana Shuhama

    2007-03-01

    Full Text Available Anxiety disorders are classified according to symptoms, time course and therapeutic response. Concurrently, the experimental analysis of defensive behavior has identified three strategies of defense that are shared by different animal species, triggered by situations of potential, distal and proximal predatory threat, respectively. The first one consists of cautious exploration of the environment for risk assessment. The associated emotion is supposed to be anxiety and its pathology, Generalized Anxiety Disorder. The second is manifested by oriented escape or by behavioral inhibition, being related to normal fear and to Specific Phobias, as disorders. The third consists of disorganized flight or complete immobility, associated to dread and Panic Disorder. Among conspecific interactions lies a forth defense strategy, submission, that has been related to normal social anxiety (shyness and to Social Anxiety Disorder. In turn, Posttraumatic Stress Disorder and Obsessive-Compulsive Disorder do not seem to be directly related to innate defense reactions. Such evolutionary approach offers a reliable theoretical framework for the study of the biological determinants of anxiety disorders, and a sound basis for psychiatric classification.Os transtornos de ansiedade são classificados conforme a sintomatologia, decurso temporal e resposta terapêutica. Paralelamente, a análise experimental dos comportamentos de defesa identificou três estratégias comuns a diferentes espécies de animais, desencadeadas por situações de perigo predatório potencial, distal ou proximal, respectivamente. A primeira consiste na investigação cautelosa do ambiente, avaliando o risco. Supõe-se que a emoção que a acompanha seja a ansiedade e sua patologia, o Transtorno de Ansiedade Generalizada. A segunda é expressa pela fuga orientada ou pela inibição comportamental, sendo a emoção correlata o medo, e a patologia representada pelas Fobias Específicas. Finalmente, a

  20. 3D laptop for defense applications

    Science.gov (United States)

    Edmondson, Richard; Chenault, David

    2012-06-01

    Polaris Sensor Technologies has developed numerous 3D display systems using a US Army patented approach. These displays have been developed as prototypes for handheld controllers for robotic systems and closed hatch driving, and as part of a TALON robot upgrade for 3D vision, providing depth perception for the operator for improved manipulation and hazard avoidance. In this paper we discuss the prototype rugged 3D laptop computer and its applications to defense missions. The prototype 3D laptop combines full temporal and spatial resolution display with the rugged Amrel laptop computer. The display is viewed through protective passive polarized eyewear, and allows combined 2D and 3D content. Uses include robot tele-operation with live 3D video or synthetically rendered scenery, mission planning and rehearsal, enhanced 3D data interpretation, and simulation.

  1. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  2. Free radicals, antioxidant defense systems, and schizophrenia.

    Science.gov (United States)

    Wu, Jing Qin; Kosten, Thomas R; Zhang, Xiang Yang

    2013-10-01

    The etiopathogenic mechanisms of schizophrenia are to date unknown, although several hypotheses have been suggested. Accumulating evidence suggests that excessive free radical production or oxidative stress may be involved in the pathophysiology of schizophrenia as evidenced by increased production of reactive oxygen or decreased antioxidant protection in schizophrenic patients. This review aims to summarize the basic molecular mechanisms of free radical metabolism, the impaired antioxidant defense system and membrane pathology in schizophrenia, their interrelationships with the characteristic clinical symptoms and the implications for antipsychotic treatments. In schizophrenia, there is accumulating evidence of altered antioxidant enzyme activities and increased levels of lipid peroxidation, as well as altered levels of plasma antioxidants. Moreover, free radical-mediated abnormalities may contribute to specific aspects of schizophrenic symptomatology and complications of its treatment with antipsychotic drugs, as well as the development of tardive dyskinesia (TD). Finally, the potential therapeutic strategies implicated by the accumulating data on oxidative stress mechanisms for the treatment of schizophrenia are discussed.

  3. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  4. Defensive Diterpene from the Aeolidoidean Phyllodesmium longicirrum.

    Science.gov (United States)

    Bogdanov, Alexander; Hertzer, Cora; Kehraus, Stefan; Nietzer, Samuel; Rohde, Sven; Schupp, Peter J; Wägele, Heike; König, Gabriele M

    2016-03-25

    Phyllodesmium is a tropical marine slug genus with about 30 described species. None of them have a protective shell, and all of them feed on octocorals that are generally known to provide defensive compounds and thus help to defend the naked slugs against sympatric predators, such as fish, crabs, cephalopods, and echinoderms. Phyllodesmium longicirrum is the species that grows the biggest and that is least protected by camouflage on its respective food, usually a soft coral of the genus Sarcophyton. Investigation of the lipophilic extract of a single specimen of P. longicirrum from the Great Barrier Reef (Australia) led to the isolation of four new polycyclic diterpenes. Compound 1 showed significant deterrent activity in a fish feeding assay.

  5. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  6. Cirrhosis-induced defects in innate pulmonary defenses against Streptococcus pneumoniae

    Directory of Open Access Journals (Sweden)

    Vander Top Elizabeth A

    2007-10-01

    Full Text Available Abstract Background The risk of mortality from pneumonia caused by Streptococcus pneumoniae is increased in patients with cirrhosis. However, the specific pneumococcal virulence factors and host immune defects responsible for this finding have not been clearly established. This study used a cirrhotic rat model of pneumococcal pneumonia to identify defect(s in innate pulmonary defenses in the cirrhotic host and to determine the impact of the pneumococcal toxin pneumolysin on these defenses in the setting of severe cirrhosis. Results No cirrhosis-associated defects in mucociliary clearance of pneumococci were found in these studies, but early intrapulmonary killing of the organisms before the arrival of neutrophils was significantly impaired. This defect was exacerbated by pneumolysin production in cirrhotic but not in control rats. Neutrophil-mediated killing of a particularly virulent type 3 pneumococcal strain also was significantly diminished within the lungs of cirrhotic rats with ascites. Levels of lysozyme and complement component C3 were both significantly reduced in bronchoalveolar lavage fluid from cirrhotic rats. Finally, complement deposition was reduced on the surface of pneumococci recovered from the lungs of cirrhotic rats in comparison to organisms recovered from the lungs of control animals. Conclusion Increased mortality from pneumococcal pneumonia in this cirrhotic host is related to defects in both early pre-neutrophil- and later neutrophil-mediated pulmonary killing of the organisms. The fact that pneumolysin production impaired pre-neutrophil-mediated pneumococcal killing in cirrhotic but not control rats suggests that pneumolysin may be particularly detrimental to this defense mechanism in the severely cirrhotic host. The decrease in neutrophil-mediated killing of pneumococci within the lungs of the cirrhotic host is related to insufficient deposition of host proteins such as complement C3 on their surfaces. Pneumolysin

  7. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  8. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  9. Lectin domains at the frontiers of plant defense

    Directory of Open Access Journals (Sweden)

    Nausicaä eLANNOO

    2014-08-01

    Full Text Available Plants are under constant attack from pathogens and herbivorous insects. To protect and defend themselves, plants evolved a multi-layered surveillance system, known as the innate immune system. Plants sense their encounters upon perception of conserved microbial structures and damage-associated patterns using cell-surface and intracellular immune receptors. Plant lectins and proteins with one or more lectin domains represent a major part of these receptors. The whole group of plant lectins comprises an elaborate collection of proteins capable of recognizing and interacting with specific carbohydrate structures, either originating from the invading organisms or from damaged plant cell wall structures. Due to the vast diversity in protein structures, carbohydrate recognition domains and glycan binding specificities, plant lectins constitute a very diverse protein superfamily. In the last decade, new types of nucleocytoplasmic plant lectins have been identified and characterized, in particular lectins expressed inside the nucleus and the cytoplasm of plant cells often as part of a specific plant response upon exposure to different stress factors or changing environmental conditions. In this review, we provide an overview on plant lectin motifs used in the constant battle against pathogens and predators during plant defenses.

  10. Isolation and characterization of a new defense gene from soybean

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A cDNA clone of a single-copy gene designated SbPRP was isolated and characterized from 2-week-old soybean seedlings. It putatively encodes a bimodular protein similar to developmentally regulated proteins in other plant species. The deduced amino acid sequence consists of 126 amino acids with a distinct proline-rich domain (17 amino acids) and a long hydrophobically cysteine-rich domain (84 amino acids), plus a signal peptide of 25 amino acids in N terminal. SbPRP mRNA transcripts accumulated in an organ specific manner. It can be detected in leaves and epicotyls of soybean seedlings, whereas virtually expression signal of SbPRP was not detected in cotyledons, hypocotyls and roots. Further Northern hybridization suggested that SbPRP steady-state mRNA level accumulated differentially not only in response to salicylic acid, but to the inoculation of soybean mosaic virus Sa strain. Also it was responsive to drought treatment and salt (NaCl) stress. Therefore it is likely that SbPRP functions as a defense gene in soybean.

  11. Reactive oxygen species and antioxidant defense in human gastrointestinal diseases

    Directory of Open Access Journals (Sweden)

    Peter Patlevič

    2016-12-01

    Full Text Available Crohn's disease and ulcerative colitis, known together as inflammatory bowel diseases (IBDs, and celiac disease are the most common disorders affecting not only adults but also children. Both IBDs and celiac disease are associated with oxidative stress, which may play a significant role in their etiologies. Reactive oxygen species (ROS such as superoxide radicals (O2·−, hydroxyl radicals (·−OH, hydrogen peroxide (H2O2, and singlet oxygen (1O2 are responsible for cell death via oxidation of DNA, proteins, lipids, and almost any other cellular constituent. To protect biological systems from free radical toxicity, several cellular antioxidant defense mechanisms exist to regulate the production of ROS, including enzymatic and nonenzymatic pathways. Superoxide dismutase catalyzes the dismutation of O2·− to H2O2 and oxygen. The glutathione redox cycle involves two enzymes: glutathione peroxidase, which uses glutathione to reduce organic peroxides and H2O2; and glutathione reductase, which reduces the oxidized form of glutathione with concomitant oxidation of nicotinamide adenine dinucleotide phosphate. In addition to this cycle, GSH can react directly with free radicals. Studies into the effects of free radicals and antioxidant status in patients with IBDs and celiac disease are scarce, especially in pediatric patients. It is therefore very necessary to conduct additional research studies to confirm previous data about ROS status and antioxidant activities in patients with IBDs and celiac disease, especially in children.

  12. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  13. Transport of defense compounds from source to sink

    DEFF Research Database (Denmark)

    Jørgensen, Morten Egevang; Nour-Eldin, Hussam Hassan; Halkier, Barbara Ann

    2015-01-01

    Plants synthesize a plethora of defense compounds crucial for their survival in a challenging and changing environment. Transport processes are important for shaping the distribution pattern of defense compounds, albeit focus hitherto has been mostly on their biosynthetic pathways. A recent...... identification of two glucosinolate transporters represents a breakthrough in our understanding of glucosinolate transport in Arabidopsis and has advanced knowledge in transport of defense compounds. In this review, we discuss the role of the glucosinolate transporters in establishing dynamic glucosinolate...... distribution patterns and source-sink relations. We focus on lessons learned from glucosinolate transport that may apply to transport of other defense compounds and discuss future avenues in the emerging field of defense compound transport....

  14. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...... to the local environment. Furthermore, the pattern of TF/promoter interactions could partially explain mutant phenotypes. This work shows that defense chemistry within Arabidopsis has a highly intricate transcriptional regulatory system that may allow for the optimization of defense metabolite accumulation...

  15. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  16. Organ Donation

    Science.gov (United States)

    Organ donation takes healthy organs and tissues from one person for transplantation into another. Experts say that the organs ... and bone marrow Cornea Most organ and tissue donations occur after the donor has died. But some ...

  17. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  18. Department of Defense Chemical and Biological Defense Programs. Annual Report to Congress 2007

    Science.gov (United States)

    2007-04-01

    challenges. (see Figure 1.) The program depends on support in three priority areas: (1) Stable funding for the Transformational Medical Technolgies ...defense, speed of mass (life and mobility ) and information, fiscal barriers, values, and attitudes. The principles of jointness and developing an...Battlefield anti-intrusion Detection System (BaiS) an/PrS9 (Fue 2QFY06) 13. mobile Detection assessment response System (mDarS) (1QFY07) 14. Joint

  19. From emotional abuse in childhood to psychopathology in adulthood: a path mediated by immature defense mechanisms and self-esteem.

    Science.gov (United States)

    Finzi-Dottan, Ricky; Karu, Toby

    2006-08-01

    The present study examined the course traveled from childhood emotional abuse to adulthood psychopathology. One hundred ninety-six undergraduate students age 20 to 45 (M = 27; SD = 8.17), answered self-report questionnaires assessing emotional abuse in childhood (Childhood Trauma Questionnaire), parental attitudes (Parental Bonding Instrument), psychopathological symptomatology (Brief Symptom Inventory), self-esteem (Rosenberg Self-Esteem Scale), and defense mechanism organization (Defense Style Questionnaire). Results indicated that reported psychopathological symptomatology highly exceeded the Israeli norm. Structure Equation Modeling provided a statistically significant explanation (52%) of the target variable of psychopathological symptomatology. According to the path model, emotional abuse in childhood and perceptions of controlling and noncaring parents had an indirect effect on the psychopathology. This was mediated by immature defenses and low self-esteem. We conclude that the manifest psychopathology among adults who suffered emotional abuse in childhood is produced by the detrimental effect of abuse on personality, and takes the form of immature defense organization and damaged self-representation.

  20. Plants versus fungi and oomycetes: pathogenesis, defense and counter-defense in the proteomics era.

    Science.gov (United States)

    El Hadrami, Abdelbasset; El-Bebany, Ahmed F; Yao, Zhen; Adam, Lorne R; El Hadrami, Ismailx; Daayf, Fouad

    2012-01-01

    Plant-fungi and plant-oomycete interactions have been studied at the proteomic level for many decades. However, it is only in the last few years, with the development of new approaches, combined with bioinformatics data mining tools, gel staining, and analytical instruments, such as 2D-PAGE/nanoflow-LC-MS/MS, that proteomic approaches thrived. They allow screening and analysis, at the sub-cellular level, of peptides and proteins resulting from plants, pathogens, and their interactions. They also highlight post-translational modifications to proteins, e.g., glycosylation, phosphorylation or cleavage. However, many challenges are encountered during in planta studies aimed at stressing details of host defenses and fungal and oomycete pathogenicity determinants during interactions. Dissecting the mechanisms of such host-pathogen systems, including pathogen counter-defenses, will ensure a step ahead towards understanding current outcomes of interactions from a co-evolutionary point of view, and eventually move a step forward in building more durable strategies for management of diseases caused by fungi and oomycetes. Unraveling intricacies of more complex proteomic interactions that involve additional microbes, i.e., PGPRs and symbiotic fungi, which strengthen plant defenses will generate valuable information on how pathosystems actually function in nature, and thereby provide clues to solving disease problems that engender major losses in crops every year.