WorldWideScience

Sample records for defense organization bmdo

  1. Time maintenance system for the BMDO MSX spacecraft

    Science.gov (United States)

    Hermes, Martin J.

    1994-01-01

    The Johns Hopkins University Applied Physics Laboratory (APL) is responsible for designing and implementing a clock maintenance system for the Ballistic Missile Defense Organizations (BMDO) Midcourse Space Experiment (MSX) spacecraft. The MSX spacecraft has an on-board clock that will be used to control execution of time-dependent commands and to time tag all science and housekeeping data received from the spacecraft. MSX mission objectives have dictated that this spacecraft time, UTC(MSX), maintain a required accuracy with respect to UTC(USNO) of +/- 10 ms with a +/- 1 ms desired accuracy. APL's atomic time standards and the downlinked spacecraft time were used to develop a time maintenance system that will estimate the current MSX clock time offset during an APL pass and make estimates of the clock's drift and aging using the offset estimates from many passes. Using this information, the clock's accuracy will be maintained by uplinking periodic clock correction commands. The resulting time maintenance system is a combination of offset measurement, command/telemetry, and mission planning hardware and computing assets. All assets provide necessary inputs for deciding when corrections to the MSX spacecraft clock must be made to maintain its required accuracy without inhibiting other mission objectives. The MSX time maintenance system is described as a whole and the clock offset measurement subsystem, a unique combination of precision time maintenance and measurement hardware controlled by a Macintosh computer, is detailed. Simulations show that the system estimates the MSX clock offset to less than+/- 33 microseconds.

  2. Implementation Guidelines for BMDO Open Systems Approach

    National Research Council Canada - National Science Library

    1998-01-01

    This Directive: (1) Implements the policy set forth in references (a), (b) and (c); (2) Assigns responsibilities and prescribes mandatory procedures to open systems implementation with EMDO and Service Ballistic Missile Defense...

  3. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  4. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  5. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  6. Multicellular oxidant defense in unicellular organisms.

    OpenAIRE

    Ma, M; Eaton, J W

    1992-01-01

    Although catalase is thought to be a major defense against hydrogen peroxide (H2O2), the catalase activity within individual Escherichia coli fails to protect against exogenous H2O2. Contrary to earlier reports, we find that dilute suspensions of wild-type and catalase-deficient E. coli are identical in their sensitivity to H2O2, perhaps because even wild-type, catalase-positive E. coli cannot maintain an internal/external concentration gradient of this highly diffusible oxidant. However, con...

  7. In Defense of Societal Issues as Organizers for School Science.

    Science.gov (United States)

    Yager, Robert E.

    1983-01-01

    Offers a defense of societal issues as organizers for school science programs in response to criticisms of this thesis discussed in SE 534 649. Indicates that there appears to be no evidence that using nontraditional topics as organizers will make science more subject to manipulation and perversion. (JN)

  8. Knowledge Loss: A Defensive Model In Nuclear Research Organization Memory

    International Nuclear Information System (INIS)

    Mohamad Safuan Bin Sulaiman; Muhd Noor Muhd Yunus

    2013-01-01

    Knowledge is an essential part of research based organization. It should be properly managed to ensure that any pitfalls of knowledge retention due to knowledge loss of both tacit and explicit is mitigated. Audit of the knowledge entities exist in the organization is important to identify the size of critical knowledge. It is very much related to how much know-what, know-how and know-why experts exist in the organization. This study conceptually proposed a defensive model for Nuclear Malaysia's organization memory and application of Knowledge Loss Risk Assessment (KLRA) as an important tool for critical knowledge identification. (author)

  9. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  10. Strategic Defense Initiative Organization adaptive structures program overview

    Science.gov (United States)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  11. Small Business Administration Section 8 (A) Support Services Contracts at the Ballistic Missile Defense Organization

    National Research Council Canada - National Science Library

    1994-01-01

    ...%flc objectives were to determine whether the contract administration process and applicable internal controls were effective and whether costs charged to the contracts were allowable, reasonable, and allocable. In addition, we reviewed anonymous allegations sent to Senator David Pryor of fraud, waste, and abuse on CTI contracts with BMDO. We also reviewed internal controls applicable to the audit objectives.

  12. Major Deficiencies in the Compilation and Consolidation of the Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    Steensma, David

    1998-01-01

    We are providing this report for your information and use. It identifies and summarizes the major deficiencies that contribute to the Other Defense Organizations financial statements being unreliable...

  13. A Study of Corporate Entrepreneurship in a Department of Defense Organization

    Science.gov (United States)

    2011-03-01

    A STUDY OF CORPORATE ENTREPRENUERSHIP IN A DEPARTMENT OF DEFENSE ORGANIZATION THESIS Wade W. Brower, Civilian AFIT/GEM/ENV...CORPORATE ENTREPRENUERSHIP IN A DEPARTMENT OF DEFENSE ORGANIZATION THESIS Presented to the Faculty Department of Systems and Engineering...2011 APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED AFIT/GEM/ENV/11-M01 A STUDY OF CORPORATE ENTREPRENUERSHIP IN A DEPARTMENT OF

  14. Compilation of the FY 1998 Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    1999-01-01

    ...." The entity represents a consolidation of financial information from various Defense organizations and funds, including the Military Departments, which use the Treasury Index 97 symbol, also referred to as Department 97. The FY 1998 financial statements for Other Defense Organizations reported $45.2 billion in assets, $227.5 billion in liabilities, and $54.6 billion in budget authority.

  15. Comprehensiveness of the FY 1996 Other Defense Organizations Financial Statements

    National Research Council Canada - National Science Library

    1997-01-01

    The primary audit objective was to determine whether the Defense Finance and Accounting Service Indianapolis Center consistently and accurately compiled financial data received from field accounting...

  16. Defense Support of Civil Authorities - Are We Organized Right?

    National Research Council Canada - National Science Library

    Austin, Joseph

    2007-01-01

    The Department of Defense (DoD) has a long history of supporting civil authorities in the wake of catastrophic events with specialized skills and assets that can rapidly stabilize and improve the situation...

  17. Compilation of the FY 1997 Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    1998-01-01

    ... statements to the Office of Management and Budget. The DoD Consolidating Financial Statements for FY 1997 included financial statements for a reporting entity called "Other Defense Organizations" that represents a consolidation of financial...

  18. Consolidation Process for FY 1997 Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    1998-01-01

    ... to prepare consolidated financial statements for FY 1996 and each succeeding year. The DoD Consolidated Financial Statements for FY 1997 include financial statements for a reporting entity entitled "Other Defense Organizations...

  19. Compilation of the FY 1996 Financial Statements for Other Defense Organizations

    National Research Council Canada - National Science Library

    1998-01-01

    ... statements to the Office of Management and Budget. The DoD consolidated financial statements for FY 1996 included financial statements for a new reporting entity entitled "Other Defense Organizations...

  20. Abnormal General Ledger Account Balances for Other Defense Organizations Reported by DFAS Cleveland

    National Research Council Canada - National Science Library

    2001-01-01

    ... and other Government agencies to prepare annual audited financial statements. This report is the second in a series of reports supporting our audit of the FY 2000 financial statements for "Other Defense Organizations-General Funds...

  1. External Quality Control Review of the Defense Information Systems Agency Audit Organization

    Science.gov (United States)

    2012-08-07

    We are providing this report for your information and use. We have reviewed the system of quality control for the audit organization of the Defense...audit organization encompasses the audit organization’s leadership, emphasis on performing high quality work, and policies and procedures established

  2. Financial Reporting for the Other Defense Organizations - General Funds at the Defence Finance and Accounting Service San Antonio

    National Research Council Canada - National Science Library

    2002-01-01

    ...) for inclusion in the FY 2001 Other Defense Organizations Financial Statements. Specifically, we looked at the abnormal balances reported in trial balances prepared by the Defense Finance and Accounting Service San Antonio...

  3. Internal Controls and Compliance With Laws and Regulations for the FY 1996 Financial Statements of the "Other Defense Organizations" Receiving Department 97 Appropriations

    National Research Council Canada - National Science Library

    1997-01-01

    .... Our audit of the "Other Defense Organizations" principal financial statements was delayed until January 9, 1997, because of difficulties that the Defense Finance and Accounting Services Indianapolis...

  4. In Defense of Advance Organizers: A Reply to the Critics

    Science.gov (United States)

    Ausubel, David P.

    1978-01-01

    The most common criticism of advance organizers is that their definition and instructions for construction are vague. Ausubel's books and research articles offer a precise operational definition. Construction can only be described generally because it varies according to nature of learning material, age of learner, and learner's degree of…

  5. The structure and dynamic of the defensive organization the personality in Paranoid Schizophrenia, Schizoaffective and Affective Disorders

    Directory of Open Access Journals (Sweden)

    I M Kadyrov

    2011-03-01

    Full Text Available The article suggests a research model and discusses results of an empirical study of the defensive organization mechanisms of patients diagnosed with paranoid schizophrenia, schizoaffective and affective disorders. The research deals with structural and dynamic aspects of the defensive organization profiles in the mentioned three clinical groups.

  6. Marine Biological Survey, Peacock Point Outfall, Wake Atoll June 1998 (NODC Accession 0000247)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Army Space and Missile Defense Command (SMDC), in support of the Ballistic Missile Defense Organization (BMDO) sponsored a marine biological survey at Wake...

  7. Baseline marine biological survey at the Peacock Point outfall and other point-source discharges on Wake Atoll, Pacific Ocean in 1998-06 (NODC Accession 0000247)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The U.S. Army Space and Missile Defense Command (SMDC) in support of the Ballistic Missile Defense Organization (BMDO) sponsored a marine biological survey at Wake...

  8. Internal Controls and Compliance with Laws and Regulations for the FY 1997 Financial Statements of Other Defense Organizations

    National Research Council Canada - National Science Library

    1998-01-01

    ... consolidated financial statements for FY 1996 and each succeeding year. The DoD Consolidated Financial Statements for FY 1997 include financial statements for a reporting entity entitled "Other Defense Organizations...

  9. An analysis of disruptions in aerospace/defense organizations that affect the supply chain

    Science.gov (United States)

    Dickerson, Toscha L.

    The purpose of this quantitative study was to determine whether or not functions of procurement organizations structures' and aerospace suppliers were perceived as disruptions and to identify their effects on lead time and costs within a supply chain. An analysis of employees' perception of centralized and decentralized procurement functions, aerospace and defense suppliers, lead times of goods and services, price increases, and schedule delays was conducted. Prior studies are limited in regards to understanding how specific procurement functions affects an organization procurement structure. This non-experimental quantitative study allowed for a survey to be administered to aerospace and defense companies throughout the United States to obtain information from sourcing and procurement professionals with 5 or more years of experience. The current study utilized a 10 question survey based on the 5- point Likert -type scale to determine the findings. Through descriptive and inferential statistics, using regression analysis, standard deviation, and P-value; findings indicated that the majority of the participants surveyed perceived both centralized and decentralized procurement functions affected lead time and cost of goods and services resulted in a positive effect and were considered as supply chain disruptions.

  10. Structural organization of psychological defenses and coping strategies of preschool teachers with different levels of professional burnout

    Directory of Open Access Journals (Sweden)

    Тетяна Анатоліївна Колтунович

    2015-10-01

    Full Text Available The article deals with the actual problem of modern education system – preschool teachers’ professional burnout. Assumptions about the existence of the relationship between professional burnout, coping strategies and mechanisms of psychological defenses; about the determination of burnout at different stages of its formation according to the structural organization of coping and psychological defenses were empirically proven, and their leading and basic components were defined

  11. Understanding Complexity and Self-Organization in a Defense Program Management Organization (Experimental Design)

    Science.gov (United States)

    2016-03-18

    initiatives such as the Packard Commission study, Goldwater-Nichols Legislation, and more recently, the Better Buying Power initiative. While the DoD...potential communications pathways in an organizational structure) Self-Organizing Network Behavior The nodes in the network are specific individuals... behavior pattern impacts of changing predetermined independent variables  Phase 4: Refined hypothesis testing to examine how decision and

  12. An Assessment of Collaborative Capacity of Three Organizations within Defense Acquisition

    National Research Council Canada - National Science Library

    Kirschman, Jeremiah N; LaPorte, Michele M

    2008-01-01

    The leadership within the defense acquisition arena recognizes that interorganizational collaboration is pivotal to equipping the Warfighter, on schedule and on budget, with capabilities for combating...

  13. Improvements Could Be Made in Reconciling Other Defense Organizations Civilian Pay to the General Ledger

    Science.gov (United States)

    2016-03-25

    could not record a journal entry to this account. DFAS Indianapolis provided us with a System Change Proposal dated April 17, 2014, which proposed a...system change to DAI to permit journal entries to USSGL 2213 that was implemented in October 2015. However, DFAS Indianapolis should not have allowed...properly accrued civilian pay for the 12 ODOs that used the Defense Agencies Initiative or the Defense Business Management System general ledgers

  14. Differential stimulation of antioxidant defense in various organs of mice after whole body exposure to low-dose gamma radiation

    International Nuclear Information System (INIS)

    Pathak, C.M.; Avti, P.K.; Khanduja, K.L.; Sharma, S.C.

    2007-01-01

    It has been generally considered that any dose of ionizing radiation is detrimental to the living organisms, however low the radiation dose may be. The much relied upon 'Linear-No-Threshold' (LNT) hypothesis dose not have any convincing experimental evidence regarding the damaging effects at very low-doses and low-dose rates. Generally, the deleterious biological effects have been inferred theoretically by extrapolating the known effects of high radiation dose to low-dose range. Recently, it has been reported that the living organisms do not respond to ionizing radiations in a linear manner in the low-dose range 0.01-0.50 Gy and rather restore the homeostasis both in-vivo and in-vitro by normal physiological mechanisms such as, cellular and DNA repair processes, immune reactions, antioxidant defense, adaptive responses, activation of immune functions; stimulation of growth etc. In this study, we have attempted to find: (i) the critical radiation dose range and the post irradiation period during which the antioxidant defense systems in the lungs, liver and kidneys remain stimulated; and (ii) to evaluate the degree to which these defense mechanisms remain stimulated in these organs after whole body exposure of the animal to low-dose radiation

  15. Internal Controls and Compliance With Laws and Regulations for the FY 1996 Financial Statements of the "Other Defense Organizations" Receiving Department 97 Appropriations

    National Research Council Canada - National Science Library

    1997-01-01

    The overall audit objective was to assess internal controls and compliance with laws and regulations and to review and evaluate the adjustments to the FY 1996 "Other Defense Organizations" financial statements...

  16. Personal Services and Benefits Expenses in The FY 1996 Statement of Operations and Changes in Net Position of the Other Defense Organizations

    National Research Council Canada - National Science Library

    1997-01-01

    .... Specifically, we reviewed the DoD Chief Financial Officers Other Defense Organizations Statement of Operations and Changes in Net Position for the year ended September 30, 1996, to determine whether...

  17. S1P dependent inter organ trafficking of group 2 innate lymphoid cells suppots host defense

    Science.gov (United States)

    Innate lymphoid cells (ILCs) are considered to be the innate counterparts of adaptive T lymphocytes and play important roles in host defense, tissue repair, metabolic homeostasis, and inflammatory diseases. ILCs are generally thought of as tissue-resident cells, but whether ILCs strictly behave in a...

  18. Cell-autonomous defense, re-organization and trafficking of membranes in plant-microbe interactions.

    Science.gov (United States)

    Dörmann, Peter; Kim, Hyeran; Ott, Thomas; Schulze-Lefert, Paul; Trujillo, Marco; Wewer, Vera; Hückelhoven, Ralph

    2014-12-01

    Plant cells dynamically change their architecture and molecular composition following encounters with beneficial or parasitic microbes, a process referred to as host cell reprogramming. Cell-autonomous defense reactions are typically polarized to the plant cell periphery underneath microbial contact sites, including de novo cell wall biosynthesis. Alternatively, host cell reprogramming converges in the biogenesis of membrane-enveloped compartments for accommodation of beneficial bacteria or invasive infection structures of filamentous microbes. Recent advances have revealed that, in response to microbial encounters, plasma membrane symmetry is broken, membrane tethering and SNARE complexes are recruited, lipid composition changes and plasma membrane-to-cytoskeleton signaling is activated, either for pre-invasive defense or for microbial entry. We provide a critical appraisal on recent studies with a focus on how plant cells re-structure membranes and the associated cytoskeleton in interactions with microbial pathogens, nitrogen-fixing rhizobia and mycorrhiza fungi. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  19. Panic-like defensive behavior but not fear-induced antinociception is differently organized by dorsomedial and posterior hypothalamic nuclei of Rattus norvegicus (Rodentia, Muridae

    Directory of Open Access Journals (Sweden)

    A.F. Biagioni

    2012-04-01

    Full Text Available The hypothalamus is a forebrain structure critically involved in the organization of defensive responses to aversive stimuli. Gamma-aminobutyric acid (GABAergic dysfunction in dorsomedial and posterior hypothalamic nuclei is implicated in the origin of panic-like defensive behavior, as well as in pain modulation. The present study was conducted to test the difference between these two hypothalamic nuclei regarding defensive and antinociceptive mechanisms. Thus, the GABA A antagonist bicuculline (40 ng/0.2 µL or saline (0.9% NaCl was microinjected into the dorsomedial or posterior hypothalamus in independent groups. Innate fear-induced responses characterized by defensive attention, defensive immobility and elaborate escape behavior were evoked by hypothalamic blockade of GABA A receptors. Fear-induced defensive behavior organized by the posterior hypothalamus was more intense than that organized by dorsomedial hypothalamic nuclei. Escape behavior elicited by GABA A receptor blockade in both the dorsomedial and posterior hypothalamus was followed by an increase in nociceptive threshold. Interestingly, there was no difference in the intensity or in the duration of fear-induced antinociception shown by each hypothalamic division presently investigated. The present study showed that GABAergic dysfunction in nuclei of both the dorsomedial and posterior hypothalamus elicit panic attack-like defensive responses followed by fear-induced antinociception, although the innate fear-induced behavior originates differently in the posterior hypothalamus in comparison to the activity of medial hypothalamic subdivisions.

  20. BMDO Raptor/Talon Program

    Science.gov (United States)

    1993-06-01

    has been graded and covered with gravel. Vegetation adjacent to and surrounding the tower consists of low growing desert shrubs (creosote bush (Larrea...lucida) White Sands wood rat (Neotoma micropus leucophaeus) Plants Mosquito plant (Agastache cana) Supreme sage (Sälvia summa) Dune unicorn plant

  1. BMDO Technology Applications in Biomedicine

    Science.gov (United States)

    1996-01-01

    center on improving energy levels of the laser pulse, and shifting the wavelength of the laser from 523 to 589 nm. A chicken allantoic membrane...described ",; ’.,-,:■, ’■: ■ *J: th.s secfian öfen require sophis- tiated methods for .Trterpreiaöon, arKäirarf/tJssue types roast be

  2. BMDO Technologies for Biomedical Applications.

    Science.gov (United States)

    1997-12-01

    the urea and excretes it as carbon dioxide (CO;) as part of its metabolic waste. With a breath analyzer, the expired CO: is analyzed for isotopic...devices called actua- tors to bend a thin sheet of polished ultralow-expansion fuscd-silica glass. The key elements in the Xinetics deformable mirror...difference in Wellman’s technique is that the laser is used with- out preapplication of a light-absorbing lotion . Thus far, studies have shown that the

  3. Lymphotoxin organizes contributions to host defense and metabolic illness from innate lymphoid cells.

    Science.gov (United States)

    Upadhyay, Vaibhav; Fu, Yang-Xin

    2014-04-01

    The lymphotoxin (LT)-pathway is a unique constituent branch of the Tumor Necrosis Superfamily (TNFSF). Use of LT is a critical mechanism by which fetal innate lymphoid cells regulate lymphoid organogenesis. Within recent years, adult innate lymphoid cells have been discovered to utilize this same pathway to regulate IL-22 and IL-23 production for host defense. Notably, genetic studies have linked polymorphisms in the genes encoding LTα to several phenotypes contributing to metabolic syndrome. The role of the LT-pathway may lay the foundation for a bridge between host immune response, microbiota, and metabolic syndrome. The contribution of the LT-pathway to innate lymphoid cell function and metabolic syndrome will be visited in this review. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    Accessed April 26, 2015, http://www.state.gov/t/ avc /rls/2014/226073.html 24 Pacific Air Forces, PACAF establishes Pacific IAMD Center, Accessed April...U.S. Department of State. Gulf Cooperation Council and Ballistic Missile Defense. Accessed April 26, 2015. http://www.state.gov/t/ avc /rls/2014

  5. Novel Synthetic, Host-defense Peptide Protects Against Organ Injury/Dysfunction in a Rat Model of Severe Hemorrhagic Shock.

    Science.gov (United States)

    Yamada, Noriaki; Martin, Lukas B; Zechendorf, Elisabeth; Purvis, Gareth S D; Chiazza, Fausto; Varrone, Barbara; Collino, Massimo; Shepherd, Joanna; Heinbockel, Lena; Gutsmann, Thomas; Correa, Wilmar; Brandenburg, Klaus; Marx, Gernot; Schuerholz, Tobias; Brohi, Karim; Thiemermann, Christoph

    2017-03-10

    To evaluate (1) levels of the host-defense/antimicrobial peptide LL-37 in patients with trauma and hemorrhagic shock (HS) and (2) the effects of a synthetic host-defense peptide; Pep19-4LF on multiple organ failure (MOF) associated with HS. HS is a common cause of death in severely injured patients. There is no specific therapy that reduces HS-associated MOF. (1) LL-37 was measured in 47 trauma/HS patients admitted to an urban major trauma center. (2) Male Wistar rats were submitted to HS (90 min, target mean arterial pressure: 27-32 mm Hg) or sham operation. Rats were treated with Pep19-4LF [66 (n = 8) or 333 μg/kg · h (n = 8)] or vehicle (n = 12) for 4 hours following resuscitation. Plasma LL-37 was 12-fold higher in patients with trauma/HS compared to healthy volunteers. HS rats treated with Pep19-4LF (high dose) had a higher mean arterial pressure at the end of the 4-hour resuscitation period (79 ± 4 vs 54 ± 5 mm Hg) and less renal dysfunction, liver injury, and lung inflammation than HS rats treated with vehicle. Pep19-4LF enhanced (kidney/liver) the phosphorylation of (1) protein kinase B and (2) endothelial nitric oxide synthase. Pep19-4LF attenuated the HS-induced (1) translocation of p65 from cytosol to nucleus, (2) phosphorylation of IκB kinase on Ser, and (3) phosphorylation of IκBα on Ser resulting in inhibition of nuclear factor kappa B and formation of proinflammatory cytokines. Pep19-4LF prevented the release of tumor necrosis factor alpha caused by heparan sulfate in human mononuclear cells by binding to this damage-associated molecular pattern. Trauma-associated HS results in release of LL-37. The synthetic host-defense/antimicrobial peptide Pep19-4LF attenuates the organ injury/dysfunction associated with HS.

  6. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    ... and funds that use the Treasury Index 97 symbol. In support of our audit of the DoD Agency-Wide financial statements for FY 1999, we audited accounting procedures and controls for the three largest organizations that received full accounting...

  7. The Organization of African Unity and Peacekeeping: The Pan-African Defense Force

    Science.gov (United States)

    1981-06-05

    Diary " (hereafter cited TF 203 WD), p. 5. o i~i171bid. 18 The Commander of the Nigerian troops in Chad was different for TF 203 Commander. 19 FAT was...independence to help in training and organizing the armed forces. For example, the British officers working in K", aya argued against any expansion of...Happened in Chad?" West Africa, 21 April 1975, p. 442. "Matchet’s Diary ." West Africa, 21 April 1975, p. 445. "Chad. Desert Coup." Time, 26 February

  8. The brain–the organ of the psychic (The lesions / the defense mechanisms)

    Science.gov (United States)

    Ciurea, AV

    2010-01-01

    The article is based on the Leopold Szondi theory (March 11, 1893 – January 24, 1986), who was a Hungarian psychiatrist. He is known for the psychological tool that bears his name, the Szondi test. He developed a form of depth psychology that had some prominence in Europe in the mid–20th century, but has been ignored for the most part), the study seeks to correlate the szondian test results with the imagistic ones on a wide–range pathology. In the Neurosurgery Department, patients are investigated using modern exploration methods (MRI, CTscan, and computed EEG, etc.) in order to identify possible somatic lesions. The study's subjects selected during 2000–2004 from the patients admitted and investigated for neurosurgical conditions; they were divided into two subgroups, based on whether the organic lesions were or were not present (the independent variable). The exclusion criterion was a lesion due to external causes. Statistically meaningful there are seven types of Ego profiles, in relation with the lesion: the archaic ego [0 –], the inhibited ego [– +], the adaptive ego [– –], the narcissist ego [+ +], the identified ego [+/– 0], the fugitive ego [+/– –] and the possessed ego [0 +]. The nexus in the destiny's analysis description highlights the dialectic between the Ego's functions and the drived dangers when facing the demands of the concrete reality. PMID:20945811

  9. Trade-offs between competition and defense specialists among unicellular planktonic organisms: the "killing the winner" hypothesis revisited.

    Science.gov (United States)

    Winter, Christian; Bouvier, Thierry; Weinbauer, Markus G; Thingstad, T Frede

    2010-03-01

    A trade-off between strategies maximizing growth and minimizing losses appears to be a fundamental property of evolving biological entities existing in environments with limited resources. In the special case of unicellular planktonic organisms, the theoretical framework describing the trade-offs between competition and defense specialists is known as the "killing the winner" hypothesis (KtW). KtW describes how the availability of resources and the actions of predators (e.g., heterotrophic flagellates) and parasites (e.g., viruses) determine the composition and biogeochemical impact of such organisms. We extend KtW conceptually by introducing size- or shape-selective grazing of protozoans on prokaryotes into an idealized food web composed of prokaryotes, lytic viruses infecting prokaryotes, and protozoans. This results in a hierarchy analogous to a Russian doll, where KtW principles are at work on a lower level due to selective viral infection and on an upper level due to size- or shape-selective grazing by protozoans. Additionally, we critically discuss predictions and limitations of KtW in light of the recent literature, with particular focus on typically neglected aspects of KtW. Many aspects of KtW have been corroborated by in situ and experimental studies of isolates and natural communities. However, a thorough test of KtW is still hampered by current methodological limitations. In particular, the quantification of nutrient uptake rates of the competing prokaryotic populations and virus population-specific adsorption and decay rates appears to be the most daunting challenge for the years to come.

  10. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  11. The politics of Soviet strategic defense: Political strategies, organization politics, and Soviet strategic thought. (Volumes I and II)

    International Nuclear Information System (INIS)

    Kaufman, S.J.

    1991-01-01

    This study formulates three different unitary rational-actor models and an organizational model that can be used to explain Soviet policy in strategic defense from 1966-1980, then tests the models to determine which most successfully explains Soviet behavior. The only rational-actor model that can explain the Soviet force posture for air defense relies on demonstrably false assumptions. A well-formulated organizational model can explain these facts, as well as some organizational pathologies shown by the Soviet National Air Defense Forces. The findings suggest that military services, even when ostensibly closely directed by civilian and military superiors, often manage to pursue their own interests rather than the requirements of higher policy. Soviet civilian leaders generally had limited control over the formulation of military doctrine or over the force posture of Soviet military services, but arms control (especially the ABM Treaty) offered a policy handle which helped them to affect doctrine and force posture to a substantial degree

  12. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  13. ISTEF Laser Radar Program

    National Research Council Canada - National Science Library

    Stryjewski, John

    1998-01-01

    The BMDO Innovative Science and Technology Experimentation Facility (BMDO/ISTEF) laser radar program is engaged in an ongoing program to develop and demonstrate advanced laser radar concepts for Ballistic Missile Defense (BMD...

  14. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  15. USE OF FORCE: CONFLICT BETWEEN THE PROHIBITION OF ITS USE AND THE VALIDITY OF PREVENTIVE SELF-DEFENSE IN THE CONTEXT OF THE FIGHT AGAINST ORGANIZED TERRORISM?

    Directory of Open Access Journals (Sweden)

    MATÍAS DUTRA CETUSIC

    2017-09-01

    Full Text Available The author analyzes the prevailing regulation on the use of force, from the perspective of Article 51 of the UN Charter related to the general prohibition of Article 2.4 UN Charter, with special emphasis on the existing doctrinal conflict due to the interpretive duality of the above-mentioned Article 51 C, offering an approach to the problem. In that regard, the theories that justify unilateral anticipatory modalities in the fightagainst organized terrorism are confronted, in order to eventually findsupport in the customary law of the inherent right to self-defense.

  16. Effects of diets based on foods from conventional versus organic production on intake and excretion of flavonoids and markers of antioxidative defense in humans

    DEFF Research Database (Denmark)

    Grinder-Pedersen, Lisbeth; Rasmussen, Salka E.; Bügel, Susanne

    2003-01-01

    selection of more resistant varieties is of central importance to organic farming, it cannot be excluded that the observed effects originate from these differences. The food production method affected the content of the major flavonoid, quercetin, in foods and also affected urinary flavonoids and markers......Different food production methods may result in differences in the content of secondary metabolites such as polyphenolic compounds. The present study compared conventionally (CPD) and organically produced (OPD) diets in a human crossover intervention study (n = 16) with respect to the intake...... both interventions. Most markers of antioxidative defense did not differ between the diets, but intake of OPD resulted in an increased protein oxidation and a decreased total plasma antioxidant capacity compared to baseline (P

  17. Two Volatile Organic Compounds Trigger Plant Self-Defense against a Bacterial Pathogen and a Sucking Insect in Cucumber under Open Field Conditions

    Directory of Open Access Journals (Sweden)

    Choong-Min Ryu

    2013-05-01

    Full Text Available Systemic acquired resistance (SAR is a plant self-defense mechanism against a broad-range of pathogens and insect pests. Among chemical SAR triggers, plant and bacterial volatiles are promising candidates for use in pest management, as these volatiles are highly effective, inexpensive, and can be employed at relatively low concentrations compared with agrochemicals. However, such volatiles have some drawbacks, including the high evaporation rate of these compounds after application in the open field, their negative effects on plant growth, and their inconsistent levels of effectiveness. Here, we demonstrate the effectiveness of volatile organic compound (VOC-mediated induced resistance against both the bacterial angular leaf spot pathogen, Pseudononas syringae pv. lachrymans, and the sucking insect aphid, Myzus persicae, in the open field. Using the VOCs 3-pentanol and 2-butanone where fruit yields increased gave unexpectedly, a significant increase in the number of ladybird beetles, Coccinella septempunctata, a natural enemy of aphids. The defense-related gene CsLOX was induced by VOC treatment, indicating that triggering the oxylipin pathway in response to the emission of green leaf volatiles can recruit the natural enemy of aphids. These results demonstrate that VOCs may help prevent plant disease and insect damage by eliciting induced resistance, even in open fields.

  18. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  19. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Михаил Александрович Правдов

    2013-04-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.DOI: http://dx.doi.org/10.12731/2218-7405-2013-1-41

  20. STUDENT VOLUNTEER ORGANIZATIONS IN THE MINISTRY OF THE RUSSIAN FEDERATION FOR CIVIL DEFENSE, EMERGENCIES AND ELIMINATION OF CONSEQUENCES OF NATURAL DISASTERS SYSTEM

    Directory of Open Access Journals (Sweden)

    Pravdov Mikhail Aleksandrovich

    2013-01-01

    Full Text Available The aim: the studing of the motivation of youth to volunteer activity. During the investigation were used methods of discussion, interviewing, interrogation and mathematical processing of data. In the article the experience of forming of youth voluntary social associations in Ivanovo region are regarded and the forming of a volunteers student group–“Sova” on the base of Ivanovo institute of the public fire service of the Ministry of the Russian Federation for Civil Defense, Emergencies and Elimination of Consequences of Natural Disasters. Was the level of Knowledge of Students about volunteer activity revealed, as well as the role student youth’s participation in volunteer organizations and the influence of the student volunteer associations on the development of pupils’ personalities in boarding school.

  1. Reusable launch vehicle development research

    Science.gov (United States)

    1995-01-01

    NASA has generated a program approach for a SSTO reusable launch vehicle technology (RLV) development which includes a follow-on to the Ballistic Missile Defense Organization's (BMDO) successful DC-X program, the DC-XA (Advanced). Also, a separate sub-scale flight demonstrator, designated the X-33, will be built and flight tested along with numerous ground based technologies programs. For this to be a successful effort, a balance between technical, schedule, and budgetary risks must be attained. The adoption of BMDO's 'fast track' management practices will be a key element in the eventual success of NASA's effort.

  2. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  3. The Hunting of the Snark: Organizing and Synchronizing of Informational Elements for Homeland Defense and Civil Support

    Science.gov (United States)

    2009-06-01

    Organizing and synchronizing informational elements is filled with tension, which is metaphorically illustrated in the Victorian children’s story, The...or distance divided by time. In a similar fashion , dominance can be correlated to the control of a domain. Superiority equates to the degree of...how PA should act in this fashion . The literature recommends that leadership bring PA into the operational fold. The literature consistently

  4. Organization Analytics: Taking Cost-per-Dollar-Obligated (CPDO) Measures to the Next Level in Defense Contracting

    Science.gov (United States)

    2016-04-30

    approach offers a myriad of pros and cons . For purposes of this discussion, the linkage between military and civilian staff and CPDO is evident in our...Percentage of actions below the SAT 1 AF 1 $267K 46% 2 AF 2 $102K 71% 3 AF 3 $44K 79% 4 DEF 1 $24K 88% 5 USMC 1 $16K 90% 6 USMC 2 $12K 95% 7...Organization Group CPDO FY 14 USMC 1 3 .019 USMC 2 3 .069 Navy 1 4 .027 Navy 2 4 .011 Navy 3 4 .023 AF 1 1 .002 AF 2 1 .010 AF 3 3 .021 DEF 1 3 .017

  5. Bacterial self-defense antibiotics release from organic-inorganic hybrid multilayer films for long-term anti-adhesion and biofilm inhibition properties.

    Science.gov (United States)

    Xu, Qingwen; Li, Xi; Jin, Yingying; Sun, Lin; Ding, Xiaoxu; Liang, Lin; Wang, Lei; Nan, Kaihui; Ji, Jian; Chen, Hao; Wang, Bailiang

    2017-12-14

    Implant-associated bacterial infections pose serious medical and financial issues due to the colonization and proliferation of pathogens on the surface of the implant. The as-prepared traditional antibacterial surfaces can neither resist bacterial adhesion nor inhibit the development of biofilm over the long term. Herein, novel (montmorillonite/poly-l-lysine-gentamicin sulfate) 8 ((MMT/PLL-GS) 8 ) organic-inorganic hybrid multilayer films were developed to combine enzymatic degradation PLL for on-demand self-defense antibiotics release. Small molecule GS was loaded into the multilayer films during self-assembly and the multilayer films showed pH-dependent and linear growth behavior. The chymotrypsin- (CMS) and bacterial infections-responsive film degradation led to the peeling of the films and GS release. Enzyme-responsive GS release exhibited CMS concentration dependence as measured by the size of the inhibition zone and SEM images. Notably, the obtained antibacterial films showed highly efficient bactericidal activity which killed more than 99.9% of S. aureus in 12 h. Even after 3 d of incubation in S. aureus, E. coli or S. epidermidis solutions, the multilayer films exhibited inhibition zones of more than 1.5 mm in size. Both in vitro and in vivo antibacterial tests indicated good cell compatibility, and anti-inflammatory, and long-term bacterial anti-adhesion and biofilm inhibition properties.

  6. Accounting Entries Made in Compiling the FY 2000 Financial Statements for the Working Capital Funds of the Air Force and Other Defense Organizations

    National Research Council Canada - National Science Library

    2001-01-01

    .... This audit is one in a series of audits of department-level accounting entries made by the Defense Finance and Accounting Service in preparing the FY 2000 financial statements for DoD reporting entities...

  7. Control of Database Applications at the Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The Defense Finance and Accounting Service Financial Systems Organization, under the control of the Deputy Director for Information Management, Defense Finance and Accounting Service, is responsible...

  8. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  9. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  10. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  11. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  12. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152 RTG

    Science.gov (United States)

    2018-04-18

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  13. Toward Intelligent Autonomous Agents for Cyber Defense: Report of the 2017 Workshop by the North Atlantic Treaty Organization (NATO) Research Group IST-152-RTG

    Science.gov (United States)

    2018-04-01

    simple example? 15. SUBJECT TERMS cybersecurity , cyber defense, autonomous agents, resilience, adversarial intelligence 16. SECURITY CLASSIFICATION...explained” based on other attack sequences (e.g., Kullback–Leibler [K-L] divergence). For example, the DARPA Explainable Artificial Intelligence ...a failure of humanity, not artificial intelligence . The notion of self-guidance approaches the field of robot ethics. How can autonomous agents be

  14. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  15. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  16. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  17. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  18. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  19. 77 FR 13013 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2012-03-05

    ... Organization Government Procurement Agreement and the Free Trade Agreements, as determined by the United States... 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System...

  20. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  1. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  2. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  3. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  4. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  6. 32 CFR 298.2 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Organization. 298.2 Section 298.2 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) FREEDOM OF... Organization. (a) The DIS organization includes a Headquarters located in Alexandria, Virginia; four Regions...

  7. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  8. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  9. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  10. 32 CFR 48.602 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Organization. 48.602 Section 48.602 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN RETIRED SERVICEMAN'S FAMILY PROTECTION PLAN Miscellaneous § 48.602 Organization. (a) The Joint Board for the Retired...

  11. 32 CFR 18.3 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Organization. 18.3 Section 18.3 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE MILITARY COMMISSIONS APPOINTING AUTHORITY FOR MILITARY COMMISSIONS § 18.3 Organization. (a) The Appointing Authority for Military Commissions is...

  12. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  13. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  14. A reclamação nas organizações do trabalho: estratégia defensiva e evocação do sofrimento Complaints in work organizations: defense strategy and evocation of suffering

    Directory of Open Access Journals (Sweden)

    Fernanda Sansão Hallack

    2005-12-01

    Full Text Available Este artigo pretende pesquisar a reclamação no discurso dos trabalhadores das organizações na perspectiva teórica de Christophe Dejours. Baseando-se na concepção de que o trabalho é uma das possibilidades do sujeito vivenciar seu sofrimento e tentar dominá-lo, reconhece-se a existência de um sofrimento criador enquanto estado de luta contra a organização do trabalho que muitas vezes conduz ao adoecimento. A reclamação evoca o sofrimento tornando-se uma estratégia de vinculação grupal poderosa enquanto construção de sentido intersubjetivo através dos laços discursivos, na tentativa de resistência grupal à doença. Um forte elo de união entre os membros de uma equipe de trabalho e por isso um mecanismo de defesa grupal mais eficiente e menos custoso do que tentativas de defesa individuais. Por outro lado, paradoxalmente, um mecanismo de defesa que, justamente por demonstrar a falência de outras tentativas individuais de proteção contra o sofrimento, contribui inclusive para os objetivos da própria organização do trabalho e também para o conformismo, a repetição e a estagnação dos sujeitos.This article intends to research the role of complaints in the discourse of workers of work organizations, as seen from Christophe Dejours's theories and central concepts. Based on the conception that work is one of the possibilities of intensely experiencing one's suffering and trying to overcome it, one becomes aware of a creative suffering as a rebellious stance against the organization of work. Complaints evoke suffering as a powerful group bonding strategy whereas the construction of an intersubjective meaning through the ties produced by discourses in the group in the attempt to resist illness as a group. Strong ties of union among the members of a work team result in a group defense mechanism that is more efficient and less expensive than the individual ones. On the other hand, paradoxically, it is a defense mechanism

  15. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  16. Evaluation of Department of Defense Compliance With Criminal History Data Reporting Requirements

    National Research Council Canada - National Science Library

    1997-01-01

    ...." The Secretary of Defense was directed to provide a report to Congress on the consistency with which fingerprint cards and final dispositions are reported by the Defense Criminal Investigative Organizations (DCIOs...

  17. Logistics: Navy Controls Over Material Sent to Defense Reutilization and Marketing Offices

    National Research Council Canada - National Science Library

    Young, Shelton R; Wing, Terrance; McDermott, James; Hollister, Paul; Tolbert, Herman; Mansfield, Brett; Talevi, Mike; Cobb, Susann L

    2004-01-01

    The Defense Reutilization and Marketing Service (DRMS) is an organization within the Defense Logistics Agency that is responsible for the reutilization, transfer, donation, sale, and disposal of materiel that is excess to DoD requirements...

  18. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  19. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  20. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  1. Organics.

    Science.gov (United States)

    Chian, Edward S. K.; DeWalle, Foppe B.

    1978-01-01

    Presents water analysis literature for 1978. This review is concerned with organics, and it covers: (1) detergents and surfactants; (2) aliphatic and aromatic hydrocarbons; (3) pesticides and chlorinated hydrocarbons; and (4) naturally occurring organics. A list of 208 references is also presented. (HM)

  2. Organizers.

    Science.gov (United States)

    Callison, Daniel

    2000-01-01

    Focuses on "organizers," tools or techniques that provide identification and classification along with possible relationships or connections among ideas, concepts, and issues. Discusses David Ausubel's research and ideas concerning advance organizers; the implications of Ausubel's theory to curriculum and teaching; "webbing," a…

  3. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  4. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  5. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  6. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  7. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  8. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  9. Organizations

    DEFF Research Database (Denmark)

    Hatch, Mary Jo

    and considers many more. Mary Jo Hatch introduces the concept of organizations by presenting definitions and ideas drawn from the a variety of subject areas including the physical sciences, economics, sociology, psychology, anthropology, literature, and the visual and performing arts. Drawing on examples from......Most of us recognize that organizations are everywhere. You meet them on every street corner in the form of families and shops, study in them, work for them, buy from them, pay taxes to them. But have you given much thought to where they came from, what they are today, and what they might become...... prehistory and everyday life, from the animal kingdom as well as from business, government, and other formal organizations, Hatch provides a lively and thought provoking introduction to the process of organization....

  10. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  11. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  12. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  13. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  14. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  15. Kurumsal içerik yönetimi bileşenlerinin bir savunma sanayii organizasyonu örneğinde değerlendirilmesi = Evaluation of enterprise content management components within the example of defense industry organization

    Directory of Open Access Journals (Sweden)

    Çakmak, Tolga

    2011-01-01

    Full Text Available Organizasyonlar doküman, belge, web içerik ve e-posta yönetimi gibi farklı amaçlarla geliştirdikleri bilgi sistemlerini kurumsal içerik yönetimi altında bütünleştirmeye yönelmektedirler. Çalışmamızda bu çerçevede Türkiye'de bir savunma sanayii kuruluşundaki koşulların ve beklentilerin kurumsal içerik yönetimi bileşenleri açısından analiz edilmesi amaçlanmıştır. Belirlenen bu amaç kapsamında geliştirilen web tabanlı bir anket uygulaması ile çalışanların günlük işlerinde kullanmış oldukları doküman yönetimi sistemleri, elektronik posta sistemleri, Web içerik yönetimi uygulamaları ve Evrak/Belge Sistemleri 167 birimden 337 kullanıcı ile analiz edilmiştir. Yapılan analizlere göre; kurumda elektronik posta yönetimi sistemlerinin diğer sistemlere göre daha iyi düzeyde olduğu, en çok kurumsal belge yönetimi sistemlerinin geliştirilmesi, kurumun bütününü kapsayan bir sistem yaklaşımının yapılandırılması ve bu yöndeki farkındalığın artırılması gerektiği vurgulanmıştır. / Organizations tend to integrate the systems, such as document, records, web content and e-mail management that they develop for various purposes under enterprise content management. In this respect, the aim of this study is to analyze the current conditions and expectations of a defense industry organization in Turkey. According to this aim, the document management systems, electronic mail systems, Web content management applications used by the employees while running their day-to-day activities and the document/records systems used for official correspondence in 167 departments by 337 users within an organization specialized in defense industry in Turkey have been analyzed with a web based survey. Results show that the electronic mail management systems in the related organization are at a higher level than the other systems, and records management systems should be developed more than other

  16. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  17. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  18. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  19. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  20. 75 FR 54524 - Defense Federal Acquisition Regulation Supplement; Acquisition Strategies To Ensure Competition...

    Science.gov (United States)

    2010-09-08

    ...., because the changes are to internal Government organization and operating procedures only. The rule... 48 CFR Part 207 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations... Life Cycle of Major Defense Acquisition Programs (DFARS Case 2009-D014) AGENCY: Defense Acquisition...

  1. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  2. Defense Finance and Accounting Service Work on the FY 1993 Air Force Defense Business Operations Fund Financial Statements

    National Research Council Canada - National Science Library

    Rau, Russell

    1995-01-01

    ... fairly in accordance with accepted accounting principles. The objective was revised to correspond with the incremental audit approach that DoD audit organizations were using for the Defense Business Operations Fund' 5 financial statements...

  3. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  4. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  5. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  6. Payroll Expenses Reported by the Defense Finance and Accounting Service Cleveland Center

    National Research Council Canada - National Science Library

    1998-01-01

    .... To meet that requirement, a consolidation was done of the financial information received from offices providing accounting support to the Defense organizations and prepares the financial statement...

  7. U.S. Department of Defense Application-Level Firewall Protection Profile for Medium Robustness Environments

    National Research Council Canada - National Science Library

    Dolan, Kathy

    2000-01-01

    .... S. Government organizations, specifically the Department of Defense, handling unclassified or sensitive but unclassified information for Mission-Critical Categories in a moderate-risk environment...

  8. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  9. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  10. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  11. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  12. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  13. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  14. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  15. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  16. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  17. 32 CFR 752.2 - Organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Organization. 752.2 Section 752.2 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY CLAIMS ADMIRALTY CLAIMS § 752.2 Organization. (a) Administrative authority of the Secretary of the Navy. The Secretary of the Navy has...

  18. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  19. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  20. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  1. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  2. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  3. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  4. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  5. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  6. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  7. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  8. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  9. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  10. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  11. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  12. Defense waste processing facility precipitate hydrolysis process

    International Nuclear Information System (INIS)

    Doherty, J.P.; Eibling, R.E.; Marek, J.C.

    1986-03-01

    Sodium tetraphenylborate and sodium titanate are used to assist in the concentration of soluble radionuclide in the Savannah River Plant's high-level waste. In the Defense Waste Processing Facility, concentrated tetraphenylborate/sodium titanate slurry containing cesium-137, strontium-90 and traces of plutonium from the waste tank farm is hydrolyzed in the Salt Processing Cell forming organic and aqueous phases. The two phases are then separated and the organic phase is decontaminated for incineration outside the DWPF building. The aqueous phase, containing the radionuclides and less than 10% of the original organic, is blended with the insoluble radionuclides in the high-level waste sludge and is fed to the glass melter for vitrification into borosilicate glass. During the Savannah River Laboratory's development of this process, copper (II) was found to act as a catalyst during the hydrolysis reactions, which improved the organic removal and simplified the design of the reactor

  13. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  14. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  15. Reappraising Defense Organization: An Analysis Based on the Defense Organization Study of 1977-1980,

    Science.gov (United States)

    1983-01-01

    agencies, and even private groups. As contended in chapter 1, reorganization.propos- als insensitive to ambient political conditions-that is, the...functions with the aid of service secretariats. Integrating the military headquarters staffs, although encumbered with politica ; obstacles, is the

  16. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  17. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  18. 32 CFR 37.120 - Can my organization award or administer TIAs?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Can my organization award or administer TIAs? 37.120 Section 37.120 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS General § 37.120 Can my organization award...

  19. The Clementine Nickel Hydrogen Common Pressure Vessel Battery

    OpenAIRE

    Garner, Christopher

    1994-01-01

    The Clementine spacecraft was launched in January 1994 to demonstrate advanced lightweight technologies for the Ballistic Missile Defense Organization (BMDO). One of the key technologies was the first use of a multi-cell nickel hydrogen (NiH2) common pressure vessel (CPV) battery. The 5.0 inch diameter, 22 cell, 15.0 ampere-hour NiH2 CPV battery was manufactured by Johnson Controls Battery Group Inc., (JCBGI). Battery test and integration was performed by the Naval Research Laboratory (NRL). ...

  20. The levels of psychological functioning of personality and the mechanisms of defense

    OpenAIRE

    Benítez Camacho, Erika; Chávez-León, Enrique; Ontiveros Uribe, Martha Patricia; Yunes Jiménez, Arlette; Náfate López, Omar

    2010-01-01

    Otto Kernberg states three types of personality organizations, also named psychological functional levels. They reflect the patient's predominant psychological characteristics: identity integration grade, defense mechanisms, and reality test. In mental disorders, the predominant defensive influences significantly in the severity and evolution of the suffering. Objectives The objective of the actual study was to determine the usage of defense mechanisms by patients with some mental disorder, g...

  1. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  2. Large Scale System Defense

    Science.gov (United States)

    2008-10-01

    NUMBER 00 5f. WORK UNIT NUMBER 01 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Columbia University 1700 Broadway New York NY 10019-5905 8...PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) AFRL/RIGA 525 Brooks Rd. Rome NY 13441-4505...pealing because of the need to modify source code. Since source-level annotations serve as a vestigial policy, we articulated a way to augment self

  3. 32 CFR 643.121 - Private organizations on DA installations.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Private organizations on DA installations. 643.121 Section 643.121 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... DA installations. (a) AR 210-1 defines and classifies private organizations, such as thrift shops and...

  4. 78 FR 77664 - Defense Policy Board (DPB); Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-12-24

    ...: (a) Issues central to strategic DoD planning; (b) policy implications of U.S. force structure and force modernization and on DoD's ability to execute U.S. defense strategy; (c) U.S. regional defense... public or interested organizations may submit written statements to the membership of the DPB at any time...

  5. A Cloud Storage Platform in the Defense Context : Mobile Data Management With Unreliable Network Conditions

    NARCIS (Netherlands)

    Veen, J.S. van der; Bastiaans, M.; Jonge, M. de; Strijkers, R.J.

    2012-01-01

    This paper discusses a cloud storage platform in the defense context. The mobile and dismounted domains of defense organizations typically use devices that are light in storage, processing and communication capabilities. This means that it is difficult to store a lot of information on these devices

  6. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  7. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    Science.gov (United States)

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  8. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  9. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  10. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  11. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  12. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  13. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  14. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  15. Aegis International and Ballistic Missile Defense: A New Interoperability Network

    Science.gov (United States)

    2011-06-01

    the 1950’s and 1960s ( NIKE Hercules, Sentinel, Safeguard, Site Defense, etc.). The objectives have been pursued by a centralized organization (the...from land. This means greater geographic flexibility, greater survivability and greater scalability in response to an evolving threat. That’s

  16. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  17. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  18. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    pronounced at intermediate environmental conditions. Optimizing single traits generally leads to a more pronounced response of the defense traits, which implies that studying single traits leads to an overestimation of their response to predation. Behavioral defense and morphological defense compensate......Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  19. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  20. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  1. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  2. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  3. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  4. Interagency, Intergovernmental Organization, and Nongovernmental Organization Coordination During Joint Operations. Volume 1

    National Research Council Canada - National Science Library

    2006-01-01

    ...) environment and provides fundamental principles and guidance to facilitate coordination between the Department of Defense, and other US Government agencies, IGOs, NGOs, and regional organizations...

  5. Interagency, Intergovernmental Organization, and Nongovernmental Organization Coordination During Joint Operations. Volume 2

    National Research Council Canada - National Science Library

    2006-01-01

    ...) environment and provides fundamental principles and guidance to facilitate coordination between the Department of Defense, and other US Government agencies, IGOs, NGOs, and regional organizations...

  6. 77 FR 782 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-01-06

    ... private or public sector corporations or organizations; and (b) a wealth of top-level, global business..., economics, technology and healthcare. Board members shall be appointed by the Secretary of Defense, with...

  7. NATO Enlargement 2000 - 2015. Determinants and Implications for Defense Planning and Shaping

    National Research Council Canada - National Science Library

    Szayna, Thomas

    2001-01-01

    .... Created as an organization dedicated to the collective defense of its members, NATO transformed itself in the 1990s, expanding its mission to include conflict prevention and conflict management...

  8. FY 1987 program summary document: Office of Defense Waste and Transportation Management

    International Nuclear Information System (INIS)

    1987-04-01

    This document describes the Office of Defense Waste and Transportation Management (DWTM) Program as supported by the President's Fiscal Year (FY) 1987 Budget Request to Congress. It specifically addresses the program's organization, objectives, strategies, and plans for FY 1987

  9. The Impact of the Defense Industry Consolidation on the Aerospace Industry

    National Research Council Canada - National Science Library

    Davis, Judy B

    2006-01-01

    ... (SIC) codes. Using the structure-conduct- performance paradigm, a method in industrial organization, this thesis focused on how the defense consolidation affected the structure and behavior of the aerospace industry...

  10. Genome Defense Mechanisms in Neurospora and Associated Specialized Proteins

    Directory of Open Access Journals (Sweden)

    Ranjan Tamuli

    2010-06-01

    Full Text Available Neurospora crassa, the filamentous fungus possesses widest array of genome defense mechanisms known to any eukaryotic organism, including a process called repeat-induced point mutation (RIP. RIP is a genome defense mechanism that hypermutates repetitive DNA sequences; analogous to genomic imprinting in mammals. As an impact of RIP, Neurospora possesses many fewer genes in multigene families than expected. A DNA methyltransferase homologue, RID was shown to be essential for RIP. Recently, a variant catalytic subunit of translesion DNA polymerase zeta (Pol zeta has been found to be essential for dominant RIP suppressor phenotype. Meiotic silencing and quelling are two other genome defense mechanisms in Neurospora, and proteins required for these two processes have been identified through genetic screens.

  11. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  12. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  13. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  14. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  15. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  16. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  17. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  18. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  19. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  20. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  1. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  2. 32 CFR 352a.3 - Organization and management.

    Science.gov (United States)

    2010-07-01

    ...) ORGANIZATIONAL CHARTERS DEFENSE FINANCE AND ACCOUNTING SERVICE (DFAS) § 352a.3 Organization and management. (a... control of the Comptroller of the Department of Defense (C, DoD). (b) The DFAS shall consist of a Director, selected by the Secretary of Defense, and such subordinate organizational elements as are established by...

  3. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  4. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  5. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  6. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  7. Cost and price auditing: effectiveness in the procurement of defense services in Spain

    Directory of Open Access Journals (Sweden)

    José Aguado Romero

    Full Text Available Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

  8. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  9. THE DEFENSE IN CHILE FROM 1960 TO 2010: AN ISSUE OF THE MILITARY OR AN ISSUE OF EVERY CHILEAN CITIZEN?

    Directory of Open Access Journals (Sweden)

    JULIO SOTO SILVA

    2018-01-01

    Full Text Available This essay presents a general vision of the national defense trough the last 50 years as well as a study of the National Defense System of Chile. The Decree 181 of 1960 that stated the organization of the system and structure of the National Defense is the starting point, a brief analysis of how it worked until 2010 when it was replaced by the new law of the MOD. The way it worked during the international crisis Chile faced during the 70s and 80s is also discussed. But this study does not stop there, it also tackles the way by which the defense policy evolved from an issue related only to the military, to become an issue of every Chilean citizen, through the widening of the knowledge of defense issues to the civilian and political elites, being the formulation of an explicit Defense Policy the cornerstone of the whole process, by means of the publishing of the three books of the national defense, along with other key public policies in defense issues whereas the contribution of the Defense Community, recognized as such in the Second Book of the Defense, was capital. This community has a representation of all the sectors of the civil society interested in defense issues as well as from the armed forces. This period ends with the law 20.424 “Organic Statute of the Ministry of Defense”, the most important change in defense issues, besides de DFL 181, since the creation of the Ministry of Defense back in 1932.

  10. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  11. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  12. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  13. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  14. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  15. Singapore’s Defense Policy: Essential or Excessive?

    Science.gov (United States)

    2010-06-11

    Republic, Ecuador , El Salvador, Ghana, Greece, Guatemala, Honduras, India, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Malaysia, Mexico, Morocco...mitigating measures, it is timely to establish the appropriate context to ensure a focused and fruitful discussion of Singapore’s defense policy. As...regional allies. 41 Today, ASEAN has matured considerably as an organization, buoyed by the relative warmth and stability of regional relationships in

  16. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  17. Copper Contamination Impairs Herbivore Initiation of Seaweed Inducible Defenses and Decreases Their Effectiveness.

    Directory of Open Access Journals (Sweden)

    Alexandria M Warneke

    Full Text Available Seaweed-herbivore interactions are often mediated by environmental conditions, yet the roles of emerging anthropogenic stressors on these interactions are poorly understood. For example, chemical contaminants have unknown consequences on seaweed inducible resistance and herbivore response to these defenses despite known deleterious effects of contaminants on animal inducible defenses. Here, we investigated the effect of copper contamination on the interactions between a snail herbivore and a brown seaweed that displays inducible resistance to grazing. We examined seaweed inducible resistance and its effectiveness for organisms exposed to copper at two time points, either during induction or after herbivores had already induced seaweed defenses. Under ambient conditions, non-grazed tissues were more palatable than grazed tissues. However, copper additions negated the preference for non-grazed tissues regardless of the timing of copper exposure, suggesting that copper decreased both how herbivores initiated these inducible defenses and their subsequent effectiveness. Copper decreased stimulation of defenses, at least in part, by suppressing snail grazing pressure-the cue that turns inducible defenses on. Copper decreased effectiveness of defenses by preventing snails from preferentially consuming non-grazed seaweed. Thus, contaminants can potentially stress communities by changing seaweed-herbivore interactions mediated via inducible defenses. Given the ubiquity of seaweed inducible resistance and their potential influence on herbivores, we hypothesize that copper contamination may change the impact of these resistant traits on herbivores.

  18. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  19. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  20. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  1. Impact of Childhood Malnutrition on Host Defense and Infection.

    Science.gov (United States)

    Ibrahim, Marwa K; Zambruni, Mara; Melby, Christopher L; Melby, Peter C

    2017-10-01

    The global impact of childhood malnutrition is staggering. The synergism between malnutrition and infection contributes substantially to childhood morbidity and mortality. Anthropometric indicators of malnutrition are associated with the increased risk and severity of infections caused by many pathogens, including viruses, bacteria, protozoa, and helminths. Since childhood malnutrition commonly involves the inadequate intake of protein and calories, with superimposed micronutrient deficiencies, the causal factors involved in impaired host defense are usually not defined. This review focuses on literature related to impaired host defense and the risk of infection in primary childhood malnutrition. Particular attention is given to longitudinal and prospective cohort human studies and studies of experimental animal models that address causal, mechanistic relationships between malnutrition and host defense. Protein and micronutrient deficiencies impact the hematopoietic and lymphoid organs and compromise both innate and adaptive immune functions. Malnutrition-related changes in intestinal microbiota contribute to growth faltering and dysregulated inflammation and immune function. Although substantial progress has been made in understanding the malnutrition-infection synergism, critical gaps in our understanding remain. We highlight the need for mechanistic studies that can lead to targeted interventions to improve host defense and reduce the morbidity and mortality of infectious diseases in this vulnerable population. Copyright © 2017 American Society for Microbiology.

  2. An observational study of defensible space in the neighbourhood park

    Science.gov (United States)

    Marzukhi, M. A.; Afiq, M. A.; Zaki, S. Ahmad; Ling, O. H. L.

    2018-02-01

    The planning of neighborhood park is important to provide space for interaction, leisure, and recreation among residents in any neighbourhood area. However, on an almost daily basis, newspapers report inappropriate incidents such as snatch theft, robbery and street attack that occurred in the neighborhood park. These cases reflect the significance of physical planning and design of neighborhood park that directly affect the safety and comfort of the users. Thus, this study attempts to engage with the defensible space concept in ensuring the security elements be applied in the planning of the recreational area. This study adopts a qualitative method form of research that is retrofitted to an observational study. The observational study is significant for revealing the condition of a neighbourhood park in the ‘real-world,’ in which direct observation is conducted on Taman Tasik Puchong Perdana. The observer focused on four elements or variables of defensible space concept including the provision of facilities in the neighborhood park, territoriality, surveillance, image and milieu. The findings revealed that the planning of Taman Tasik Puchong Perdana does not deliberate the defensible space elements, which may contribute to the crime activities in the park. In these circumstances, the planning of neighbourhood park needs to include proposals for the implementation of defensible space in response to the challenges underpinned by crime problems. Besides, the awareness among the residents needs to be emphasized with the support from local authorities and other organizations to manage and sustain the safety environment in the neighborhood park.

  3. Statutory Restrictions on the Position of Secretary of Defense: Issues for Congress

    Science.gov (United States)

    2017-01-05

    Military Policy, Post-War Military Policy, H. Rept. 1765, 78th Congress, 2nd Session. 25 Roger R. Trask and Alfred Goldberg , The Department of Defense 1947...Although the United States has utilized a variation of Truman’s proposed system of military governance for the past 60 years, there was, at the time...Feickert, CRS Specialist in Military Ground Forces. 33 Roger R. Trask and Alfred Goldberg , The Department of Defense 1947-1997: Organization and

  4. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  5. Plant STAND P-loop NTPases: a current perspective of genome distribution, evolution, and function : Plant STAND P-loop NTPases: genomic organization, evolution, and molecular mechanism models contribute broadly to plant pathogen defense.

    Science.gov (United States)

    Arya, Preeti; Acharya, Vishal

    2018-02-01

    STAND P-loop NTPase is the common weapon used by plant and other organisms from all three kingdoms of life to defend themselves against pathogen invasion. The purpose of this study is to review comprehensively the latest finding of plant STAND P-loop NTPase related to their genomic distribution, evolution, and their mechanism of action. Earlier, the plant STAND P-loop NTPase known to be comprised of only NBS-LRRs/AP-ATPase/NB-ARC ATPase. However, recent finding suggests that genome of early green plants comprised of two types of STAND P-loop NTPases: (1) mammalian NACHT NTPases and (2) NBS-LRRs. Moreover, YchF (unconventional G protein and members of P-loop NTPase) subfamily has been reported to be exceptionally involved in biotic stress (in case of Oryza sativa), thereby a novel member of STAND P-loop NTPase in green plants. The lineage-specific expansion and genome duplication events are responsible for abundance of plant STAND P-loop NTPases; where "moderate tandem and low segmental duplication" trajectory followed in majority of plant species with few exception (equal contribution of tandem and segmental duplication). Since the past decades, systematic research is being investigated into NBS-LRR function supported the direct recognition of pathogen or pathogen effectors by the latest models proposed via 'integrated decoy' or 'sensor domains' model. Here, we integrate the recently published findings together with the previous literature on the genomic distribution, evolution, and distinct models proposed for functional molecular mechanism of plant STAND P-loop NTPases.

  6. Planning a transportation system for US Defense Transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-05-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans. 9 figures, 1 table

  7. Planning a transportation system for US defense transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-01-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans

  8. Systems Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces (Concepts de systemes pour la defense aerienne integree de forces internationales mobiles d'intervention en situation de crise)

    National Research Council Canada - National Science Library

    2001-01-01

    The meeting proceedings from this symposium on System Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces was organized and sponsored by the Systems Concepts and Integration (SCI...

  9. Defense enzyme responses in dormant wild oat and wheat caryopses challenged with a seed decay pathogen

    Science.gov (United States)

    Seed dormancy and resistance to seed decay organisms are fundamental ecological strategies for weed seed persistence in the weed seed-bank. Seeds have well-established physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores....

  10. 75 FR 81915 - Defense Federal Acquisition Regulation Supplement; Foreign Participation in Acquisitions in...

    Science.gov (United States)

    2010-12-29

    ... prescriptions. Amends 225.1101(6)(i) to reference the World Trade Organization (WTO) Government Procurement... Subjects in 48 CFR Parts 225 and 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition... paragraph (c)(iii) to read as follows: 225.403 World Trade Organization Government Procurement Agreement and...

  11. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  12. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  13. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  14. INSTITUTIONAL BASIS OF MANAGEMENT AND EVALUATION OF UKRAINIAN DEFENSE LANDS

    Directory of Open Access Journals (Sweden)

    Garazhа Y.P

    2017-02-01

    estate. Military depots with fuel for rockets and other types of substances, military training grounds are dangerous both for people and for the ecological situation of the environment. If in the future they will not be used for their intended purpose, they should be brought to its original state. This land is advisable to assign a recovery mode, which provides clearing from dangerous objects and substances. After these steps, you can change their intended purpose. These funds come from the alienation of the State budget exclusively for defense purposes. Land alienated at land auctions. Contractor of land sales is determined on a competitive basis. He receives from the CMU authority to the exclusion of military property. He must have a license to conduct land auctions. He must conclude the two treaties: the first - with the organizer about their carrying out, and the second - with the Ministry of Defence (in terms of the implementation of real military equipment of objects. Lot consists of a land plot together with the objects located on it immovable military property.

  15. 75 FR 66680 - Defense Federal Acquisition Regulation Supplement; Trade Agreements-New Thresholds (DFARS 2009-D040)

    Science.gov (United States)

    2010-10-29

    ... Trade Organization Government Procurement Agreement and the Free Trade Agreements, as determined by the... of Subjects in 48 CFR Part 225 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition...

  16. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  17. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  18. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  19. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  20. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  1. 32 CFR 37.1315 - Nonprofit organization.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Nonprofit organization. 37.1315 Section 37.1315... organization. (a) Any corporation, trust, association, cooperative or other organization that: (1) Is operated... of the organization. (b) The term includes any nonprofit institution of higher education or nonprofit...

  2. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  3. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  4. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  5. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  6. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  7. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  8. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  9. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  10. Financial Reporting for Other Defense Organizations at the Defense Agency Financial Services Accounting Office

    National Research Council Canada - National Science Library

    2001-01-01

    .... We performed the audit in response to the Chief Financial Officers Act of 1990, as amended by the Federal Financial Management Act of 1994, which requires DoD and other Government agencies to prepare...

  11. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  12. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  13. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  14. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  15. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  16. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  17. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  18. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  19. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  20. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  1. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  2. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  3. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  4. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  5. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  6. 32 CFR Appendix C to Part 77 - DD Form 2581-1, Public and Community Service Organization Validation

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2581-1, Public and Community Service Organization Validation C Appendix C to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY..., App. C Appendix C to Part 77—DD Form 2581-1, Public and Community Service Organization Validation...

  7. Roadmap for an EArth Defense Initiative (READI)

    Science.gov (United States)

    Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.

    2015-12-01

    During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.

  8. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  9. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  10. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  11. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  12. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  13. A Management Case Analysis of the Department of Defense Contractor Risk Assessment Guide Program

    Science.gov (United States)

    1990-12-01

    ORGANIZATION ......... 17 1. Past Government Organization Problems... 17 2. Current Government Organization ......... 17 3. The Contractor’s Organizatin ...Program and urged CODSIA to take a leadership role in encouraging its members to participate. The DCAA [Ref ll:p. 45] informed defense contractors in...conferences, and through the leadership of officials including the Under Secretary of the Navy for Acquisition, DOD Comptroller General, DOD Inspector General

  14. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  15. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  18. Developing an institutional strategy for transporting defense transuranic waste materials

    International Nuclear Information System (INIS)

    Guerrero, J.V.; Kresny, H.S.

    1986-01-01

    In late 1988, the US Department of Energy (DOE) expects to begin emplacing transuranic waste materials in the Waste Isolation Pilot Plant (WIPP), an R and D facility to demonstrate the safe disposal of radioactive wastes resulting from defense program activities. Transuranic wastes are production-related materials, e.g., clothes, rags, tools, and similar items. These materials are contaminated with alpha-emitting transuranium radionuclides with half-lives of > 20 yr and concentrations > 100 nCi/g. Much of the institutional groundwork has been done with local communities and the State of New Mexico on the siting and construction of the facility. A key to the success of the emplacement demonstration, however, will be a qualified transportation system together with institutional acceptance of the proposed shipments. The DOE's Defense Transuranic Waste Program, and its contractors, has lead responsibility for achieving this goal. The Joint Integration Office (JIO) of the DOE, located in Albuquerque, New Mexico, is taking the lead in implementing an integrated strategy for assessing nationwide institutional concerns over transportation of defense transuranic wastes and in developing ways to resolve or mitigate these concerns. Parallel prototype programs are under way to introduce both the new packaging systems and the institutional strategy to interested publics and organizations

  19. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  20. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  1. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  2. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  3. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  4. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  5. Revisiting the Concept and Implementation of Defense-in-Depth

    International Nuclear Information System (INIS)

    Choi, Youngsung

    2013-01-01

    The subsequent tsunami, with its maximum wave height greater than the design basis, invalidated all layers of the Fukushima NPP. This raises the question on which of the philosophy or the implementation of DID fell short at Fukushima. This paper suggests several complements necessary to the concept of DID and new application practice in a wide variety of safety related objectives/areas/events. Since its conception, DID appears to have been successfully applied to the design and operation but less to the site, external events, resource requirements, the unexpected impacts of organization, etc. Thus, the horizontal as well as vertical application of DID is suggested. Here, the latter application means repeated questions of 'What if this fails?' and the former one means the application of DID to all the applicable objectives, which can be a real defense-in-width. It is widely accepted that defense-in-depth (DID) has been the core of safety philosophy in nuclear safety regulation. Its concept has been developed and refined over many years to go beyond physical barriers and design practices. The historical development of the concept led to a general structure of four physical barriers and five successive levels of defense. The accident at the Fukushima nuclear power plant (NPP) showed that multiple levels of defense could fail at the same time, demonstrated how these could work and how some were challenged, and gave the chance of the concept and implementation being improved. This paper examines the traditional concept and implementation strategies of DID, identifies some weaknesses in that, and suggest some complements and new approach to improving the application of DID

  6. Militias: Exploring Alternative Force Structures for National Defense

    Science.gov (United States)

    2014-06-01

    development in the art of warfare and 15 Mario A. Fumerton, “Rondas Campesinas in the Peruvian Civil War: Peasant Self-defense Organizations in...tr ai ni ng N at io na l l ev el su pp or t N at io na l d riv en id eo lo gy Pr e- ex is tin g ci vi lia n sk ill s Primary category...national framework providing guidance for the militia groups to act. This variable varies within and across cases, and will be discussed further

  7. Developing the strategic plan for pollution prevention in defense programs

    International Nuclear Information System (INIS)

    Marchetti, John A.; Betschart, James F.; Suffern, J. Samuel

    1992-01-01

    In order to provide effective leadership and to ensure a consistent pollution prevention effort in all of its production facilities and laboratories, Defense Programs (DP) Headquarters, in close cooperation with the Field, has developed a strategic plan for its Pollution Prevention Program. The strategic plan is built upon the history of waste minimization, waste reduction, and pollution prevention activity to date, and articulates both long- and short-term strategies to ensure program initiation, growth, and stability. The organization of the program, including Headquarters staffing and linkages to the Geld, is described. Life-cycle analysis of program barriers and bottlenecks, along with associated initiatives and action plans are discussed. (author)

  8. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  9. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  10. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  11. Predators shape distribution and promote diversification of morphological defenses in Leucorrhinia , Odonata

    Science.gov (United States)

    Petrin, Zlatko; Schilling, Emily Gaenzle; Loftin, Cyndy; Johansson, Frank

    2010-01-01

    Predators strongly influence species assemblages and shape morphological defenses of prey. Interestingly, adaptations that constitute effective defenses against one type of predator may render the prey susceptible to other types of predators. Hence, prey may evolve different strategies to escape predation, which may facilitate adaptive radiation of prey organisms. Larvae of different species in the dragonfly genus Leucorrhinia have various morphological defenses. We studied the distribution of these larvae in relation to the presence of predatory fish. In addition, we examined the variation in morphological defenses within species with respect to the occurrence of fish. We found that well-defended species, those with more and longer spines, were more closely associated with habitats inhabited by predatory fish and that species with weakly developed morphological defenses were more abundant in habitats without fish. The species predominantly connected to lakes with or without fish, respectively, were not restricted to a single clade in the phylogeny of the genus. Our data is suggestive of phenotypic plasticity in morphological defense in three of the studied species since these species showed longer spines in lakes with fish. We suggest that adaptive phenotypic plasticity may have broadened the range of habitats accessible to Leucorrhinia. It may have facilitated colonization of new habitats with different types of predators, and ultimately, speciation through adaptive radiation.

  12. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  13. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  14. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  15. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  16. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  17. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  18. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  19. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  20. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  1. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  2. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  3. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  4. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  5. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  6. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  7. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  8. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  9. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  10. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  11. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  12. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  13. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  14. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  16. 78 FR 18876 - Defense Federal Acquisition Regulation Supplement: United States-Korea Free Trade Agreement...

    Science.gov (United States)

    2013-03-28

    ... Agreement. The Republic of Korea is already party to the World Trade Organization Government Procurement...) Agreement on Government Procurement (GPA). Although the rule now opens up Government procurement to the... 48 CFR Parts 225 and 252 Government procurement. Kortnee Stewart, Editor, Defense Acquisition...

  17. The Defense Committees of Sleepy Lagoon: A Convergent Struggle against Fascism, 1942-1944

    Science.gov (United States)

    Barajas, Frank P.

    2006-01-01

    The Sleepy Lagoon Defense Committee originated as an ad hoc committee and evolved to a broad-based movement for legal justice on behalf of seventeen youth convicted of murder and assault charges in connection with the Sleepy Lagoon case in Los Angeles in January 1943. This essay chronicles the multidimensional organizing to shift public opinion in…

  18. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  19. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  20. Marine biofilm bacteria evade eukaryotic predation by targeted chemical defense.

    Directory of Open Access Journals (Sweden)

    Carsten Matz

    Full Text Available Many plants and animals are defended from predation or herbivory by inhibitory secondary metabolites, which in the marine environment are very common among sessile organisms. Among bacteria, where there is the greatest metabolic potential, little is known about chemical defenses against bacterivorous consumers. An emerging hypothesis is that sessile bacterial communities organized as biofilms serve as bacterial refuge from predation. By testing growth and survival of two common bacterivorous nanoflagellates, we find evidence that chemically mediated resistance against protozoan predators is common among biofilm populations in a diverse set of marine bacteria. Using bioassay-guided chemical and genetic analysis, we identified one of the most effective antiprotozoal compounds as violacein, an alkaloid that we demonstrate is produced predominately within biofilm cells. Nanomolar concentrations of violacein inhibit protozoan feeding by inducing a conserved eukaryotic cell death program. Such biofilm-specific chemical defenses could contribute to the successful persistence of biofilm bacteria in various environments and provide the ecological and evolutionary context for a number of eukaryote-targeting bacterial metabolites.

  1. Poblaciones expuestas a agrotóxicos: autoorganización ciudadana en la defensa de la vida y la salud, Ciudad de Córdoba, Argentina Populations exposed to agrotoxics: citizens' self-organization in the defense of life and health, Córdoba City, Argentina

    Directory of Open Access Journals (Sweden)

    Mauricio Berger

    2010-01-01

    reclamos de justicia para sus demandas.This paper presents a preview of our doctoral research work, based in the political action of the groups selfdenominated "Madres de Barrio Ituzaingó Anexo" in the city of Córdoba, Argentina. Since late 2001, the members of this group started fighting for life, health and environment, in the context of an environmental problem that produces over 200 illnesses and deaths in a population of 5,000 habitants in the neigborghood, mainly caused by fumigations with agrotoxics in the soybean fields adjacent to the houses. The modes of self-organization displayed by "las Madres" against the infringement of their rights plus the inefficiency and also abandonment of the State in the protection of the ones affected by the pollution, made this citizenship practice an example to think about the struggle for rights. This paper is divided into three sections. First, we present the methodological and conceptual elections that frame our reflections: the contributions of pragmatism (Dewey and Joas, the narrative turn (Ricoeur and contemporary discussions in biopolitics (Agamben, Hardt y Negri, Virno. Second, we join the fight of the Madres de Barrio Ituzaingó Anexo and their contexts. Third, we describe some scenes of the fight of the Madres against the fumigation with agrotoxics, and to that purpose we introduce three notions to think the citizen self-organization: body, experience, narrative. These will be considered key aspects of the political practice in which the sense of politics as action is played, as the power of making and speaking of the citizenship that acts in self-defense. Through the act of their affective, cognitive and linguistic capacities, these citizens create learnings, practical wisdoms and achievements in the defense of their rights, but they are not free from problems and obstacles in their claim for justice.

  2. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  3. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  4. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  5. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  6. Department of Defense Software Factbook

    Science.gov (United States)

    2017-07-07

    Domain 107 Figure 72: Project Distribution by Operating Environment 108 Figure 73: Program Distribution by Language Family 109 Figure 74: Reported...across system domains, development organizations, and languages , this data summary is most useful to high- level decision makers. The data can be used...reports are provided at the project level or subsystem level, not at the DoD Acquisition Program level. The data points analyzed in this report are

  7. Irans Foreign and Defense Policies

    Science.gov (United States)

    2016-12-21

    buses, restaurants , and other civilian targets inside Israel. However, in 2012, their differing positions on the ongoing Syria conflict caused a rift...Uzbekistan (IMU).104 That group, which is active in Afghanistan, in mid-2015, declared its loyalty to the Islamic State organization.105 Almost all...natural gas customer . Perhaps in an attempt to diversify gas export routes, President Gurbanguly Berdymukhamedov signaled in 2007 that Turkmenistan

  8. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  9. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  10. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  11. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  12. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  13. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  14. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  15. 32 CFR 395.3 - Organization and management.

    Science.gov (United States)

    2010-07-01

    ...) ORGANIZATIONAL CHARTERS DEFENSE LEGAL SERVICES AGENCY § 395.3 Organization and management. (a) The DLSA is established as a separate agency of the Department of Defense under the direction, authority, and control of... subordinate organizational elements as are established by the Director within resources assigned by the...

  16. The pathogen-actin connection: A platform for defense signaling in plants

    Energy Technology Data Exchange (ETDEWEB)

    Day, B; Henty, Jessica L; Porter, K J; Staiger, Chris J

    2011-09-08

    The cytoskeleton, a dynamic network of cytoplasmic polymers, plays a central role in numerous fundamental processes, such as development, reproduction, and cellular responses to biotic and abiotic stimuli. As a platform for innate immune responses in mammalian cells, the actin cytoskeleton is a central component in the organization and activation of host defenses, including signaling and cellular repair. In plants, our understanding of the genetic and biochemical responses in both pathogen and host that are required for virulence and resistance has grown enormously. Additional advances in live-cell imaging of cytoskeletal dynamics have markedly altered our view of actin turnover in plants. In this review, we outline current knowledge of host resistance following pathogen perception, both in terms of the genetic interactions that mediate defense signaling, as well as the biochemical and cellular processes that are required for defense signaling.

  17. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  18. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  19. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  20. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  1. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  2. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  3. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  4. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  5. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  6. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  7. Studies on defense mechanism against xenobiotics in rats, using gold as a model

    International Nuclear Information System (INIS)

    Sugawa-Katayama, Yohko; Kojima, Akiko; Nakano, Yukihiro.

    1994-01-01

    For self-protection, a living organism has a special mechanism to prevent xenobiotics from being absorbed through the gastrointestinal tract. This led to the present study on the defense mechanism of the gastrointestinal tract where foods are digested and absorbed. The results obtained from this study showed that 1) starvation caused an insufficiency of the defense mechanism against xenobiotics in jejunal absorptive cells and Kupffer cells, 2) after refeeding diets, a reparative process occurred at the damaged cell sites, resulting in recovery of the defense mechanism against xenobiotics, and 3) a 5% fat diet seemed to be the best fat level for recovery of the defense mechanism against xenobiotics. In the nutritional point of view, the 5% fat diet is equivalent to 0.11 in fat energy ratio (fat energy/total energy of the diet). These data suggest that a diet with a much lower fat energy (equivalent to 0.11) can give a good effect on recovery of the defense mechanism against xenobiotics in the gastrointestinal tract and the liver. (author)

  8. Changes in the glucosinolate-myrosinase defense system in Brassica juncea cotyledons during seedling development.

    Science.gov (United States)

    Wallace, S K; Eigenbrode, Sanford D

    2002-02-01

    Optimal defense theory (ODT) predicts that plant defenses will be allocated to plant organs and tissues in proportion to their relative fitness values and susceptibilities to attack. This study was designed to test ODT predictions on the myrosinase-glucosinolate defense system in Brassica juncea by examining the relationships between the fitness value of B. juncea cotyledons and the levels and effectiveness of cotyledon defenses. Specifically, we estimated fitness value of cotyledons during plant development by measuring plant growth and seed production after cotyledon damage or removal at successive seedling ages. Cotyledon removal within five days of emergence had a significant impact on growth and seed production, but cotyledon removal at later stages did not. Consistent with ODT, glucosinolate and myrosinase levels in cotyledons also declined with seedling age, as did relative defenses against a generalist herbivore, Spodoptera eridania, as estimated by bioassay. Declines in glucosinolates were as predicted by a passive, allometric dilution model based on cotyledon expansion. Declines in myrosinase activity were significantly more gradual than predicted by allometric dilution, suggesting active retention of myrosinase activity as young cotyledons expand.

  9. Strategic variation in mobbing as a front line of defense against brood parasitism.

    Science.gov (United States)

    Welbergen, Justin A; Davies, Nicholas B

    2009-02-10

    Coevolutionary arms races, where adaptations in one party select for counter-adaptations in another and vice versa, are fundamental to interactions between organisms and their predators, pathogens, and parasites [1]. Avian brood parasites and their hosts have emerged as model systems for studying such reciprocal coevolutionary processes [2, 3]. For example, hosts have evolved changes in egg appearance and rejection of foreign eggs in response to brood parasitism from cuckoos, and cuckoos have evolved host-egg mimicry as a counter-response [4-6]. However, the host's front line of defense is protecting the nest from being parasitized in the first place [7-10], yet little is known about the effectiveness of nest defense as an antiparasite adaptation, and its coevolutionary significance remains poorly understood [10]. Here we show first that mobbing of common cuckoos Cuculus canorus by reed warblers Acrocephalus scirpaceus is an effective defense against parasitism. Second, mobbing of cuckoos is a phenotypically plastic trait that is modified strategically according to local parasitism risk. This supports the view that hosts use a "defense in-depth strategy," with successive flexible lines of defense that coevolve with corresponding offensive lines of the parasite. This highlights the need for more holistic research into the coevolutionary consequences when multiple adaptations and counter-adaptations evolve in concert [11].

  10. Defense Waste Processing Facility Recycle Stream Evaporation

    International Nuclear Information System (INIS)

    STONE, MICHAEL

    2006-01-01

    The Defense Waste Processing Facility (DWPF) at the Savannah River Site (SRS) stabilizes high level radioactive waste (HLW) by vitrification of the waste slurries. DWPF currently produces approximately five gallons of dilute recycle for each gallon of waste vitrified. This recycle stream is currently sent to the HLW tank farm at SRS where it is processed through the HLW evaporators with the concentrate eventually sent back to the DWPF for stabilization. Limitations of the HLW evaporators and storage space constraints in the tank farm have the potential to impact the operation of the DWPF and could limit the rate that HLW is stabilized. After an evaluation of various alternatives, installation of a dedicated evaporator for the DWPF recycle stream was selected for further evaluation. The recycle stream consists primarily of process condensates from the pretreatment and vitrification processes. Other recycle streams consist of process samples, sample line flushes, sump flushes, and cleaning solutions from the decontamination and filter dissolution processes. The condensate from the vitrification process contains some species, such as sulfate, that are not appreciably volatile at low temperature and could accumulate in the system if 100% of the evaporator concentrate was returned to DWPF. These species are currently removed as required by solids washing in the tank farm. The cleaning solutions are much higher in solids content than the other streams and are generated 5-6 times per year. The proposed evaporator would be required to concentrate the recycle stream by a factor of 30 to allow the concentrate to be recycled directly to the DWPF process, with a purge stream sent to the tank farm as required to prevent buildup of sulfate and similar species in the process. The overheads are required to meet stringent constraints to allow the condensate to be sent directly to an effluent treatment plant. The proposed evaporator would nearly de-couple the DWPF process from the

  11. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  12. Trichoderma harzianum enhances tomato indirect defense against aphids.

    Science.gov (United States)

    Coppola, Mariangela; Cascone, Pasquale; Chiusano, Maria Luisa; Colantuono, Chiara; Lorito, Matteo; Pennacchio, Francesco; Rao, Rosa; Woo, Sheridan Lois; Guerrieri, Emilio; Digilio, Maria Cristina

    2017-12-01

    Many fungal root symbionts of the genus Trichoderma are well-known for their beneficial effects on agronomic performance and protection against plant pathogens; moreover, they may enhance protection from insect pests, by triggering plant resistance mechanisms. Defense barriers against insects are induced by the activation of metabolic pathways involved in the production of defense-related plant compounds, either directly active against herbivore insects, or exerting an indirect effect, by increasing the attraction of herbivore natural enemies. In a model system composed of the tomato plant, the aphid Macrosiphum euphorbiae and the parasitoid Aphidius ervi, plant metabolic changes induced by Trichoderma harzianum and their effects on higher trophic levels have been assessed. T. harzianum T22 treatments induce a primed state that upon aphid attacks leads to an increased attraction of aphid parasitoids, mediated by the enhanced production of volatile organic compounds (VOCs) that are known to induce Aphidius ervi flight. Transcriptome sequencing of T22-treated plants infested by aphids showed a remarkable upregulation of genes involved in terpenoids biosynthesis and salicylic acid pathway, which are consistent with the observed flight response of A. ervi and the VOC bouquet profile underlying this behavioral response. © 2017 Institute of Zoology, Chinese Academy of Sciences.

  13. TOPAZ II Anti-Criticality Device Rapid Prototype

    Science.gov (United States)

    Campbell, Donald R.; Otting, William D.

    1994-07-01

    The Ballistic Missile Defense Organization (BMDO) has been working on a Nuclear Electric Propulsion Space Test Project (NEPSTP) using an existing Russian Topaz II reactor system to power the NEPSTP satellite. Safety investigations have shown that it will be possible to safely launch the Topaz II system in the United States with some modification to preclude water flooded criticality. A ``fuel-out'' water subcriticality concept was selected by the Los Alamos National Laboratory (LANL) as the baseline concept. A fuel-out anti-criticality device (ACD) conceptual design was developed by Rockwell. The concept functions to hold the fuel from the four centermost thermionic fuel elements (TFEs) outside the reactor during launch and reliably inserts the fuel into the reactor once the operational orbit is achieved. A four-tenths scale ACD rapid prototype model, fabricated from the CATIA solids design model, clearly shows in three dimensions the relative size and spatial relationship of the ACD components.

  14. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  15. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  16. Excessive Profits of German Defense Contractors

    Science.gov (United States)

    2014-09-01

    its business unit Thyssen Krupp Marine Systems, is a German defense contractor. (2) Tognom AG Tognum AG owned the MTU Friedrichshafen GmbH before... Friedrichshafen provided engines for many ships of the German Navy and for German battle tanks, such as the Leopard I and Leopard II. MTU refers to the

  17. The Transferability and Retraining of Defense Engineers.

    Science.gov (United States)

    Rittenhouse, Carl H.

    This study was undertaken to describe any special barriers to the transfer of engineers from defense to commercial work, and to evaluate retraining and reorientation techniques that might help ease the transfer. Interviews and questionnaires were used to obtain data from about 2,100 engineers and 100 managers in 14 industries. Characteristics,…

  18. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  19. Defense.gov Special Report: Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  20. Under Secretary of Defense (Comptroller) > Budget

    Science.gov (United States)

    functionalStatements OUSD(C) History FMR Budget Materials Budget Execution Financial Management Improving Financial Performance Reports Regulations Press Release | Budget Briefing | Transcripts: David L. Norquist, Under PDF document. Click on Excel icon for Excel document Overview - FY2019 Defense Budget Performance

  1. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  2. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  3. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  4. Department of Defense Education Activity. An Overview.

    Science.gov (United States)

    US Department of Defense, 2004

    2004-01-01

    DoDEA operates 223 public schools in 16 districts located in seven states, Puerto Rico, Guam, and 13 foreign countries to serve the children of military service members and Department of Defense civilian employees. Approximately 104,935 students are enrolled in DoDEA schools, with approximately 73,200 students in the DoDDS system, and…

  5. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  6. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Innovation in the Defense Acquisition Enterprise

    Science.gov (United States)

    2015-12-01

    uni- versities in the fields of innovation and entrepreneurship . Many books and articles have been written on innovation, perhaps none more well...partners has been the possible loss of freedom to make their own IR&D invest- ment decisions. That was never my intent . I once ran a major defense

  8. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  9. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  10. Forming the Research Component of the U.S. Defense Budget Policy

    Directory of Open Access Journals (Sweden)

    Alexandr V. Balyshev

    2015-01-01

    Full Text Available The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. The article offers specific cases to illustrate the role of key players of the U.S. budgetary process, the U.S. President, Congress, Department of Defense, and their relations with the scientific community. Spending in this area is organized as a three-level structure, which includes development of new weapons systems, creation of military platforms and systemic integration of the armed forces. One of the most noteworthy participants on the weapons development level is the Defense advanced research projects agency (DARPA, which provides support for R&D projects able to facilitate technological breakthroughs and provide results applicable by the armed forces. The emphasis of the article is on the participation of the private sector on all levels of the defense spending and especially in the systemic integration. At this level even formulating the request becomes a highly challenging task, which demands involvement of the most highly qualified specialists and organizations. The authors analyze the advantages and disadvantages of the wide participation of commercial enterprises and provide cases illustrating possible conflicts between government and private actors and ways of their resolution.

  11. Plant neighbor identity influences plant biochemistry and physiology related to defense.

    Science.gov (United States)

    Broz, Amanda K; Broeckling, Corey D; De-la-Peña, Clelia; Lewis, Matthew R; Greene, Erick; Callaway, Ragan M; Sumner, Lloyd W; Vivanco, Jorge M

    2010-06-17

    Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa) or heterospecific (Festuca idahoensis) plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  12. Plant neighbor identity influences plant biochemistry and physiology related to defense

    Directory of Open Access Journals (Sweden)

    Callaway Ragan M

    2010-06-01

    Full Text Available Abstract Background Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. Results In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa or heterospecific (Festuca idahoensis plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Conclusions Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  13. Neutron bomb and European defense

    Energy Technology Data Exchange (ETDEWEB)

    Sweet, W.

    1980-08-15

    France's development of the controversial neutron bomb is in line with the US goal of flexible response to a Soviet threat in Europe. US neutron bomb production is on a standby basis pending agreement among the North Atlantic Treaty Organization (NATO) members for deployment. Controversy over the bomb centers on its anti-personnel nature, which many see as immoral in comparison with weapons that primarily damage property. Opponents also see it as lowering the nuclear threshold and increasing the chance of nuclear war. Supporters view the bomb as a tactical weapon to be used on a limited scale as a last resort. If Germany's Chancellor Schmidt fails to negotiate a limit to European nuclear arms deployment with the Soviet Union, neutron-bomb production in the US and France will most likely proceed. The prospects for including European nuclear weapons in the Strategic Arms Limitation Talks (SALT) III are jeopardized by the Soviet invasion of Afghanistan and the failure of an early SALT II ratification. 17 references. (DCK)

  14. Neutron bomb and European defense

    International Nuclear Information System (INIS)

    Sweet, W.

    1980-01-01

    France's development of the controversial neutron bomb is in line with the US goal of flexible response to a Soviet threat in Europe. US neutron bomb production is on a standby basis pending agreement among the North Atlantic Treaty Organization (NATO) members for deployment. Controversy over the bomb centers on its anti-personnel nature, which many see as immoral in comparison with weapons that primarily damage property. Opponents also see it as lowering the nuclear threshold and increasing the chance of nuclear war. Supporters view the bomb as a tactical weapon to be used on a limited scale as a last resort. If Germany's Chancellor Schmidt fails to negotiate a limit to European nuclear arms deployment with the Soviet Union, neutron-bomb production in the US and France will most likely proceed. The prospects for including European nuclear weapons in the Strategic Arms Limitation Talks (SALT) III are jeopardized by the Soviet invasion of Afghanistan and the failure of an early SALT II ratification. 17 references

  15. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  16. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  17. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  18. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  19. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  20. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  1. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  2. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  3. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  4. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  5. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  6. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  7. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  8. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  9. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  10. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  11. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  12. DoD Organization for the 21st Century

    National Research Council Canada - National Science Library

    Maurmann, Steven

    1995-01-01

    ...) The apparent insatiable bureaucratic growth in both size and complexity of the Department, and (4) The inefficiency of the current Department of Defense organization to efficiently address missions of the future...

  13. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  14. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  15. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  16. Histones as mediators of host defense, inflammation and thrombosis.

    Science.gov (United States)

    Hoeksema, Marloes; van Eijk, Martin; Haagsman, Henk P; Hartshorn, Kevan L

    2016-01-01

    Histones are known for their ability to bind to and regulate expression of DNA. However, histones are also present in cytoplasm and extracellular fluids where they serve host defense functions and promote inflammatory responses. Histones are a major component of neutrophil extracellular traps that contribute to bacterial killing but also to inflammatory injury. Histones can act as antimicrobial peptides and directly kill bacteria, fungi, parasites and viruses, in vitro and in a variety of animal hosts. In addition, histones can trigger inflammatory responses in some cases acting through Toll-like receptors or inflammasome pathways. Extracellular histones mediate organ injury (lung, liver), sepsis physiology, thrombocytopenia and thrombin generation and some proteins can bind histones and reduce these potentially harmful effects.

  17. PERSPECTIVES ON INTEROPERABILITY INTEGRATION WITHIN NATO DEFENSE PLANNING PROCESS

    Directory of Open Access Journals (Sweden)

    Florian CIOCAN

    2011-01-01

    Full Text Available Interoperability is not a new area of effort at NATO level. In fact, interoperability and more specifi cally standardization, has been a key element of the Alliance’s approach to fi elding forces for decades. But as the security and operational environment has been in a continuous change, the need to face the new threats and the current involvement in challenging operations in Afghanistan and elsewhere alongside with the necessity to interoperate at lower and lower levels of command with an increasing number of nations, including non-NATO ISAF partners, NGOs, and other organizations, have made the task even more challenging. In this respect Interoperability Integration within NATO Defense Planning Process will facilitate the timely identifi cation, development and delivery of required forces and capabilities that are interoperable and adequately prepared, equipped, trained and supported to undertake the Alliance’s full spectrum of missions.

  18. The natural defense system and the normative self model [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2016-05-01

    Full Text Available Infectious agents are not the only agressors, and the immune system is not the sole defender of the organism. In an enlarged perspective, the ‘normative self model’ postulates that a ‘natural defense system’ protects man and other complex organisms against the environmental and internal hazards of life, including infections and cancers. It involves multiple error detection and correction mechanisms that confer robustness to the body at all levels of its organization. According to the model, the self relies on a set of physiological norms, and NONself (meaning : Non Obedient to the Norms of the self is anything ‘off-norms’. The natural defense system comprises a set of ‘civil defenses’ (to which all cells in organs and tissues contribute, and a ‘professional army ‘, made of a smaller set of mobile cells. Mobile and non mobile cells differ in their tuning abilities. Tuning extends the recognition capabilities of NONself by the mobile cells, which increase their defensive function. To prevent them to drift, which would compromise self/NONself discrimination, the more plastic mobile cells need to periodically refer to the more stable non mobile cells to keep within physiological standards.

  19. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  20. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  1. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  2. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  3. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  4. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  5. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  6. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  8. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  12. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  13. The journal of medical chemical, biological and radiological defense, an update

    International Nuclear Information System (INIS)

    Price, B. B. S.; Peitersen, L.E.

    2009-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense (www.JMedCBR.org) is a peer-reviewed scientific online journal focusing on the biology, chemistry, physiology, toxicology and treatment of exposure to threat agents. JMedCBR provides a central international forum for the publication of current research and development information on medical chemical, biological and radiological defense, as well as training, doctrine, and problems related to chemical, biological and radiological casualties. JMedCBR is sponsored by the US Defense Threat Reduction Agency (DTRA) Chem-Bio Technologies Directorate as part of its scientific outreach program in chemical and biological defense solutions for the Department of Defense. In addition to scientific and medical research, JMedCBR hosts an archive of related papers from authors in the field. Although organized into annual issues, articles are published on the web continuously. The complete JMedCBR is published electronically and is made available to the scientific community free of charge. JMedCBR is committed to providing its readers with quality scientific information and critical analyses. All submissions are peer-reviewed by an editorial board of recognized and respected international scientists who represent expertise in different aspects of medical chemical, biological and radiological defense. Contributions to JMedCBR must be original works of the author(s) and must not have been previously published or simultaneously submitted to other publications. The author(s) transfer the copyright of articles published in JMedCBR to the journal. A copyright transfer form must accompany each manuscript submission. For more information on submitting to JMedCBR, see the Authors' Guide, available at http://www.jmedcbr.org/authorGuide.html.(author)

  14. Organization within Organization Studies

    DEFF Research Database (Denmark)

    Lopdrup-Hjorth, Thomas

    This paper explores how prevalent contemporary problematizations of organizations coincide with a widespread assessment that Organization Studies (OS) has run out of steam. This impasse, the paper argues, is largely due to the emergence of an organization-phobia that has come to seize several...... strands of theorizing. By attending to the wide-ranging and far-reaching history of this organization-phobia, the paper argues that OS has become increasingly incapable of speaking about its core object. I show how organizations went from being conceptualized as entities of major importance to becoming...... credibility and legitimacy to begin with, the organization-phobia resulting from this history has been implicated in dismantling organizations, and in making OS progressively irrelevant to a wider public....

  15. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  16. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  17. Whole body exposure to low-dose γ-radiation enhances the antioxidant defense system

    International Nuclear Information System (INIS)

    Pathak, C.M.; Avti, P.K.; Khanduja, K.L.; Sharma, S.C.

    2008-01-01

    It is believed that the extent of cellular damage by low- radiation dose is proportional to the effects observed at high radiation dose as per the Linear-No-Threshold (LNT) hypothesis. However, this notion may not be true at low-dose radiation exposure in the living system. Recent evidence suggest that the living organisms do not respond to ionizing radiations in a linear manner in the low dose range 0.01-0.5Gy and rather restore the homeostasis both in vivo and in vitro by normal physiological mechanisms such as cellular and DNA repair processes, immune reactions, antioxidant defense, adaptive responses, activation of immune functions, stimulation of growth etc. In this study, we have attempted to find the critical radiation dose range and the post irradiation period during which the antioxidant defense systems in the lungs, liver and kidneys remain stimulated in these organs after whole body exposure of the animals to low-dose radiation

  18. A cognitive and economic decision theory for examining cyber defense strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Bier, Asmeret Brooke

    2014-01-01

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

  19. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  20. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna

    2016-01-01

    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  1. Defense waste processing facility startup progress report

    International Nuclear Information System (INIS)

    Iverson, D.C.; Elder, H.H.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing

  2. Defense Waste Processing Facility, Savannah River Plant

    International Nuclear Information System (INIS)

    After 10 years of research, development, and testing, the US Department of Energy is building a new facility which will prepare high-level radioactive waste for permanent disposal. The Defense Waste Processing Facility, known as the DWPF, will be the first production-scale facility of its kind in the United States. In the DWPF, high-level waste produced by defense activities at the Savannah River Plant will be processed into a solid form, borosilicate glass, suitable for permanent off-site geologic disposal. With construction beginning in the fall of 1983, the DWPT is scheduled to be operational in 1989. By 2005, the DWPF will have immobilized the backlog of high-level waste which has been accumulating in storage tanks at the Savannah River Plant since 1954. Canisters of the immobilized waste will then be ready for permanent disposal deep under the ground, safely isolated from the environment

  3. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  4. The Role of Big Five Personality Factors and Defense Mechanisms in Predicting Quality of Life in Sexually Dysfunctional Female Patients

    Directory of Open Access Journals (Sweden)

    S. salary

    2015-06-01

    Full Text Available Sexual dysfunction can lead to behavioral problems and reduction in a person's quality of life. In 50 % of patients with personality disorders, there is also sexual dysfunction. Psychoanalysis approach attributes the cause of sexual dysfunction to a kind of fundamental anxiety as well as the use of immature mechanisms in these patients. The purpose of this study was to investigate the role of big five personality traits and defensive mechanisms in predicting these patients' quality of life. Statistical sample of this research included 80 women attending sexual health and family clinics of Shahed University using accessible sampling during 2010 and 2011. These subjects were given the Neo Personality Inventory Traits, Defensive Mechanisms, and the World Health organization Quality of Life Questionnaires to answer. The findings showed that personality traits could predict the quality of life in woman with sexual dysfunction. Moreover, among those five personality traits, neuroticism (:./24 P=./04 and conscientiousness(:./31 P=./03 were able to predict the quality of life while predictability rate of both factors was 37% of variance on the whole (p=0/05. Based on regression analysis, there was a significant relationship between the quality of life and defensive mechanisms so that using more mature defensive mechanisms (:./37 P=./006 and immature defensive mechanisms (:-./31 P= ./02 could significantly predict quality of life (p=0/0001. Also, neurotic defensive mechanisms were not significant predictors of these women' quality of life. (;./04 P=./78.

  5. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  6. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  7. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  8. Assessment of Accelerated Acquisition of Defense Programs

    Science.gov (United States)

    2016-09-01

    Quadrennial Defense Review explicitly called for doubling production rates of ISR UAVs, including Global Hawk. By 2009, Global Hawks had logged over 25,000...Honeywell (Formerly AlliedSignal) turboprop engine, compared to the Predator’s 115 hp (86 kW) piston engine. The power increase allows the Reaper...on basic requirements subsequently translated into costs at least double initial estimates and years of schedule slippage. In other words a classic

  9. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  10. Strategic nuclear policy and ballistic missile defense

    International Nuclear Information System (INIS)

    1981-01-01

    The article explains the problems of the antirockets (ABM) as they were part of the presentation Salt I 1972. It is a translation from the English of a publication of the Foreign Affairs Research Institute in London. A topical analysis of the strategic nuclear policy of the two superpowers and their attitudes in the question of ballistic missile defense are given by means of two monographies. (orig./HSCH) [de

  11. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    OpenAIRE

    Oleksandr Yu. Burov

    2016-01-01

    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  12. Compatible Goals: Defense and Environmental Protection

    Science.gov (United States)

    1984-03-22

    Remedial Action Site. AD-P004 146 Treatment of Wastewater (Red Water ) Resulti g from TNT Trinitrotoluene) Purification. AD-P004 147 Location of Volatile... Availabilit C040e3 _Vafl" -,ior OEC 5 1984 Ths document has been appeoved Dist Spool.A distribution.Is unlimiedL..... .. . COMFATABLE GOALS : DEFENSE AND...surface water to the same good biological quality as the water entering the installation. 4. Conserve fossil fuel energy to the highest degree possi

  13. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  14. Is Soviet Defense Policy Becoming Civilianized?

    Science.gov (United States)

    1990-08-01

    Larionov, a consultant to the institute, both at RAND and in Moscow; and Drs. Alexei Arbatov and Aleksandr Savelyev and several of their colleagues during...Soviet defense industry resources to civilian use is presented in Arthur J. Alexander , Perestroika and Change in Soviet Weapons Acquisition, The RAND...1986, especially pp. 101-102. 17 18 the more prominent younger specialists like Alexei Arbatov, Andrei Kokoshin, and Aleksandr Savelyev have long been

  15. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  16. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  17. Acyclic Ketones in the Defensive Secretion of a “Daddy Longlegs” (Leiobunum vittatum)

    Science.gov (United States)

    Meinwald, J.; Kluge, A. F.; Carrel, J. E.; Eisner, T.

    1971-01-01

    The defensive secretion of the “daddy longlegs” Leiobunum vittatum was analyzed and found to contain the acyclic ketones 4-methylheptan-3-one and E-4,6-dimethyl-6-octen-3-one as its major organic components. Although 4-methylheptan-3-one has been found previously as an alarm substance in certain ant genera, the second component, whose structure is confirmed by synthesis, is new. PMID:5283937

  18. Acyclic ketones in the defensive secretion of a "daddy longlegs" (Leiobunum vittatum).

    Science.gov (United States)

    Meinwald, J; Kluge, A F; Carrel, J E; Eisner, T

    1971-07-01

    The defensive secretion of the "daddy longlegs" Leiobunum vittatum was analyzed and found to contain the acyclic ketones 4-methylheptan-3-one and E-4,6-dimethyl-6-octen-3-one as its major organic components. Although 4-methylheptan-3-one has been found previously as an alarm substance in certain ant genera, the second component, whose structure is confirmed by synthesis, is new.

  19. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    2014.13 We obtained documentary and testimonial evidence from senior officials in the Office of the Deputy Chief Management Officer to determine the...reviews. OSD Organizational Delayering Initiative This review of OSD-related organizations is intended to reduce layers of management and staff. As...Defense Program IGCA Inherently Governmental / Commercial Activities ODCMO Office of the Deputy Chief Management Officer OSD Office of the

  20. Defense AT and L Magazine. Volume 47, Number 2, March-April 2018

    Science.gov (United States)

    2018-03-01

    Corporation , can provide other acqui- sition organizations with valuable insight into how best to conduct LFT&E on their respective programs. LFT&E Lessons...Technology, Engineering, Test and Evaluation, Finance , Lo- gisticians and Contracting. In order to improve the survivability of our Department of Defense... corporate business strategy, a company typically will determine what it is good at and then use that core competency as a competitive ad- vantage to grow

  1. The Charitable Trust Model: An Alternative Approach For Department Of Defense Accounting

    Science.gov (United States)

    2016-12-01

    DEFENSE ACCOUNTING 5. FUNDING NUMBERS 6. AUTHOR (S) Gerald V. Weers Jr. 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School...prohibits the incurrence of costs until budget authority is provided; reversing the conditionality of the matching principle accounting logic. In summary...the Board did not believe applying depreciation accounting for these assets would contribute to measuring the cost of outputs produced, or to

  2. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  3. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  4. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  5. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  6. Iranian Ballistic Missile Threat and a Phased, Adaptive Approach for Missile Defense in Europe: Perceptions, Policies and Scenarios

    Science.gov (United States)

    2010-09-15

    vii ACRONYMS AA Aegis Ashore ABL Airborne Laser ABM Anti-Ballistic Missile ADCF Air Defense Command Frigates AEOI ...in September 2002 at the IAEA’s General Conference in Vienna, Iran’s Vice President and President of the Atomic Energy Organization of Iran ( AEOI

  7. The U.S. Arms Embargo of 1975-1978 and Its Effects on the Development of the Turkish Defense Industry

    Science.gov (United States)

    2014-09-01

    Turkish Defense Industry 15. NUMBER OF PAGES 93 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION...Organization CPI consumer price inflation DIEC Defense Industry Executive Committee DP Democrat Party EEC European Economic Community EOKA...sugar, and flour . With the return of men to their homes after World War I and the Independence War, Turkey experienced a dramatic increase in

  8. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  9. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  10. Reagan Defense Forum: The Third Offset Strategy

    Science.gov (United States)

    2015-11-07

    guided weapons as you do, and have a homefield advantage. How would you do that? And the LRRDPP really, really did a great job in looking at that...The second thing was the Defense Science Board summer study on autonomy . To a person, every single person on the summer study said, we can’t prove...it, but we believe we are at an inflection point at an artificial intelligence and autonomy . How might we use that as an advantage in an offset

  11. Defensive Jurisprudence and Productivity Goals: Jabuticaba Consumerist

    Directory of Open Access Journals (Sweden)

    Miguel Luiz Barros Barreto de Oliveira

    2016-10-01

    Full Text Available This paper analyzes the application of so-called procedural defensive jurisprudence that values exacerbated rationalization of the judiciary activities, preventing the processing of judicial review in the higher courts, and its consequences in consumeristas indemnity processes. It analyzes the pressure to which judges are subjected, especially because of the need to comply with productivity goals. The construction work suggests the misconception of these imposed judicial policies to decrease the procedural stock since that attack the problem on screen superficially and do not solve the basic question.

  12. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  13. Defense Waste Processing Facility prototypic analytical laboratory

    International Nuclear Information System (INIS)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-01-01

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R ampersand D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R ampersand D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy

  14. Biotech Business Lessons for Defense Acquisition

    Science.gov (United States)

    2016-01-01

    repudiates what func- tional personnel hold dear—that their hurdles are vital to some moral or ethical responsibility to protect or safeguard...94 Strategic Studies Quarterly ♦ Summer 2016 Biotech Business Lessons for Defense Acquisition Col David L. Peeler Jr., USAF Abstract The desire to...examples and lessons from private business sectors would serve DOD interests well. ✵ ✵ ✵ ✵ ✵ Acquisition reform! No other two words so stress or trouble

  15. Indian Defense Procurements: Advantage Russia or USA?

    Science.gov (United States)

    2015-02-17

    premiers of both the countries. The recent visit of President Obama saw Mr. Modi breaking the protocol to greet him with a bear hug on his arrival at New...between Russia and US. 56 Ritesh Srivastava, India caught between Russia and US. 57 Ankit Panda , “Pakistan Courts Both US and Russia on Defense...www.indiatvnews.com/business/india/-india-invites-japan-to-join-rs-50000-crore- submarine-project-17058.html (accessed 3 February 2015). Panda , Ankit. “Pakistan

  16. Defense meteorological satellite measurements of total ozone

    International Nuclear Information System (INIS)

    Lovill, J.E.; Ellis, J.S.; Luther, F.M.; Sullivan, R.J.; Weichel, R.L.

    1992-01-01

    A multichannel filter radiometer (MFR) on Defense Meteorological Satellites (DMS) that measured total ozone on a global-scale from March 1977 - February 1980 is described. The total ozone data measured by the MFR were compared with total ozone data taken by surfaced-based Dobson spectrophotometers. When comparisons were made for five months, the Dobson spectrophotometer measured 2-5% more total ozone than the MFR. Comparisons between the Dobson spectrophotometer and the MFR showed a reduced RMS difference as the comparisons were made at closer proximity. A Northern Hemisphere total ozone distribution obtained from MFR data is presented

  17. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  18. Parasitism by Cuscuta pentagona Attenuates Host Plant Defenses against Insect Herbivores1

    Science.gov (United States)

    Runyon, Justin B.; Mescher, Mark C.; De Moraes, Consuelo M.

    2008-01-01

    Considerable research has examined plant responses to concurrent attack by herbivores and pathogens, but the effects of attack by parasitic plants, another important class of plant-feeding organisms, on plant defenses against other enemies has not been explored. We investigated how attack by the parasitic plant Cuscuta pentagona impacted tomato (Solanum lycopersicum) defenses against the chewing insect beet armyworm (Spodoptera exigua; BAW). In response to insect feeding, C. pentagona-infested (parasitized) tomato plants produced only one-third of the antiherbivore phytohormone jasmonic acid (JA) produced by unparasitized plants. Similarly, parasitized tomato, in contrast to unparasitized plants, failed to emit herbivore-induced volatiles after 3 d of BAW feeding. Although parasitism impaired antiherbivore defenses, BAW growth was slower on parasitized tomato leaves. Vines of C. pentagona did not translocate JA from BAW-infested plants: amounts of JA in parasite vines grown on caterpillar-fed and control plants were similar. Parasitized plants generally contained more salicylic acid (SA), which can inhibit JA in some systems. Parasitized mutant (NahG) tomato plants deficient in SA produced more JA in response to insect feeding than parasitized wild-type plants, further suggesting cross talk between the SA and JA defense signaling pathways. However, JA induction by BAW was still reduced in parasitized compared to unparasitized NahG, implying that other factors must be involved. We found that parasitized plants were capable of producing induced volatiles when experimentally treated with JA, indicating that resource depletion by the parasite does not fully explain the observed attenuation of volatile response to herbivore feeding. Collectively, these findings show that parasitic plants can have important consequences for host plant defense against herbivores. PMID:18165323

  19. Parasitism by Cuscuta pentagona attenuates host plant defenses against insect herbivores.

    Science.gov (United States)

    Runyon, Justin B; Mescher, Mark C; De Moraes, Consuelo M

    2008-03-01

    Considerable research has examined plant responses to concurrent attack by herbivores and pathogens, but the effects of attack by parasitic plants, another important class of plant-feeding organisms, on plant defenses against other enemies has not been explored. We investigated how attack by the parasitic plant Cuscuta pentagona impacted tomato (Solanum lycopersicum) defenses against the chewing insect beet armyworm (Spodoptera exigua; BAW). In response to insect feeding, C. pentagona-infested (parasitized) tomato plants produced only one-third of the antiherbivore phytohormone jasmonic acid (JA) produced by unparasitized plants. Similarly, parasitized tomato, in contrast to unparasitized plants, failed to emit herbivore-induced volatiles after 3 d of BAW feeding. Although parasitism impaired antiherbivore defenses, BAW growth was slower on parasitized tomato leaves. Vines of C. pentagona did not translocate JA from BAW-infested plants: amounts of JA in parasite vines grown on caterpillar-fed and control plants were similar. Parasitized plants generally contained more salicylic acid (SA), which can inhibit JA in some systems. Parasitized mutant (NahG) tomato plants deficient in SA produced more JA in response to insect feeding than parasitized wild-type plants, further suggesting cross talk between the SA and JA defense signaling pathways. However, JA induction by BAW was still reduced in parasitized compared to unparasitized NahG, implying that other factors must be involved. We found that parasitized plants were capable of producing induced volatiles when experimentally treated with JA, indicating that resource depletion by the parasite does not fully explain the observed attenuation of volatile response to herbivore feeding. Collectively, these findings show that parasitic plants can have important consequences for host plant defense against herbivores.

  20. Synchronization of developmental processes and defense signaling by growth regulating transcription factors.

    Directory of Open Access Journals (Sweden)

    Jinyi Liu

    Full Text Available Growth regulating factors (GRFs are a conserved class of transcription factor in seed plants. GRFs are involved in various aspects of tissue differentiation and organ development. The implication of GRFs in biotic stress response has also been recently reported, suggesting a role of these transcription factors in coordinating the interaction between developmental processes and defense dynamics. However, the molecular mechanisms by which GRFs mediate the overlaps between defense signaling and developmental pathways are elusive. Here, we report large scale identification of putative target candidates of Arabidopsis GRF1 and GRF3 by comparing mRNA profiles of the grf1/grf2/grf3 triple mutant and those of the transgenic plants overexpressing miR396-resistant version of GRF1 or GRF3. We identified 1,098 and 600 genes as putative targets of GRF1 and GRF3, respectively. Functional classification of the potential target candidates revealed that GRF1 and GRF3 contribute to the regulation of various biological processes associated with defense response and disease resistance. GRF1 and GRF3 participate specifically in the regulation of defense-related transcription factors, cell-wall modifications, cytokinin biosynthesis and signaling, and secondary metabolites accumulation. GRF1 and GRF3 seem to fine-tune the crosstalk between miRNA signaling networks by regulating the expression of several miRNA target genes. In addition, our data suggest that GRF1 and GRF3 may function as negative regulators of gene expression through their association with other transcription factors. Collectively, our data provide new insights into how GRF1 and GRF3 might coordinate the interactions between defense signaling and plant growth and developmental pathways.

  1. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  2. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  3. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  4. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  5. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  6. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  7. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  8. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  9. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  10. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  11. The Primary Role of Fibrinogen-Related Proteins in Invertebrates Is Defense, Not Coagulation

    Science.gov (United States)

    Hanington, Patrick C.; Zhang, Si-Ming

    2010-01-01

    In vertebrates, the conversion of fibrinogen into fibrin is an essential process that underlies the establishment of the supporting protein framework required for coagulation. In invertebrates, fibrinogen-domain-containing proteins play a role in the defense response generated against pathogens; however, they do not function in coagulation, suggesting that this role has been recently acquired. Molecules containing fibrinogen motifs have been identified in numerous invertebrate organisms, and most of these molecules known to date have been linked to defense. Moreover, recent genome projects of invertebrate animals have revealed surprisingly high numbers of fibrinogen-like loci in their genomes, suggesting important and perhaps diverse functions of fibrinogen-like proteins in invertebrates. The ancestral role of molecules containing fibrinogen-related domains (FReDs) with immunity is the focus of this review, with emphasis on specific FReDs called fibrinogen-related proteins (FREPs) identified from the schistosome-transmitting mollusc Biomphalaria glabrata. Herein, we outline the range of invertebrate organisms FREPs can be found in, and detail the roles these molecules play in defense and protection against infection. PMID:21063081

  12. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  13. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  14. Department of Defense Facilities Energy Conservation Policies and Spending

    National Research Council Canada - National Science Library

    Andrews, Anthony

    2008-01-01

    .... This report reviews energy conservation legislation and Executive Orders that apply to the Department of Defense, directives and instructions to the military departments and agencies on implementing...

  15. Veiled Normalization: The Implications of Japanese Missile Defense

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    Japan's development of a missile defense system has been accompanied by the acquisition of potentially offensive military assets, an increased command and control capability, significant restructuring...

  16. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  17. Competition: A Means to Transform the Defense Industrial Base

    National Research Council Canada - National Science Library

    Hansen, Richard

    2003-01-01

    .... The defense acquisition process and its industrial base comprise a significant economic institution in need of transformation to ensure that research, development, and acquisition efforts remain...

  18. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  19. Accounting for Defense Logistics Agency Supply Management Receivables

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this part of the audit, we determined whether Defense Logistics Agency supply management receivables were accurately accounted for, classified, and reported in the Statement of Financial Position...

  20. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  1. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors endash the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. The report is necessarily based on a limited review of the defense production reactors. It does not address whether any of the reactors are ''safe,'' because such an analysis would involve a determination of acceptable risk endash a matter of obvious importance, but one that was beyond the purview of the committee. It also does not address whether the safety of the production reactors is comparable to that of commercial nuclear power stations, because even this narrower question extended beyond the charge to the committee and would have involved detailed analyses that the committee could not undertake

  2. Process arrangement options for Defense waste immobilization

    International Nuclear Information System (INIS)

    1980-02-01

    Current plans are to immobilize the SRP high-level liquid wastes in a high integrity form. Borosilicate glass was selected in 1977 as the reference waste form and a mjaor effort is currently underway to develop the required technology. A large new facility, referred to as the Defense Waste Processing Facility (DWPF) is being designed to carry out this mission, with project authorization targeted for 1982 and plant startup in 1989. However, a number of other process arrangements or manufacturing strategies, including staging the major elements of the project or using existing SRP facilities for some functions, have been suggested in lieu of building the reference DWPF. This study assesses these various options and compares them on a technical and cost basis with the DWPF. Eleven different manufacturing options for SRP defense waste solidification were examined in detail. These cases are: (1) vitrification of acid waste at current generation rate; (2) vitrification of current rate acid waste and caustic sludge; (3 and 4) vitrification of the sludge portion of neutralized waste; (5) decontamination of salt cake and storage of concentrated cesium and strontium for later immobilization; (6) processing waste in a facility with lower capacity than the DWPF; (7) processing waste in a combination of existing and new facilities; (8) waste immobilization in H Canyon; (9) vitrification of both sludge and salt; (10) DWPF with onsite storage; (11) deferred authorization of DWPF

  3. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  4. Comprehensive Thinking and Defense Analysis Transformation

    Science.gov (United States)

    2011-06-01

    that has taken two distinct forms: the biological evolution of cells , organs, animals and man; and the sociological evolution of groups...human systems learn and adapt as they deal with their Group Organization Community Societal Supranational Organism Organ Cell OOOOOOO oooooooo...better adapt on the fly, executing self synchronized movement towards a common goal. It requires stamina and endurance, in addition to multiple ball

  5. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  6. Plant lectins: the ties that bind in root symbiosis and plant defense.

    Science.gov (United States)

    De Hoff, Peter L; Brill, Laurence M; Hirsch, Ann M

    2009-07-01

    Lectins are a diverse group of carbohydrate-binding proteins that are found within and associated with organisms from all kingdoms of life. Several different classes of plant lectins serve a diverse array of functions. The most prominent of these include participation in plant defense against predators and pathogens and involvement in symbiotic interactions between host plants and symbiotic microbes, including mycorrhizal fungi and nitrogen-fixing rhizobia. Extensive biological, biochemical, and molecular studies have shed light on the functions of plant lectins, and a plethora of uncharacterized lectin genes are being revealed at the genomic scale, suggesting unexplored and novel diversity in plant lectin structure and function. Integration of the results from these different types of research is beginning to yield a more detailed understanding of the function of lectins in symbiosis, defense, and plant biology in general.

  7. Toxin-mediated effects on the innate mucosal defenses: implications for enteric vaccines

    DEFF Research Database (Denmark)

    Glenn, Gregory M; Francis, David H; Danielsen, E Michael

    2009-01-01

    mucosal barrier as a key step in enteric pathogen survival. We review key observations relevant to the roles of LT and cholera toxin in protective immunity and the effects of these toxins on innate mucosal defenses. We suggest either that toxin-mediated fluid secretion mechanically disrupts the mucus...... layer or that toxins interfere with innate mucosal defenses by other means. Such a breach gives pathogens access to the enterocyte, leading to binding and pathogenicity by enterotoxigenic E. coli (ETEC) and other organisms. Given the common exposure to LT(+) ETEC by humans visiting or residing...... unexpectedly broad protective effects against LT(+) ETEC and mixed infections when using a toxin-based enteric vaccine. If toxins truly exert barrier-disruptive effects as a key step in pathogenesis, then a return to classic toxin-based vaccine strategies for enteric disease is warranted and can be expected...

  8. TOOLS OF KNOWLEDGE DISSEMINATION WITHIN A NATIONAL DEFENSE INSTITUTION FOR INNOVATION, TECHNOLOGY AND SCIENCE

    Directory of Open Access Journals (Sweden)

    Edson Aparecida de Araújo Querido Oliveira

    2006-11-01

    Full Text Available This paper describes and analyzes in a National Defense Institution for Innovation, Technology and Science its tools of knowledge dissemination. The methodology contemplates the period of 2004 and 2005. Qualitative and quantitative information orientate the research in order to understand focal aspects on knowledge dissemination, in comparison with theoretical references of renowned authors and other elaborated research searching for elements to perform an organizational diagnosis, focused on the knowledge dissemination as well as on the forces which promote or obstruct the organizational development. Conclusions are that the tools of knowledge dissemination must suitable to spread the tacit knowledge in such a way as the explicit ones and that, in a National Defense Institution, other important aspects must be considered, a time that, being the spread knowledge of wrong form can, besides bringing damages for the organization, to compromise the national sovereignty.

  9. Knowledge Organization = Information Organization?

    DEFF Research Database (Denmark)

    Hjørland, Birger

    Are the terms ―information organization‖ (IO), ―organization of information‖ (OI) and ―information architecture‖ (IA) synonyms for knowledge organization (KO)? This study uses bibliometric methods, among others, to determine some relations between these terms and their meanings. Apparently the data...... shows that these terms should not be considered synonyms because each of the terms IO, OI, IA and KO produce a different set of high ranked authors, journals and papers. In many cases the terms are, however, used interchangeably (and thus indicating synonymity) and it is argued that the underlying...

  10. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  11. Chromosome-level genome map provides insights into diverse defense mechanisms in the medicinal fungus Ganoderma sinense

    Science.gov (United States)

    Zhu, Yingjie; Xu, Jiang; Sun, Chao; Zhou, Shiguo; Xu, Haibin; Nelson, David R.; Qian, Jun; Song, Jingyuan; Luo, Hongmei; Xiang, Li; Li, Ying; Xu, Zhichao; Ji, Aijia; Wang, Lizhi; Lu, Shanfa; Hayward, Alice; Sun, Wei; Li, Xiwen; Schwartz, David C.; Wang, Yitao; Chen, Shilin

    2015-01-01

    Fungi have evolved powerful genomic and chemical defense systems to protect themselves against genetic destabilization and other organisms. However, the precise molecular basis involved in fungal defense remain largely unknown in Basidiomycetes. Here the complete genome sequence, as well as DNA methylation patterns and small RNA transcriptomes, was analyzed to provide a holistic overview of secondary metabolism and defense processes in the model medicinal fungus, Ganoderma sinense. We reported the 48.96 Mb genome sequence of G. sinense, consisting of 12 chromosomes and encoding 15,688 genes. More than thirty gene clusters involved in the biosynthesis of secondary metabolites, as well as a large array of genes responsible for their transport and regulation were highlighted. In addition, components of genome defense mechanisms, namely repeat-induced point mutation (RIP), DNA methylation and small RNA-mediated gene silencing, were revealed in G. sinense. Systematic bioinformatic investigation of the genome and methylome suggested that RIP and DNA methylation combinatorially maintain G. sinense genome stability by inactivating invasive genetic material and transposable elements. The elucidation of the G. sinense genome and epigenome provides an unparalleled opportunity to advance our understanding of secondary metabolism and fungal defense mechanisms. PMID:26046933

  12. Organ Donation

    Science.gov (United States)

    Organ donation takes healthy organs and tissues from one person for transplantation into another. Experts say that the organs ... and bone marrow Cornea Most organ and tissue donations occur after the donor has died. But some ...

  13. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  14. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  15. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  16. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  17. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  18. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  19. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  20. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...