WorldWideScience

Sample records for defense review qdr

  1. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  2. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  3. In the Wake of the QDR. The Quadrennial Defense Review and Its Consequences

    Science.gov (United States)

    2006-09-01

    cam- paign tapered off in January as the military emphasis shifted to the ground, with airpower in sup- port. In September and October 2001...Moines, Iowa, and defibrillators for high school basketball games in Tiptonville, Tenn. (Pop. 7,900). The city of Washington, D.C., spent some of its

  4. Rethinking the QDR. The Case for a Persistent Defense Review (Walker Paper, Number 14)

    Science.gov (United States)

    2009-01-01

    Conway, commandant of the Marine Corps, statement before the House Armed Services Committee on Marine Corps. 3. Maj Gen Paul Selva , AF/A8X, briefing to...PPBE,” April 2008. Lt Col Charles Shea (e-mail). Selva , Maj Gen Paul, AF/A8X. Briefing to Air Force Fellows, 31 July 2007. Sinclair, Upton, ed. “The Cry

  5. The Army War College Review. Volume 1, Number 3, August 2015. Student Publications

    Science.gov (United States)

    2016-03-25

    Framing the impact of a cyber event as a constant and sustained vulnerability ignores the reality that we can be proactive in adjusting our posture ...call for better “cyber- hygiene ,” most of the effort has been on the technical aspects of securing digital networks and developing new command...2010, Quadrennial Defense Review Report 2014, QDR in Perspective Report 2010, Nuclear Posture Review Report 2014, Ballistic Missile Defense Review

  6. Cross calibration of QDR-2000 and QDR-1000 dual-energy X-ray densitometers for bone mineral and soft-tissue measurements

    DEFF Research Database (Denmark)

    Abrahamsen, Bo; Gram, J; Hansen, T. B.

    1995-01-01

    ) and fan beam (FB) modes (n = 40-62) as a quality control measure. A total of 83 subjects (79 females and four males) with a wide range of bone mineral densities (BMD) were studied. There was a linear relationship between results with the QDR-1000W and QDR-2000 in SB mode, and between SB and FB mode...

  7. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  8. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  9. External Peer Review Report on the Missile Defense Agency Office of Internal Review

    Science.gov (United States)

    2015-05-14

    No. DODIG-2015-123 M A Y 1 4 , 2 0 1 5 External Peer Review Report on the Missile Defense Agency Office of Internal Review Report Documentation...3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE External Peer Review Report on the Missile Defense Agency Office of Internal... REVIEW SUBJECT: External Peer Review Report on the Missile Defense Agency Office of Internal Review (Report No. DODIG-2015-123) Attached is the

  10. The Cyber Defense Review. Volume 1, Number 1, Spring 2016

    Science.gov (United States)

    2016-04-20

    Harvard Business Review online. Shakarian, Paulo, Jana Shakarian, and Andrew Ruef. 2013. “The Dragon and the Computer: Why Intellectual Property Theft...THE CYBER DEFENSE REVIEW For example, its meteoric economic rise may have been funded in good part by its cyber business knowledge and data extractions...DEFENSE REVIEW erected in cyberspace, its three collective cognitive failures: vision, business model, and hubris have also encouraged the conditions for

  11. 5th International Conference OTEH 2012 - defense technology (Proceedings review)

    OpenAIRE

    Vlado Petar Đurković

    2013-01-01

    This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI), from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH ...

  12. Nano/micromotors for security/defense applications. A review

    OpenAIRE

    Singh, VV; Wang, J

    2015-01-01

    © 2015 The Royal Society of Chemistry. The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive material...

  13. The Defense of Involuntary Intoxication by Prescribed Medications: An Appellate Case Review.

    Science.gov (United States)

    Piel, Jennifer

    2015-09-01

    The defense of involuntary intoxication has long been an exception to the general notion that intoxication is not a defense to criminal liability. The consumption of medications prescribed by a physician can form the basis of an involuntary-intoxication defense. In this article, I review cases where defendants relied on the use of prescribed medications for an involuntary-intoxication defense. The medications most frequently implicated by defendants are listed by name and by class. From the case law, I provide a summary of the defense and a review of the pitfalls of the defense to serve as practice pointers for forensic evaluators.

  14. QDR 2001: Strategy-Driven Choices for America’s Security

    Science.gov (United States)

    2001-04-01

    defense planning. Rather than taking a tabula rasa approach, it distills points of consensus, issues of debate, and potential wildcards from more than...the Base Force Review (1991), the Bottom-Up Review (1993), the Com- mission on Roles and Missions of the Armed Forces (1993), the Qua- drennial...engagement plans. What are the appropriate roles and missions for DOD in support of homeland security? The combination of the unique position of the United

  15. Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization

    Science.gov (United States)

    2014-12-01

    No. DODIG-2015-043 D E C E M B E R 1 , 2 0 1 4 Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization... FINANCE AND ACCOUNTING SERVICE SUBJECT: Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization (Report No...organization, Defense Finance and Accounting Service Office of Internal Review (DFAS IR), in effect for the period ended June 30, 2014. The generally

  16. 75 FR 71564 - Defense Federal Acquisition Regulation Supplement; Contractor Insurance/Pension Review (DFARS...

    Science.gov (United States)

    2010-11-24

    ... Regulation Supplement; Contractor Insurance/Pension Review (DFARS Case 2009-D025) AGENCY: Defense Acquisition.../Pension Review from Procedures, Guidance, and Information (PGI) to the Defense Federal Acquisition... requirements for Contractor Insurance/ Pension Review to DFARS 242.7302 from PGI 242.7302. DoD published a...

  17. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  18. Nano/micromotors for security/defense applications. A review.

    Science.gov (United States)

    Singh, Virendra V; Wang, Joseph

    2015-12-14

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, 'on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  19. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  20. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  1. Ammonia production, excretion, toxicity, and defense in fish: A Review

    Directory of Open Access Journals (Sweden)

    Alex Y K Ip

    2010-10-01

    Full Text Available Many fishes are ammonotelic but some species can detoxify ammonia to glutamine or urea. Certain fish species can accumulate high levels of ammonia in the brain or defense against ammonia toxicity by enhancing the effectiveness of ammonia excretion through active NH4+ transport, manipulation of ambient pH, or reduction in ammonia permeability through the branchial and cutaneous epithelia. Recent reports on ammonia toxicity in mammalian brain reveal the importance of permeation of ammonia through the blood-brain barrier and passages of ammonia and water through transporters in the plasmalemma of brain cells. Additionally, brain ammonia toxicity could be related to the passage of glutamine through the mitochondrial membranes into the mitochondrial matrix. On the other hand, recent reports on ammonia excretion in fish confirm the involvement of Rhesus glycoproteins in the branchial and cutaneous epithelia. Therefore, this review focuses on both the earlier literature and the up-to-date information on the problems and mechanisms concerning the permeation of ammonia, as NH3, NH4+ or proton-neutral nitrogenous compounds, across mitochondrial membranes, the blood-brain barrier, the plasmalemma of neurons, and the branchial and cutaneous epithelia of fish. It also addresses how certain fishes with high ammonia tolerance defend against ammonia toxicity through the regulation of the permeation of ammonia and related nitrogenous compounds through various types of membranes. It is hoped that this review would revive the interests in investigations on the passage of ammonia through the mitochondrial membranes and the blood-brain barrier of ammonotelic fishes and fishes with high brain ammonia-tolerance, respectively.

  2. Inducible direct plant defense against insect herbivores: A review

    Institute of Scientific and Technical Information of China (English)

    Ming-Shun Chen

    2008-01-01

    Plants respond to insect herbivory with responses broadly known as direct defenses, indirect defenses, and tolerance. Direct defenses include all plant traits that affect susceptibility of host plants by themselves. Overall categories of direct plant defenses against insect herbivores include limiting food supply, reducing nutrient value, reducing preference, disrupting physical structures, and inhibiting chemical pathways of the attacking insect. Major known defense chemicals include plant secondary metabolites, protein inhibitors of insect digestive enzymes, proteases, lectins, amino acid deaminases and oxidases. Multiple factors with additive or even synergistic impact are usually involved in defense against a specific insect species, and factors of major importance to one insect species may only be of secondary importance or not effective at all against another insect species. Extensive qualitative and quantitative high throughput analyses of temporal and spatial variations in gene expression, protein level and activity, and metabolite concentration will accelerate not only the understanding of the overall mechanisms of direct defense, but also accelerate the identification of specific targets for enhancement of plant resistance for agriculture.

  3. 75 FR 33237 - Defense Federal Acquisition Regulation Supplement; Contractor Insurance/Pension Review (DFARS...

    Science.gov (United States)

    2010-06-11

    ...; Contractor Insurance/Pension Review (DFARS Case 2009-D025) AGENCY: Defense Acquisition Regulations System... and relocate the requirements for conducting a Contractor Insurance/Pension Review from Procedures... requirements for Contractor Insurance/Pension Review (CIPR) from DFARS 242.7302 to Procedures, Guidance, and...

  4. Defense Acquisition Review Journal. Volume 16, Number 2

    Science.gov (United States)

    2008-07-01

    Under Secretary of Defense for Acquisition, Technology, and Logistics, 2004). 7. The action research concept was developed by social psychologist Kurt ... Lewin and his colleagues in the late 1940s. His concepts spawned many to investigate phenomenological aspects of learning, to include heavily

  5. Dissuasion, Deterrence, and Prevention: The 2010 QDR (and the Forthcoming Nuclear Posture Review)

    Science.gov (United States)

    2010-03-10

    6 Alexei G. Arbatov, “Russian Nuclear Posture: Capabilities, Missions, and Mysteries Inside Enigmas ,” Paper presented at Stanford conference...full well that Nazi Germany and Imperial Japan could not get them. (One can admittedly still debate whether the United States should have used its

  6. Defense Systems Management Review. Volume I, Number 4. Autumn 1977

    Science.gov (United States)

    1977-10-03

    LEAD SERVICE DETERMINATION AND JSOR GENERATION The Department of Defense has become increasingly involved with reducing prolifera- tion of...development of a joint requirement. • Required the generation of a joint serv- ice operational requirement ( JSOR ) within 60 working days. *Air Munitions...prepara- tion and coordination of the JSOR . • Authorized both service-advanced de- velopment efforts to continue through fiscal year 1974. The

  7. Defense Acquisition Review Journal. Volume 14, Number 1, February 2007

    Science.gov (United States)

    2007-02-01

    faculty.fuqua.duke.edu/~clemen/ bio/ mhd /mhdpref.htm Department for Communities and Local Government (DCLG) (2000, December). Multi-criteria analysis manual...http://www.courses.vcu.edu/MATH327/ (under “Schedule” under “ Lecture Slide”). Keeney, R. L., & Raiffa, H. (1976). Decisions with multiple objectives...theory class 9: Revising judgment in the light of new information & risk and uncertainty management. Unpublished lecture notes. DefeNse aCquisiTion

  8. Review and Implementation Status of Prior Defense Business Board Recommendations

    Science.gov (United States)

    2007-04-01

    Executive Service (SES) Corps • Performance-Based Management • Leadership Orientation Course • SES and Flag Officer Diversity • Outplacement ...localized initiatives to support BRAC outplacement /re-alignment for personnel – USD (P&R) will re-look at DBB recommendations • Recommendations – None for...now OUTPLACEMENT ASSISTANCE (in connection with Base Realignment and Closure (BRAC)) December 2006 Defense Business Board Quarterly Meeting 18

  9. DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    OpenAIRE

    Aamir, Muhammad; ZAIDI, Mustafa Ali

    2014-01-01

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper is the coverage of many aspects of countering DDoS attacks including new research on the topic. We survey different papers describing methods of defense again...

  10. Review of the National Defense Intelligence College's Master's Degree in Science and Technology Intelligence

    Science.gov (United States)

    National Academies Press, 2011

    2011-01-01

    The National Research Council (NRC) was asked by the National Defense Intelligence College (NDIC) to convene a committee to review the curriculum and syllabi for their proposed master of science degree in science and technology intelligence. The NRC was asked to review the material provided by the NDIC and offer advice and recommendations…

  11. Defense Acquisition Review Journal. Volume 16, Number 2

    Science.gov (United States)

    2009-07-01

    24 26 28 3 0 A2 A3 B3 DRR3 C3 FRP3 B2 DRR2 C2 FRP2 A1 B1 DRR1 C1 FRP1 1 4 9 | A Publication of the Defense Acquisition University www.dau.mil work...Demonstrations or Independent Operational Test and Evaluation ( IOT &E) events because the key player in the Am algorithm—the supply chain parameter...This resulted in an achievable and defendable Am value to include in the CDD. Because Am is not testable during Logistics Demonstrations or IOT &E

  12. Defense Acquisition Review Journal. Volume 14, Number 3, Dec 2007

    Science.gov (United States)

    2007-12-01

    accounting for nearly half of the DoD’s total annual expenditures ( Apgar & Keane, 2004, p. 45). Equally significant has been the dramatic increase in service...statemnt/2004/April/Alexander.pdf Apgar , M. & J. Keane. (2004, September). New business with the new military. Harvard Business Review 82(9), 45–56...evaluated are identified and defined. Benefits Score : Each alternative is evaluated against each objective by narrative description and by

  13. Cross-calibration of pencil-beam (DPX-NT) and fan-beam (QDR-4500C) dual-energy X-ray absorptiometry for sarcopenia.

    Science.gov (United States)

    Ito, Kenyu; Tsushita, Kazuyo; Muramoto, Akiko; Kanzaki, Hiroki; Nohara, Takashi; Shimizu, Hitomi; Nakazawa, Tomoko; Harada, Atsushi

    2015-11-01

    Sarcopenia, defined as the loss of muscle mass accompanied by weakness, is an important factor leading to frailty and is a growing concern in the aging Japanese society. Muscle mass can be calculated by dual-energy X-ray absorptiometry (DXA), but results differ between devices produced by different manufactures. Thus, cross-calibration is needed to compare body composition results in multicenter trials or when scanners are replaced. The purpose of this study was to perform an in vivo calibration of total body scans between pencil-beam (DPX-NT, GE Healthcare) and fan-beam (QDR-4500C, Hologic Inc.) DXA units. A total 30 subjects (15 women, 15 men, mean age = 35 years, range 22-49 years) were recruited. The lumbar bone mineral density (BMD), femoral neck BMD, appendicular fat and lean body mass, and the appendicular skeletal muscle mass index (ASMI) were highly correlated (r = 0.979-0.993, r(2) = 0.889-0.977). The conversion formulas were as follows: lumbar BMD, Y = -0.08 + 1.16X (X = QDR-4500C, Y = DPX-NT), femoral neck BMD, Y = -0.015 + 1.11X, and ASMI Y = 0.92 + 0.90X. There is excellent comparability between the DPX-NT and the QDR-4500C DXA units. However, cross-calibration equations are required to assess muscle volume, fat, and ASMI in multicenter studies investigating sarcopenia.

  14. A Review of Ribonuclease 7’s Structure, Regulation, and Contributions to Host Defense

    Directory of Open Access Journals (Sweden)

    Brian Becknell

    2016-03-01

    Full Text Available The Ribonuclease A Superfamily is composed of a group of structurally similar peptides that are secreted by immune cells and epithelial tissues. Several members of the Ribonuclease A Superfamily demonstrate antimicrobial activity, and it has been suggested that some of these ribonucleases play an essential role in host defense. Ribonuclease 7 (RNase 7 is an epithelial-derived secreted peptide with potent broad-spectrum antimicrobial activity. This review summarizes the published literature on RNase 7’s antimicrobial properties, structure, regulation, and contributions to host defense. In doing so, we conclude by highlighting key knowledge gaps that must be investigated to completely understand the potential of developing RNase 7 as a novel therapeutic for human infectious diseases.

  15. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  16. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  17. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  18. 75 FR 57906 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2010-09-23

    ... appraisals and make recommendations to the Director, DCAA, regarding final performance ratings and... INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management Division, Defense Contract Audit... of the Secretary Membership of the Defense Contract Audit Agency Senior Executive Service...

  19. Comparison of the effect of different reference data on Lunar DPX and Hologic QDR-1000 dual-energy X-ray absorptiometers.

    Science.gov (United States)

    Laskey, M A; Crisp, A J; Cole, T J; Compston, J E

    1992-12-01

    We have investigated whether the Lunar DPX (software 3.4) and Hologic QDR-1000 dual-energy X-ray absorptiometers have comparable normal reference databases for the spine and femur of white UK and USA subjects. After conversion for systematic differences in absolute bone density values between the two systems, the reference databases were very similar for the spine in young subjects, but there were clear differences in the femur databases of young females and males of all ages. These differences were confirmed by comparing the percent age-matched and young values determined by the two systems for subjects scanned on both systems. Thus the diagnosis and management of a patient could differ, depending on the system used for the bone density measurements.

  20. Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review

    Science.gov (United States)

    2014-01-01

    2005. As of June 12, 2013: http://www.rand.org/pubs/monographs/MG291.html Harmon, Bruce R., Lisa M. Ward, and Paul R. Palmer, Assessing Acquisition...research_briefs/RB194.html 78 Prolonged Cycle Times and Schedule Growth in Defense Acquisition Lush, Mona , Office of the Under Secretary of Defense for

  1. 76 FR 59664 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2011-09-27

    ... Service (SES) performance appraisals and make recommendations to the Director, DCAA, regarding final... this notice. FOR FURTHER INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management... of the Secretary Membership of the Defense Contract Audit Agency Senior Executive Service...

  2. Joint Analysis: QDR 2001 and Beyond Mini-Symposium Held in Fairfax, Virginia on 1-3 February 2000

    Science.gov (United States)

    2007-11-02

    Army will remain a professionally rewarding and personally enriching environment within which people take pride in being part of the Nation’s most...yield management • Game theory 0 Network analysis a Decision trees • Modeling and Simulation (M&S) • Marketing strategies • System engineering...ACS Defense • Col Ryan Ferrell , USAF, AF/ILX Here are the members of the infrastructure subgroup. They represented all the Services, JCS, OSD

  3. Comparative study of positron emission tomography and quantitative digital radiography (QDR) in detecting effects of aging and diet on bone metabolism of guinea pig

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed, K.; Inoue, Tomio; Tomiyoshi, Katsumi; Sarwar, M.; Oriuchi, Noboru; Mizunuma, Hideki; Endo, Keigo [Gunma Univ., Maebashi (Japan). School of Medicine

    1998-07-01

    The purpose of this study was to compare positron emission tomography and quantitative digital radiography (QDR) in detecting the effects of aging and diet on bone metabolism. Bone imaging of guinea pigs was performed with fluorine-18 fluoride ions using a high-resolution animal PET system to analyze bone metabolism quantitatively in different age groups of guinea pigs, young (8 weeks), adult (36 weeks), and aged groups (96 weeks), and also in a dietary manipulation group (low calcium and low vitamin D{sub 3} diet for 1, 2, and 3 weeks). A three-compartment kinetic model was applied for the analysis of bone metabolism to evaluate the rate constant (K, K1-K4). There was a significant difference in K-constant between the young and other groups. The K-constant was higher (0.100{+-}0.005 ml/min/ml) in the young group than in adults (0.028{+-}0.001 ml/min/ml) (p<0.001) and the aged group (0.047{+-}0.020 ml/min/ml). This high value of the K-constant in the young group indicates high turnover in bone metabolism, but there was no significant difference between the adult and aged groups. Bone mineral density (BMD) was lower in the young group (0.15{+-}0.026 g/cm{sup 2}) than in the adult (0.230{+-}0.021 g/cm{sup 2}) (p<0.001) and aged groups (0.26{+-}0.03 g/cm{sup 2}). There was no significant difference in BMD between the adult and aged groups. Although there was no difference in BMD between the control and dietary manipulation groups, PET study revealed a significant difference in K-constant between them (0.028{+-}0.001 vs. 0.090{+-}0.009 ml/min/ml) (p<0.001). The quantitative skeletal dynamic PET study with {sup 18}F fluoride ions was more sensitive and superior in the early detection of metabolic disorders in bone disease than QDR. (author)

  4. The DTIC Review; Volume 3 Number 4. Antimissile Defense: Strategic Interceptor

    Science.gov (United States)

    1997-12-01

    PERSONAL AUTHORS: HADYNSKI, MARK; URBANO , REYNALDO; SVOREC, GREGORY J. RAY ABSTRACT: (U) (U) The task of developing ABSTRACT: (U) The Ballistic Missile...primarily of refurbished components a formidable response - state of the art Theater acquired for the system’s demonstration and Missile Defense (TMD

  5. Report of the Defense Review Committee for the Code of Conduct. Volume 2. Supplement,

    Science.gov (United States)

    1976-01-01

    Hawthorne , Nevada, from May 1968 to July 1969. Lieutenant Colonel McLernan attended the Inter-American Defense College at Fort McNair, Washington, D.C...Vietnam Under the Standards of the Geneva Conventions of i 1949, National War College, Wash D.C., Mar 74, pp: 136. Kenyon, Nathaniel C., Col, JAGC; Davis

  6. The Comprehensive Review Working Group and Don't Ask, Don't Tell repeal at the Department of Defense.

    Science.gov (United States)

    Lee, Jonathan L

    2013-01-01

    In February 2010, Secretary of Defense Robert Gates and Chairman of the Joint Chiefs of Staff Adm. Michael Mullen established the Comprehensive Review Working Group (CRWG) to conduct a comprehensive review of the issues associated with a repeal of Don't Ask, Don't Tell (DADT). Over the next 10 months, the CRWG undertook one of the most extensive studies of a personnel issue in the history of the U.S. military. This article describes the work and the findings of the CRWG (on which the author served) in the context of the activities within the Department of Defense (DoD) following President Obama's call for DADT repeal in his January 2010 State of the Union Address and leading up to the passage of the Don't Ask, Don't Tell Repeal Act in December 2010. It argues that the CRWG served a number of important functions in the DADT repeal process, particularly that it a) provided a rigorous, fact-based assessment of the impacts of repeal from which DoD senior leaders and Congress could base their views; b) developed a road map for a smooth and orderly implementation of repeal; and c) opened a conversation among military service members about what repeal would really mean to them. In doing so, the CRWG contributed to what has been a largely incident-free and successful transition to a post-DADT military.

  7. 77 FR 19126 - Defense Federal Acquisition Regulation Supplement: New Threshold for Peer Reviews of...

    Science.gov (United States)

    2012-03-30

    ... Regulation Supplement: New Threshold for Peer Reviews of Noncompetitive Contracts (DFARS Case 2012-D018... modify the threshold for noncompetitive contract peer reviews. DATES: Effective Date: April 30, 2012. FOR.... Background This final rule reduces the threshold for DoD peer reviews of noncompetitive contracts from...

  8. Review of the Fiscal Year 2012 (FY12) Defense Environmental International Cooperation (DEIC) Program: Unclassified Version

    Science.gov (United States)

    2013-06-01

    well as discussions on topics such as climate change adaptation and bio -security challenges. It also provided the opportunity to review planning for...this work. This project investigated allegations of Herbicide Orange use on Okinawa through exhaustive reviews of historical records. The study...concluded that there is no documentation to validate claims that Herbicide Orange was shipped either to or through Okinawa, nor that it was unloaded

  9. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  10. Reviews of Selected System and Software Tools for Strategic Defense Applications

    Science.gov (United States)

    1990-02-01

    uewal of OA Dmola is stalled to their mdio MW kudmd ue. The wort reported In IS I eeI wans e oMimited eedstd MCA M 64 C OM fir iso Oesotieet of Diesft...companies indicated: Product Vendor/Sponsor Software Through Pictures Interactive Development Environments , Inc. Teamwork Cadre Technologies, Inc...dataflow-oriented software engineering tool, developed by Interactive Development Environments , San Francisco, CA [IDE 88]. This review concerns the

  11. Internal Review of the Washington Navy Yard Shooting. A Report to the Secretary of Defense

    Science.gov (United States)

    2013-11-20

    Hood,” Report of the DoD Independent Review, January 2010 WikiLeaks , 2010 In May 2010, U.S. Army Specialist Bradley Manning was arrested for leaking...the largest number of classified documents to the public in U.S. history through the website operated by WikiLeaks , an international organization...targeted violence but also deliberate acts of unauthorized disclosure. As a direct result of the WikiLeaks disclosures, the President issued

  12. Review of Catalytic Hydrogen Generation in the Defense Waste Processing Facility (DWPF) Chemical Processing Cell

    Energy Technology Data Exchange (ETDEWEB)

    Koopman, D. C.

    2004-12-31

    This report was prepared to fulfill the Phase I deliverable for HLW/DWPF/TTR-98-0018, Rev. 2, ''Hydrogen Generation in the DWPF Chemical Processing Cell'', 6/4/2001. The primary objective for the preliminary phase of the hydrogen generation study was to complete a review of past data on hydrogen generation and to prepare a summary of the findings. The understanding was that the focus should be on catalytic hydrogen generation, not on hydrogen generation by radiolysis. The secondary objective was to develop scope for follow-up experimental and analytical work. The majority of this report provides a summary of past hydrogen generation work with radioactive and simulated Savannah River Site (SRS) waste sludges. The report also includes some work done with Hanford waste sludges and simulants. The review extends to idealized systems containing no sludge, such as solutions of sodium formate and formic acid doped with a noble metal catalyst. This includes general information from the literature, as well as the focused study done by the University of Georgia for the SRS. The various studies had a number of points of universal agreement. For example, noble metals, such as Pd, Rh, and Ru, catalyze hydrogen generation from formic acid and formate ions, and more acid leads to more hydrogen generation. There were also some points of disagreement between different sources on a few topics such as the impact of mercury on the noble metal catalysts and the identity of the most active catalyst species. Finally, there were some issues of potential interest to SRS that apparently have not been systematically studied, e.g. the role of nitrite ion in catalyst activation and reactivity. The review includes studies covering the period from about 1924-2002, or from before the discovery of hydrogen generation during simulant sludge processing in 1988 through the Shielded Cells qualification testing for Sludge Batch 2. The review of prior studies is followed by a

  13. A review of gas-cooled reactor concepts for SDI (Strategic Defense Initiative) applications

    Energy Technology Data Exchange (ETDEWEB)

    Marshall, A.C.

    1989-08-01

    We have completed a review of multimegawatt gas-cooled reactor concepts proposed for SDI applications. Our study concluded that the principal reason for considering gas-cooled reactors for burst-mode operation was the potential for significant system mass savings over closed-cycle systems if open-cycle gas-cooled operation (effluent exhausted to space) is acceptable. The principal reason for considering gas-cooled reactors for steady-state operation is that they may represent a lower technology risk than other approaches. In the review, nine gas-cooled reactor concepts were compared to identify the most promising. For burst-mode operation, the NERVA (Nuclear Engine for Rocket Vehicle Application) derivative reactor concept emerged as a strong first choice since its performance exceeds the anticipated operational requirements and the technology has been demonstrated and is retrievable. Although the NERVA derivative concepts were determined to be the lead candidates for the Multimegawatt Steady-State (MMWSS) mode as well, their lead over the other candidates is not as great as for the burst mode. 90 refs., 2 figs., 10 tabs.

  14. Dissenting view. A Brief, Liberal, Catholic Defense of Abortion [by] Daniel A. Dombrowski and Robert Deltete. Book review.

    Science.gov (United States)

    Padovano, A T

    2000-01-01

    This paper reviews the book "A Brief, Liberal, Catholic Defense of Abortion", by Daniel A. Dombrowski and Robert Deltete. In this book, the authors argue that the Catholic tradition on abortion is very different from the present teaching of the Catholic Church. The issue of abortion is explored in the book through two different philosophies and two major Catholic theologians. The two philosophies are the perversity of sex (abortion distorts sex) and the ontological (the fetus as a person) philosophies. Saint Augustine primarily identified with the perversity of sex and viewed early and late stages of abortion as evil, because it destroys the conceptus, which is the only justification for sex and because human life is present--after sensation and quickening occur. On the other hand, Saint Thomas Aquinas with the ontological approach was less interested in abortion, rather developed hylomorphism. He stated that there is no human life in the womb until the 5th or 6th month, but rather a cluster of cells; thus God cannot infuse a soul into a small cluster of cells since body and soul belong together. The authors believe that this book is a model of reasoned discourse about abortion issues and is proves to be beneficial to a Catholic as well as any thoughtful person.

  15. Review of the President’s Fiscal Year 2009 Budget Request for the Defense Health Program’s Private Sector Care Budget Activity Group

    Science.gov (United States)

    2008-05-28

    2009 budget request for the Defense Health Program’s Private Sector Care BAG. To do this, we reviewed (1) DOD’s justification for the request for the... Private Sector Care BAG, including the underlying estimates and the extent to which DOD considered historical information; and (2) changes between this...develop the budget requests for the Private Sector Care BAG in fiscal years 2008 and 2009. We also interviewed officials and analyzed documents from

  16. Disability Compensation: Review of Concurrent Receipt of Department of Defense Retirement, Department of Veterans Affairs Disability Compensation, and Social Security Disability Insurance

    Science.gov (United States)

    2014-09-30

    Page 1 GAO-14-854R Disability Compensation 441 G St. N.W. Washington, DC 20548 September 30, 2014 The Honorable Tom Coburn, M.D. Ranking...Member Committee on Homeland Security and Governmental Affairs United States Senate Disability Compensation: Review of Concurrent Receipt of...Department of Defense Retirement, Department of Veterans Affairs Disability Compensation, and Social Security Disability Insurance Dear Dr. Coburn: The

  17. Quadrennial Defense Review Report

    Science.gov (United States)

    2006-02-06

    Range during a fi repower demonstration. In its fi fth decade of service, B-52s continue to provide long-range strike capability to the joint...to cut costs by $268 million in A Talon 3B tracked robot waits for its next command after an improvised explosive device was detonated in Baghdad...Iraq. Th e increasing use of robotics has improved U.S. force protection signifi cantly in Operation Iraqi Freedom. Ph ot o by T ec hn ic al S

  18. Quadrennial Defense Review 2014

    Science.gov (United States)

    2014-01-01

    periphery will continue to pose a security challenge. The United States is willing to undertake security cooperation with Russia , both in the... Russia to increase transparency and reduce the risk of military miscalculation. In the Western Hemisphere, predominant security challenges no longer...three-dimensional printers could revolutionize manufacturing and logistics related to warfare. New ways of developing WMD – such as biotechnology

  19. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    Corps photo by Cpl Alex C. Guerra . D E F E N S E S T R A T E G Y 14 Q u a d re nn i a l De f e n s e Re v i e w R e po r t...deepen our partnership with Singapore, and develop new strategic relationships with Indonesia, Malaysia, and Vietnam , to address issues such as

  20. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  1. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  2. 心理防御机制与临床实践%Defense Mechanism and Clinical Practice(review)

    Institute of Scientific and Technical Information of China (English)

    梁宝勇; 崔光成

    2002-01-01

    @@ 心理防御机制是心理卫生工作者十分熟悉的一个专业术语.这个专业术语在心理学中的应用始于S.Freud.1894年在(the Neuro-Psychoses of Defense)一书中,弗洛伊德提出防御机制同某些神经症和精神病有密切联系的猜想.1936年,他的女儿安娜.弗洛伊德(Anna Freud)出版了(the Ego and the Mechanisms of Defense)一书,进一步扩展和丰富了防御机制的理论,以致防御机制已成为精神分析心理学中的一个核心的概念.时至今天,在心理卫生实践中人们仍须经常涉及它们.

  3. A Systematic Review of Oxidative Stress and Safety of Antioxidants in Diabetes: Focus on Islets and Their Defense

    Directory of Open Access Journals (Sweden)

    Udayakumar Karunakaran

    2013-04-01

    Full Text Available A growing body of evidence suggests that hyperglycemia-induced oxidative stress plays an important role in diabetic complications, especially β-cell dysfunction and failure. Under physiological conditions, reactive oxygen species serve as second messengers that facilitate signal transduction and gene expression in pancreatic β-cells. However, under pathological conditions, an imbalance in redox homeostasis leads to aberrant tissue damage and β-cell death due to a lack of antioxidant defense systems. Taking into account the vulnerability of islets to oxidative damage, induction of endogenous antioxidant enzymes or exogenous antioxidant administration has been proposed as a way to protect β-cells against diabetic insults. Here, we consider recent insights into how the redox response becomes deregulated under diabetic conditions, as well as the therapeutic benefits of antioxidants, which may provide clues for developing strategies aimed at the treatment or prevention of diabetes associated with β-cell failure.

  4. Defense Acquisition Research Journal. Volume 23, Number 3, Issue 78, July 2016

    Science.gov (United States)

    2016-07-01

    for National Security and Resource Strategy Dr. J. Ronald Fox Harvard Business School Mr. David Gallop Defense Acquisition University Dr. Jacques...Predator: The Secret Origins of the Drone Revolution Written by Richard Whittle Reviewed by Julien Demotes-Mainard Mr. Patrick Fitzgerald Defense...Defense Acquisition Research Journal, formerly the Defense Acquisition Review Journal, is published quarterly by the Defense Acquisition University (DAU

  5. Study on the Defense Issue in the Death Sentence Review Process%死刑复核程序的辩护问题研究

    Institute of Scientific and Technical Information of China (English)

    戴婧婧

    2014-01-01

    In the death sentence review process , the defending right of the accused is protected by legislation . But to enhance the defending right , the effective defense of the defending attorney should be protected .However , the meeting between the defending attorney and the client who is not in custody may be scrutinized legally .The de-fending attorney has the right to deliver the defending opinion to the judge in charge of the death sentence review , but there are operation difficulties .The defending attorney may induce the case process indirectly , but we should set guidelines for the defending attorney to deliver opinions to the judge in charge .The jail investigates the crime allegedly to be deliberately conducted by the guilty who has been sentenced to death sentence with a reprieve .The lack of relevant legislation and improper enforcement hamper the effective defense .We may reform from the two as-pects of legislation and judicial practice .While advancing the effective defense , we should also prevent misplead-ing.%死刑复核程序中,被追诉人的辩护权受到立法保护,为了落实辩护权,需要保障辩护律师有效辩护。然而,辩护律师与非羁押当事人的会见可以被合法监控;辩护律师可以向死刑复核的法官提交辩护意见,但面临操作的困难;辩护律师可以间接推导案件进展,但需要设立具体流程供辩护律师向承办法官提交意见。死缓罪犯故意犯罪案件由监狱侦查,但立法空缺、执法可能不当将使得辩护权难以得到保障。上述问题可以从立法和司法实践两个方面予以改进。在推进辩护律师有效辩护的同时,还要发挥检察机关的作用防范不当辩护。

  6. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  7. Description and utilization of the United States department of defense serum repository: a review of published studies, 1985-2012.

    Directory of Open Access Journals (Sweden)

    Christopher L Perdue

    Full Text Available Specimens in the United States Department of Defense (DoD Serum Repository have accumulated in frozen storage since 1985 when the DoD began universal screening for human immunodeficiency virus. Use of the stored serum for health research has been carefully controlled, but the resulting publications have never been systematically identified or described. The Armed Forces Health Surveillance Center (AFHSC information systems and open (online sites were used as data sources. Through 2012, the repository contained 54,542,658 serum specimens, of which 228,610 (0.42% have been accessed for any purpose. Between 2001 (the first year that comprehensive, digital records were available and 2012, 65.2% of all approved requests for serum were for healthcare or public health investigations, but greater than 99% of all shipped samples were for research. Using two different methods - a structure search of PubMed and an exhaustive online search based on records from AFHSC - we identified 76 articles published between October 1988 and March 2013 that covered a multitude of infectious diseases, injuries, environmental exposures and mental health conditions through analysis of antibodies, biological metabolic, signaling and regulatory substances, Vitamin D, organochlorines, dioxin, omega-3-fatty acid, and portions of human deoxyribonucleic acid. Despite its operational and scientific value, it appears that the DoD Serum Repository has been underutilized. Changes to policy and increased capacity for specimen processing could increase use of the repository without risking privacy or the availability of specimens for the healthcare of individual service members in the future.

  8. Description and Utilization of the United States Department of Defense Serum Repository: A Review of Published Studies, 1985-2012

    Science.gov (United States)

    Perdue, Christopher L.; Cost, Angelia A. Eick; Rubertone, Mark V.; Lindler, Luther E.; Ludwig, Sharon L.

    2015-01-01

    Specimens in the United States Department of Defense (DoD) Serum Repository have accumulated in frozen storage since 1985 when the DoD began universal screening for human immunodeficiency virus. Use of the stored serum for health research has been carefully controlled, but the resulting publications have never been systematically identified or described. The Armed Forces Health Surveillance Center (AFHSC) information systems and open (online) sites were used as data sources. Through 2012, the repository contained 54,542,658 serum specimens, of which 228,610 (0.42%) have been accessed for any purpose. Between 2001 (the first year that comprehensive, digital records were available) and 2012, 65.2% of all approved requests for serum were for healthcare or public health investigations, but greater than 99% of all shipped samples were for research. Using two different methods – a structure search of PubMed and an exhaustive online search based on records from AFHSC – we identified 76 articles published between October 1988 and March 2013 that covered a multitude of infectious diseases, injuries, environmental exposures and mental health conditions through analysis of antibodies, biological metabolic, signaling and regulatory substances, Vitamin D, organochlorines, dioxin, omega-3-fatty acid, and portions of human deoxyribonucleic acid. Despite its operational and scientific value, it appears that the DoD Serum Repository has been underutilized. Changes to policy and increased capacity for specimen processing could increase use of the repository without risking privacy or the availability of specimens for the healthcare of individual service members in the future. PMID:25723497

  9. 76 FR 64960 - Extension of Agency Information Collection Activity Under OMB Review: Flight Crew Self-Defense...

    Science.gov (United States)

    2011-10-19

    ... Management and Budget (OMB) control number 1652-0028, abstracted below to OMB for review and approval of an... using appropriate automated, electronic, mechanical, or other technological collection techniques or... the registration information against a sign-in sheet provided in the classroom. TSA also...

  10. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  11. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  12. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  13. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  14. Australian Defense.

    Science.gov (United States)

    1979-12-01

    Australia in World Affairs 1966-1970, (Melbourne: Cheshire Publishing Pty Ltd , 1974), p. 258. 6Department of Defence, Australian Defence Review...Pvt, Ltd .: 1977), p. 69. 74 17Desmond Ball, "American Bases: Implications for Australian Securi- ty" The Strategic and Defence Studies Centre...million with aircraft, or 3) a " Woolworth " carrier costing $300-400 million with aircraft.33 Defence planners are now faced with determin- ing which

  15. Ballistic Missile Defense Review Report

    Science.gov (United States)

    2010-02-01

    attack, including through more aggressive denial and deception practices as well as a shift to mobile systems.  Some states are also developing...Avionics Upgrade/Obsolescence Program ( FAU /OP). The Department will also emphasize proven capabilities by requesting funding for additional GMD... practical solutions to emerging challenges, solutions that involve all elements of national power. In addition, by working with allies and partners to

  16. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  17. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  18. Site Team Review: Petition for Degree-Granting Authority by National Defense University, School for Information Resources Management (iCollege)

    Science.gov (United States)

    US Department of Education, 2010

    2010-01-01

    On November 3, 2010, a site team from the National Advisory Committee on Institutional Quality and Integrity (NACIQI) and the U.S. Department of Education conducted a visit to National Defense University's (University) School for Information Resources Management (IRMC or iCollege) at Ft. McNair in Washington, DC. The purpose of the visit was to…

  19. Technical Papers Presented at the Defense Nuclear Agency Global Effects Review. Held at Moffett Field, California on 25-27 February 1986. Volume 1.

    Science.gov (United States)

    1986-05-15

    J. Phys. 53, 323-332. Brunswig H. (1985) Private communication. Carrier G., Fendell F. F., and Feldman P. (1984) Big fires. Combustion and Science...ATTN T HARRIS ATTN. H BURNSWORTH ATTN. J BELINGSCIENTIFIC RESEARCH ASSOC, INC ATTN B WEINBERG TRW ELECTRONICS & DEFENSE SECTOR ATTN F FENDELL SPARTA INC

  20. Technical Papers Presented at the Defense Nuclear Agency Global Effects Review. Held at Moffett Field, California on 25-29 February 1986. Volume 2.

    Science.gov (United States)

    1986-05-15

    Laboratory Study of Wet Coagulation - 2 Carrier, Fendell , Kwoh, Lake 16. Microphysical Properties and Removal Processes of Soot - 21 Hallett...1986 GEORGE CARRIER* FRANK FENDELL DAN KWOH BRUCE LAKE *Harvard University, Cambridge, Massachusetts 02138 TRW SPACE AND TECHNOLOGY GROUP ONE SPACE...BURNSWORTH ATTN: J BELING SCIENTIFIC RESEARCH ASSOC, INC ATTN: B WEINBERG TRW ELECTRONICS & DEFENSE SECTOR ATTN: F FENDELL SPARTA INC ATTN: G KIRCHNER ATTN

  1. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  2. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  3. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  4. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  5. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  6. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  7. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  8. Defense: FY2012 Budget Request, Authorization and Appropriations

    Science.gov (United States)

    2012-02-13

    Senate versions of the bill would have done). The ships for which most of the total cost is authorized in FY2012 include two Virginia -class submarines, a...New START Treaty: Central Limits and Key Provisions, by Amy F. Woolf . Defense: FY2012 Budget Request, Authorization and Appropriations...Missile Defense and Offensive Arms Reductions: A Review of the Historical Record, by Steven A. Hildreth and Amy F. Woolf . Defense: FY2012 Budget

  9. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  10. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  11. Applications of spatially offset Raman spectroscopy to defense and security

    Science.gov (United States)

    Guicheteau, Jason; Hopkins, Rebecca

    2016-05-01

    Spatially offset Raman spectroscopy (SORS) allows for sub-surface and through barrier detection and has applications in drug analysis, cancer detection, forensic science, as well as defense and security. This paper reviews previous efforts in SORS and other through barrier Raman techniques and presents a discussion on current research in defense and security applications.

  12. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  13. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  14. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  15. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  16. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  17. 32 CFR Appendix B to Part 14 - Affidavit and Agreement by Civilian Defense Counsel

    Science.gov (United States)

    2010-07-01

    ... Defense Team and I will otherwise perform all of our work relating to the proceedings, including any... (defined as the review and final decision of the President or, if designated, the Secretary of Defense), if... to military commission proceedings. C. The Defense Team shall consist entirely of myself,...

  18. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  19. Sustainable Development: A Strategy for Regaining Control of Northern Mali

    Science.gov (United States)

    2014-06-01

    Initiative QDDR Quadrennial Diplomacy and Development Review QDR Quadrennial Defense Review ROMO range of military operations S–AF U.S Department of...stabilize the soil, reduce wind and water erosion, 100 use manure as fertilizer, use terracing for landscaping, develop salt traps to retain...forestation project, the government could propose a power generation project (i.e., a solar and wind energy project) that

  20. Defense Contracting: Observations on Air Force Use of Undefinitized Contract Actions

    Science.gov (United States)

    2015-05-18

    incur unnecessary costs if requirements change before the contract is definitized. To help minimize these risks, defense acquisition regulations ...Logistics, Defense Procurement and Acquisition 2Defense Federal Acquisition Regulation Supplement (DFARS) § 217.7404-3(a) (1) and (2). 3Defense...vehicle ( UAV ) and C-130J transport aircraft—based on the programs’ high UCA obligation levels. For the selected contracts, we reviewed approval documents

  1. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  2. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  3. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  4. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  5. 死刑复核程序中辩护权之保障%The Protection of the Right to Defense in the Procedure for Review of Death Sentences

    Institute of Scientific and Technical Information of China (English)

    陈永生; 白冰

    2015-01-01

    The criminal procedure law amended in 2012 made great progress on procedure for review of death sentences, but little improvement has achieved as far as judicial practice is concerned. It is very hard for the procedure for review of death sentences to exert its error-correcting function anticipated by the legislator for the following reasons: absence of legal assistance, difficult exertion of the right of defense, and excessive application of remote interrogation. These problems can be attributed to the administrative judging mode and the values of efficiency priority. In order to effectively realize the function of procedure for review of death sentences , we must endow the defendant in the procedure for review of death sentences the right to obtain legal aid, and strengthen the protection of the lawyer‘s right of meeting, right of reviewing files, and right of investigating and collecting evidences; besides, we should limit the scope of remote interrogation.%我国2012年修正的刑事诉讼法对死刑复核程序进行了较大幅度的完善,但实践中死刑复核程序的进步乏善可陈。缺位的法律援助、难以行使的辩护权利、过度适用的远程讯问导致死刑复核很难发挥预期的纠错功能。这些问题的出现根源于行政审批式的裁判方式和效率优先的价值观念。要有效实现死刑复核程序的功能,有必要赋予死刑复核程序中的被告人以获得法律援助的权利,强化对辩护律师会见权、阅卷权、调查取证权的保障,限制远程讯问的适用范围。

  6. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    Science.gov (United States)

    2015-06-01

    should be done by using the IAS for a modeling situation (for instance, JWARS—Joint Warfare System) or IAS which can carry out a SWOT analysis (IAS...43  C.  MISTAKE ANALYSIS OF CONDUCTED DEFENSE REVIEW IN MDU...PROGRAMS ...................................................64  B.  ANALYSIS OF PLANNING AND EXECUTING FINANCIAL RESOURCES OF MDU

  7. BOOK REVIEW: WALID A. SALEH: IN DEFENSE OF THE BIBLE. A CRITICAL EDITION AND AN INTRODUCTION TO AL-BIQĀ‘ĪS BIBLE TREATISE

    Directory of Open Access Journals (Sweden)

    Amidu Olalekan Sanni

    2012-01-01

    Full Text Available There is a general perception in Western and indeed in mainstream Islamic circles that Muslims hardly exhibit any positive attitude towards the Bible and that their view of it is one of measured opprobrium that verges on outright rejection. The Mamluk savant, Ibrāhim b. „Umar b. Hasan al-Biqā„ī (809-885AH/1406-1480CE wrote Al-aqwāl al-qawwāmah fī hukm al-naql min al-kutub al-qadīma (The Straightforward Statements concerning Quoting from Ancient Scriptures, henceforth Aqwāl, in order to confirm authoritatively the permissibility to the Muslims of using Biblical materials for religious and epistemic reasons. It is a critical edition of this work as introduced by Walid A. Saleh that is being reviewed here

  8. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  9. Proceedings of the Electronic Test Equipment Division’s Annual Program Review of ’Electronic Test Equipment Industry Response to Emerging Defense Requirements’ Held in Arlington, VA on 10-11 May 1984

    Science.gov (United States)

    1984-01-01

    J j ELECTRONIC TEST EQUIPMENT INDUSTRY RESPONSE TO EMERGING DEFENSE REQUIREMENTS TECHNICAL LIBRARY held at the Hyatt Arlington Hotel ...Deputy Under Secretary of Defense for Acquisition Mangement KEYNOTE ADDRESS 13 LtG. Donald M. Babers, Deputy Commanding General for Material

  10. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  11. Transport of defense compounds from source to sink

    DEFF Research Database (Denmark)

    Jørgensen, Morten Egevang; Nour-Eldin, Hussam Hassan; Halkier, Barbara Ann

    2015-01-01

    Plants synthesize a plethora of defense compounds crucial for their survival in a challenging and changing environment. Transport processes are important for shaping the distribution pattern of defense compounds, albeit focus hitherto has been mostly on their biosynthetic pathways. A recent...... identification of two glucosinolate transporters represents a breakthrough in our understanding of glucosinolate transport in Arabidopsis and has advanced knowledge in transport of defense compounds. In this review, we discuss the role of the glucosinolate transporters in establishing dynamic glucosinolate...... distribution patterns and source-sink relations. We focus on lessons learned from glucosinolate transport that may apply to transport of other defense compounds and discuss future avenues in the emerging field of defense compound transport....

  12. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  13. Defense Horizons. Number 78, March 2015

    Science.gov (United States)

    2015-03-01

    databases , National Defense University researchers have identified 124 examples of effective P4s across a wide spectrum of industries and...environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000 examples of public-public and public...Partnering,” SONRI, Inc., 2010. 8 Farming First, “Innovation and Incentives for Farmers Needed to Protect World’s Biodiversity ,” press release, May 21

  14. 32 CFR 724.117 - Discharge review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Discharge review. 724.117 Section 724.117 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Definitions § 724.117 Discharge review. A nonadversary administrative reappraisal at the level...

  15. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  16. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  17. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  18. Risk Quantification for Sustaining Coastal Military Installation Asset and Mission Capabilities (RC-1701)

    Science.gov (United States)

    2014-06-06

    Infrastructure Protection PBL Planetary Boundary Layer POL Petroleum, Oils, & Lubricants QDR Quadrennial Defense Review vii RC Resource...Analysis SWAN Simulating WAves Nearshore model SWL Still Water Level (aka surge) TC96 TC96 Planetary Boundary Layer (PBL) wind model TDC Technical...study area, armored or artificial shorelines were commonly found in most urban /suburban areas and in rural areas where private property was vulnerable

  19. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  20. Contract Audit Followup: Its Impact on Defense Contracting.

    Science.gov (United States)

    1983-12-01

    partici- pation would depend on an assurance of complete anonymity. B. TBE SANPLE Research was limited to personal interviews conducted in California...organizations pe:form these reviews. The Assistant Inspector General for Auditng shall review the Defense Agencies’ followup systems. .. The Inspector General

  1. Needed: Reincarnation of National Defense Education Act of 1958

    Science.gov (United States)

    Harris, Mary M.; Miller, James R.

    2005-01-01

    This paper reviews the historical and current response of the United States to threats to its world leadership in scientific endeavors, with particular attention to the National Defense Education Act of 1958. The current status of the United States in mathematics, science, and engineering education is reviewed with respect to K-12 student…

  2. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  3. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  4. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  5. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  6. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  7. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  8. Review of Defense Display Research Programs

    Science.gov (United States)

    2001-01-01

    Programs Flat Panel Autostereoscopic N-perspective 3D High Definition DMD Digital Projector Light Piping & Quantum Cavity Displays Solid State Laser...Megapixel Displays • Size Commonality • 67 % Weight Reduction • > 200 sq. in. per Display 20-20 Vision Simulators True 3D , sparse symbols Foldable Display...megapixel 2D and True 3D Display Technology 25M & T3D FY02-FY06 New service thrusts

  9. The Defense Systems Acquisition and Review Council

    Science.gov (United States)

    1976-09-15

    competition; and (i) Validity of contractor proposals. (3) For systems proposed for initial produccion : (a) Feasibility of production, Including "evaluation...Industrial Preparedness ASD(I&L) DoD Instruction Production Planning 4005.3 Procedures Industrial Preparedness ASD(I&L) DoD �.3M Planning Manual ...Guidance Manual ," July 1, 1971 authorized by DoD Instruction 7110-.1, August 23, 1968 I, PURPOSE This Instruction establishes policy and instruction

  10. Defense Acquisition Structures and Capabilities Review

    Science.gov (United States)

    2007-06-01

    Year 1996, 1996. Department of the Army, U.S. Army Materiel Command Historical Office, A Brief History of Army Materiel Command and Biography of the...Econom, Shelley Roberts, Confronting the Looming Crisis in the Federal Acquisi- tion Workforce, Public Contract Law Journal, Vol. 35, No. 2, Winter 2006...Contract Management Agency Etter, Dr. Delores, Assistant Secretary of the Navy (Research, Develop- ment, and Acquisition) Evans, Mary Margaret, former

  11. Defense policies under review / Ella Karapetyan

    Index Scriptorium Estoniae

    Karapetyan, Ella

    2010-01-01

    Välisminister Urmas Paeti ja Ameerika Ühendriikide poliitika-ala asekaitseministri Michele Flournoy 26. veebruaril toimunud kohtumisel räägiti Eesti ja USA koostööst Afganistanis, NATO-Vene suhetest ning NATO-st üldiselt

  12. Defense policies under review / Ella Karapetyan

    Index Scriptorium Estoniae

    Karapetyan, Ella

    2010-01-01

    Välisminister Urmas Paeti ja Ameerika Ühendriikide poliitika-ala asekaitseministri Michele Flournoy 26. veebruaril toimunud kohtumisel räägiti Eesti ja USA koostööst Afganistanis, NATO-Vene suhetest ning NATO-st üldiselt

  13. Insect response to plant defensive protease inhibitors.

    Science.gov (United States)

    Zhu-Salzman, Keyan; Zeng, Rensen

    2015-01-07

    Plant protease inhibitors (PIs) are natural plant defense proteins that inhibit proteases of invading insect herbivores. However, their anti-insect efficacy is determined not only by their potency toward a vulnerable insect system but also by the response of the insect to such a challenge. Through the long history of coevolution with their host plants, insects have developed sophisticated mechanisms to circumvent antinutritional effects of dietary challenges. Their response takes the form of changes in gene expression and the protein repertoire in cells lining the alimentary tract, the first line of defense. Research in insect digestive proteases has revealed the crucial roles they play in insect adaptation to plant PIs and has brought about a new appreciation of how phytophagous insects employ this group of molecules in both protein digestion and counterdefense. This review provides researchers in related fields an up-to-date summary of recent advances.

  14. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  15. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections.

  16. Hormone defense networking in rice: tales from a different world.

    Science.gov (United States)

    De Vleesschauwer, David; Gheysen, Godelieve; Höfte, Monica

    2013-10-01

    Recent advances in plant immunity research underpin the pivotal role of small-molecule hormones in regulating the plant defense signaling network. Although most of our understanding comes from studies of dicot plants such as Arabidopsis thaliana, new studies in monocots are providing additional insights into the defense-regulatory role of phytohormones. Here, we review the roles of both classical and more recently identified stress hormones in regulating immunity in the model monocot rice (Oryza sativa) and highlight the importance of hormone crosstalk in shaping the outcome of rice-pathogen interactions. We also propose a defense model for rice that does not support a dichotomy between the pathogen lifestyle and the effectiveness of the archetypal defense hormones salicylic acid (SA) and jasmonic acid (JA).

  17. A Segment Level Study of Defense Industry Capital Investment.

    Science.gov (United States)

    1985-12-01

    and James Tobin. "Pitfalls in Financial Model Building," American Economic Review , 58: 99-122 (May 1968). 10. Brock, Horace R. Accounting Principles...Function," I Econometrica, 28: 1-29 (January 1960). 16. "Investment Plans and Realizations," American Economic Review , 52: 190-203 (May 1962). 17...34Investment: Fact and Fancy," American Economic Review , 53: 237-246 (May 1963). 18. Gansler, Jaques S. The Defense Industry. Cambridge MA: Mit Press, 1980

  18. A Transactions Cost Economics Approach to Defense Acquisition Management

    Science.gov (United States)

    2006-12-30

    and economic organization. American Economic Review , 62, 777-795. Ashby, W. R. (1960). An introduction to cybernetics. London: Chapman & Hall... American Economic Review , 77, 168-185. Kadish et al. (2005, December). Defense acquisition performance assessment for the Acting Deputy Secretary...k^s^i=mlpqdo^ar^qb=p`elli= = Krueger, A. (1974). The political economy of the rent-seeking society. American Economic Review , 64, 291-303. Levy, B

  19. Reviews

    Science.gov (United States)

    2004-03-01

    WEB WATCH (204) Try unearthing some interesting information about archaeology BOOK REVIEWS (206) Teaching and assessing practical skills Book Review: Learn to drive with Sir Isaac Newton DVD REVIEW (207) Bring some sunshine into the classroom EQUIPMENT REVIEWS (208) Robust air puck takes a kicking Flowlog offers sensing options plus multimode datalogging Mastering Chladni figures takes practice but it offers surprises

  20. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  1. Defense Base Realignment and Closure Account for the Defense Personnel Support Center, the Defense Clothing Factory, and the Naval Aviation Depot Pensacola

    Science.gov (United States)

    1996-11-25

    outplacement center. Additionally, adjusting accounting entries must be reviewed for accuracy once Defense Contract Management District North Central is...that the Office of Executive Director, Human Resources, issue guidance for outplacement services to future BRAC activities scheduled for closure...Management concurred and stated that the DLA Civilian Personnel Support Office is developing an agency outplacement guide. 15 Appendix C. Background of

  2. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  3. QDR Analysis: Lessons Learned and Future Directions Mini- Symposium

    Science.gov (United States)

    1999-07-02

    unconventional threats including terrorism, or chemical and biological warfare; but also included the capacity of an enemy to strike at us in...Reserve Component "* Lack of centralized database on utilization of Army forces in previous missions EXISTANCE AND ACCESS TO DATABSE IS CRITICAL LATE START...Potential A list threats (cont’d) - Disposition of past Warsaw Pact Countries - WMD legacy in Russia "* Nuclear "* Chemical /biological threat

  4. The DoD Manufacturing Technology Program Strategic Plan: Delivering Defense Affordability

    Science.gov (United States)

    2009-03-01

    laboratories and RDECs to RDECOM SOSI. The first level of review for ATO-Ms is the Warfighter Technical Council ( WTC ). The WTC is a one-star level body that...and cost. Tracked efforts: this category consists of smaller stand-alone ManTech projects. Typically, the WTC approves tracked efforts...National Defense Authorization Act NDE non- destructive examination NDIA National Defense Industrial Association NDS National Defense Strategy Net

  5. Secretary of Defense Report to Congress. Actions to Accelerate the Movement to the New Workforce Vision

    Science.gov (United States)

    2016-06-07

    President of the Senate Washington DC 20510 Dear Mr. President: Section 912(c) of the National Defense Authorization Act for Fiscal Year 1998 directs the...Technology), as discussed with your staff, established a Defense Science Board Sub-Task Force on the Acquisition Workforce to conduct an independent...letter. I have reviewed the Defense Science Board (DSB) report, have fully considered the DSB’s conclusions and recommendations, and have incorporated the

  6. Extracellular DNA: the tip of root defenses?

    Science.gov (United States)

    Hawes, Martha C; Curlango-Rivera, Gilberto; Wen, Fushi; White, Gerard J; Vanetten, Hans D; Xiong, Zhongguo

    2011-06-01

    This review discusses how extracellular DNA (exDNA) might function in plant defense, and at what level(s) of innate immunity this process might operate. A new role for extracellular factors in mammalian defense has been described in a series of studies. These studies reveal that cells including neutrophils, eosinophils, and mast cells produce 'extracellular traps' (ETs) consisting of histone-linked exDNA. When pathogens are attracted to such ETs, they are trapped and killed. When the exDNA component of ETs is degraded, trapping is impaired and resistance against invasion is reduced. Conversely, mutation of microbial genes encoding exDNases that degrade exDNA results in loss of virulence. This discovery that exDNases are virulence factors opens new avenues for disease control. In plants, exDNA is required for defense of the root tip. Innate immunity-related proteins are among a group of >100 proteins secreted from the root cap and root border cell populations. Direct tests revealed that exDNA also is rapidly synthesized and exported from the root tip. When this exDNA is degraded by the endonuclease DNase 1, root tip resistance to fungal infection is lost; when the polymeric structure is degraded more slowly, by the exonuclease BAL31, loss of resistance to fungal infection is delayed accordingly. The results suggest that root border cells may function in a manner analogous to that which occurs in mammalian cells.

  7. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  8. The "False Memory" Defense: Using Disinformation and Junk Science In and Out of Court.

    Science.gov (United States)

    Whitfield, Charles L.

    2001-01-01

    Describes a seemingly sophisticated, but mostly contrived and often erroneous "false memory" defense, and compares it in a brief review to what the science says about the effect of trauma on memory. Each of 22 of the more commonly used components of this defense is described and discussed with respect to what the science says about them.…

  9. 32 CFR 724.221 - Scheduling of discharge reviews.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Scheduling of discharge reviews. 724.221 Section 724.221 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Authority/Policy for Departmental Discharge Review § 724.221 Scheduling of...

  10. Molecular and structural antioxidant defenses against oxidative stress in animals.

    Science.gov (United States)

    Pamplona, Reinald; Costantini, David

    2011-10-01

    In this review, it is our aim 1) to describe the high diversity in molecular and structural antioxidant defenses against oxidative stress in animals, 2) to extend the traditional concept of antioxidant to other structural and functional factors affecting the "whole" organism, 3) to incorporate, when supportable by evidence, mechanisms into models of life-history trade-offs and maternal/epigenetic inheritance, 4) to highlight the importance of studying the biochemical integration of redox systems, and 5) to discuss the link between maximum life span and antioxidant defenses. The traditional concept of antioxidant defenses emphasizes the importance of the chemical nature of molecules with antioxidant properties. Research in the past 20 years shows that animals have also evolved a high diversity in structural defenses that should be incorporated in research on antioxidant responses to reactive species. Although there is a high diversity in antioxidant defenses, many of them are evolutionary conserved across animal taxa. In particular, enzymatic defenses and heat shock response mediated by proteins show a low degree of variation. Importantly, activation of an antioxidant response may be also energetically and nutrient demanding. So knowledge of antioxidant mechanisms could allow us to identify and to quantify any underlying costs, which can help explain life-history trade-offs. Moreover, the study of inheritance mechanisms of antioxidant mechanisms has clear potential to evaluate the contribution of epigenetic mechanisms to stress response phenotype variation.

  11. The interplay of glutathione-related processes in antioxidant defense

    NARCIS (Netherlands)

    Cnubben, N.H.P.; Rietjens, I.M.C.M.; Wortelboer, H.; Zanden, J.J. van; Bladeren, P.J. van

    2001-01-01

    This review summarizes current knowledge on glutathione (GSH) associated cellular processes that play a central role in defense against oxidative stress. GSH itself is a critical factor in maintaining the cellular redox balance and has been demonstrated to be involved in regulation of cell signallin

  12. Who’s in Charge? Defense Policy Formation in Japan

    Science.gov (United States)

    2010-09-01

    Hongo , DPJ shows stress fractures under pressure of leadership, August 8, 2009, http://search.japantimes.co.jp/cgi-bin/nn20090808f1.html (accessed...ballistic shield.” September 1, 2000. Jane’s International Defense Review. http://www4.janes.com/subscribe (accessed August 18, 2010). Hongo , Jun

  13. Spanish Defense Policy under the Socialist Government 1982-1990

    Science.gov (United States)

    1990-12-01

    further, given the right conditions. Critics fail to realize that a complex web of historical and domestic political factors have fixed the Spanish...34 International Defense Review 21 (April 1988): 566. 78 The State-owned Empresa Nacional BazAn de Construcciones for instance, built and is upgrading the

  14. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  15. Colors and Some Morphological Traits as Defensive Mechanisms in Anurans

    Directory of Open Access Journals (Sweden)

    Luís Felipe Toledo

    2009-01-01

    Full Text Available Anurans may be brightly colored or completely cryptic. Generally, in the former situation, we are dealing with aposematism, and the latter is an example of camouflage. However, these are only simple views of what such colorations really mean and which defensive strategy is implied. For instance, a brightly colored frog may be part of a mimicry ring, which could be either Batesian, Müllerian, or Browerian. These are only examples of the diversity of color-usage systems as defensive strategies. Unfortunately, reports on the use of colors as defensive mechanisms are widespread in the available literature, and the possible functions are rarely mentioned. Therefore, we reviewed the literature and added new data to this subject. Then, we the use of colors (as defensive mechanism into categories. Mimicry was divided into the subcategories camouflage, homotypy, and nondeceitful homotypy, and these groups were also subcategorized. Dissuasive coloration was divided into behavioral display of colors, polymorphism, and polyphenism. Aposematism was treated apart, but aposematic colorations may be present in other defensive strategies. Finally, we propose functions and forms of evolution for some color systems in post-metamorphic anurans and hope that this review can be the basis for future research, even on other animal groups.

  16. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  17. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  18. Defense Acquisition Research Journal. Volume 24, Number 1, Issue 80

    Science.gov (United States)

    2017-01-01

    87(3), 333–347. Henderson, R. (1994). Managing innovation in the information age. Harvard Business Review , 72(1), 100–107. Information Technology...VA: Author. Kaplan, R. S., & Norton, D. P. (1992). The Balanced Scorecard—Measures that drive performance. Harvard Business Review , 70(1), 71–79...Strategy Dr. J. Ronald Fox Harvard Business School Mr. David Gallop Defense Acquisition University Dr. Jacques Gansler University of Maryland RADM

  19. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  20. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  1. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  2. 78 FR 70025 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-11-22

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE..., withhold, or withdraw purchasing system approval at the conclusion of a purchasing system review. Withdrawal of purchasing system approval would necessitate Government consent to individual...

  3. Reviews.

    Science.gov (United States)

    Greenleaf, Floyd; And Others

    1986-01-01

    Reviews eight textbooks, readers, and books. Topics include Latin America, colonial America, the Carolinians, women in French textbooks, the Vikings, the Soviet Union, nineteenth-century Black America, and Ernest Rutherford. (TRS)

  4. Reviews.

    Science.gov (United States)

    Science Teacher, 1987

    1987-01-01

    Provides reviews of four computer software packages designed for use in science education. Describes courseware dealing with a variety of tips for teaching physics concepts, chemical reactions in an aqueous solution, mitosis and meiosis, and photosynthesis. (TW)

  5. Review

    African Journals Online (AJOL)

    2016-01-01

    Jan 1, 2016 ... medicine and biology here an attempt has been made to review the synthesis and biological ... insight into the recent applications of Mannich reaction and its ...... Various thermodynamic parameters were also determined to ...

  6. Root exudates: the hidden part of plant defense.

    Science.gov (United States)

    Baetz, Ulrike; Martinoia, Enrico

    2014-02-01

    The significance of root exudates as belowground defense substances has long been underestimated, presumably due to being buried out of sight. Nevertheless, this chapter of root biology has been progressively addressed within the past decade through the characterization of novel constitutively secreted and inducible phytochemicals that directly repel, inhibit, or kill pathogenic microorganisms in the rhizosphere. In addition, the complex transport machinery involved in their export has been considerably unraveled. It has become evident that the profile of defense root exudates is not only diverse in its composition, but also strikingly dynamic. In this review, we discuss current knowledge of the nature and regulation of root-secreted defense compounds and the role of transport proteins in modulating their release. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. [Physiological importance of calpains in gastric mucosal defense].

    Science.gov (United States)

    Hata, Shoji; Sorimachi, Hiroyuki

    2011-06-01

    The continuous and/or improper ingestion of irritants, including alcohol, NSAIDs, and Helicobacter pylori, often leads to serious gastropathies, affecting a wide range of people. A complex gastric defense system works to protect against these threats, for example by secreting mucus. Recently, by analysis of gene targeting mice for two gastrointestinal-tract-specific calpains, calpain-8 and calpain-9, we have demonstrated that they are cooperatively involved in the mucosal defense against stress-induced gastropathies. Calpains-8 and -9 are members of Ca2+ -dependent intracellular proteases comprising a superfamily in almost all eukaryotes, and form a functional complex, "G-calpain", expressed specifically in the mucus-producing cells. In this review, we show our recent results on calpains -8 and -9, and discuss gastric mucosal defense mechanisms involving them.

  8. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  9. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  10. Reviews

    Directory of Open Access Journals (Sweden)

    1990-06-01

    Full Text Available Michael Issacharoff. Discourse as Performance . Stanford: Stanford University Press, 1989. vii + 161 pp. Reviewed by Gerald Prince, University of Pennsylvania Thomas M. Kavanagh, ed. The Limits of Theory . Stanford: Stanford University Press, 1989. 254 pp. Reviewed by André J.M. Prévos, Pennsylvania State University, Worthington Scranton Campus Wendy B. Faris. Labyrinths of Language: Symbolic Landscape and Narrative Design in Modern Fiction . Baltimore and London: The Johns Hopkins Press, 1988. 242 pp. Reviewed by Carol Rigolot, Princeton University Eve Tavor Bannet. Structuralism and the Logic of Dissent: Barthes, Derrida, Foucault, Lacan . Urbana and Chicago: University of Illinois Press, 1989. 299 pp. Reviewed by Andrew J. McKenna, Loyoyla University of Chicago Gary Saul Morson and Caryl Emerson, eds. Rethinking Bakhtin: Extensions and Challenges . Evanston: Northwestern University Press, 1989. Reviewed by Lewis Bagby, University of Wyoming Fernando Moreno. Carlos Fuentes. La mort d'Artemio Cruz: entre le mythe et l'histoire . Paris: Editions Caribeennes, 1989. Reviewed by Susan Levine, Lawrence, Kansas

  11. Epigenetic Control of Defense Signaling and Priming in Plants

    Science.gov (United States)

    Espinas, Nino A.; Saze, Hidetoshi; Saijo, Yusuke

    2016-01-01

    Immune recognition of pathogen-associated molecular patterns or effectors leads to defense activation at the pathogen challenged sites. This is followed by systemic defense activation at distant non-challenged sites, termed systemic acquired resistance (SAR). These inducible defenses are accompanied by extensive transcriptional reprogramming of defense-related genes. SAR is associated with priming, in which a subset of these genes is kept at a poised state to facilitate subsequent transcriptional regulation. Transgenerational inheritance of defense-related priming in plants indicates the stability of such primed states. Recent studies have revealed the importance and dynamic engagement of epigenetic mechanisms, such as DNA methylation and histone modifications that are closely linked to chromatin reconfiguration, in plant adaptation to different biotic stresses. Herein we review current knowledge regarding the biological significance and underlying mechanisms of epigenetic control for immune responses in plants. We also argue for the importance of host transposable elements as critical regulators of interactions in the evolutionary “arms race” between plants and pathogens. PMID:27563304

  12. Epigenetic control of defense signaling and priming in plants

    Directory of Open Access Journals (Sweden)

    Nino Asuela Espinas

    2016-08-01

    Full Text Available Immune recognition of pathogen-associated molecular patterns or effectors leads to defense activation at the pathogen challenged sites. This is followed by systemic defense activation at distant non-challenged sites, termed systemic acquired resistance (SAR. These inducible defenses are accompanied by extensive transcriptional reprogramming of defense-related genes. SAR is associated with priming, in which a subset of these genes is kept at a poised state to facilitate subsequent transcriptional regulation. Transgenerational inheritance of defense-related priming in plants indicates the stability of such primed states. Recent studies have revealed the importance and dynamic engagement of epigenetic mechanisms, such as DNA methylation and histone modifications that are closely linked to chromatin reconfiguration, in plant adaptation to different biotic stresses. Herein we review current knowledge regarding the biological significance and underlying mechanisms of epigenetic control for immune responses in plants. We also argue for the importance of host transposable elements (TEs as critical regulators of interactions in the evolutionary arms race between plants and pathogens.

  13. 77 FR 2682 - Defense Federal Acquisition Regulation Supplement; DoD Voucher Processing

    Science.gov (United States)

    2012-01-19

    ... vouchers not selected for a pre-payment review will be considered to be provisionally approved and will be... after a pre-payment review. Interim vouchers not selected for a pre-payment review will be considered to... Regulation Supplement; DoD Voucher Processing AGENCY: Defense Acquisition Regulations System, Department...

  14. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  15. Plant defense against herbivorous pests: exploiting resistance and tolerance traits for sustainable crop protection

    Directory of Open Access Journals (Sweden)

    Carolyn Mitchell

    2016-07-01

    Full Text Available Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  16. Plant Defense against Herbivorous Pests: Exploiting Resistance and Tolerance Traits for Sustainable Crop Protection.

    Science.gov (United States)

    Mitchell, Carolyn; Brennan, Rex M; Graham, Julie; Karley, Alison J

    2016-01-01

    Interactions between plants and insect herbivores are important determinants of plant productivity in managed and natural vegetation. In response to attack, plants have evolved a range of defenses to reduce the threat of injury and loss of productivity. Crop losses from damage caused by arthropod pests can exceed 15% annually. Crop domestication and selection for improved yield and quality can alter the defensive capability of the crop, increasing reliance on artificial crop protection. Sustainable agriculture, however, depends on reduced chemical inputs. There is an urgent need, therefore, to identify plant defensive traits for crop improvement. Plant defense can be divided into resistance and tolerance strategies. Plant traits that confer herbivore resistance typically prevent or reduce herbivore damage through expression of traits that deter pests from settling, attaching to surfaces, feeding and reproducing, or that reduce palatability. Plant tolerance of herbivory involves expression of traits that limit the negative impact of herbivore damage on productivity and yield. Identifying the defensive traits expressed by plants to deter herbivores or limit herbivore damage, and understanding the underlying defense mechanisms, is crucial for crop scientists to exploit plant defensive traits in crop breeding. In this review, we assess the traits and mechanisms underpinning herbivore resistance and tolerance, and conclude that physical defense traits, plant vigor and herbivore-induced plant volatiles show considerable utility in pest control, along with mixed species crops. We highlight emerging approaches for accelerating the identification of plant defensive traits and facilitating their deployment to improve the future sustainability of crop protection.

  17. Antioxidative defense mechanisms in the aging brain

    Directory of Open Access Journals (Sweden)

    Jovanović Zorica

    2014-01-01

    Full Text Available Aging is an extremely complex, multifactorial process that is characterized by a gradual and continuous loss of physiological functions and responses, particularly marked in the brain. A common hallmark in aging and age-related diseases is an increase in oxidative stress and the failure of antioxidant defense systems. Current knowledge indicates that the level of glutathione progressively declines during aging. Because nerve cells are the longest-living cells that exhibit a high consumption rate of oxygen throughout an individual’s lifetime, the brain may be especially vulnerable to oxidative damage and this vulnerability increases during aging. In addition, the brain contains high concentrations of polyunsaturated fatty acids and transition metals and low antioxidative defense mechanisms. Although aging is an inevitable event, a growing volume of data confirms that antioxidant supplementation in combination with symptomatic drug treatments reduces oxidative stress and improves cognitive function in aging and age-related diseases. The present review discusses the neuroprotective effects of antioxidants in the aging brain.

  18. Reviews

    OpenAIRE

    Revista alicantina de estudios ingleses

    1995-01-01

    Contiene: M. Carmen África Vidal Claramonte. Traducción, manipulación, desconstrucción. Colección Biblioteca Filológica de Salamanca. Salamanca: Ediciones Colegio de España, 1995 / reviewed by Enrique Alcaraz Varó; Diccionario de uso inglés-español/Spanish-English. Directed by Aquilino Sánchez. Madrid: SGEL, 1993, 450 pp. Diccionario de uso pocket inglés-español/Spanish- English. Directed by Aquilino Sánchez. Madrid: SGEL, 1993, 274 pages / reviewed by Miguel Ángel Campos Pardillo...

  19. 75 FR 67696 - Membership of the Performance Review Board

    Science.gov (United States)

    2010-11-03

    ... of the Secretary Membership of the Performance Review Board AGENCY: Defense Finance and Accounting... Performance Review Board (PRB) of the Defense Finance and Accounting Service (DFAS). The publication of PRB...: Denise Thornburg, DFAS SES Program Manager, Defense Finance and Accounting Service, Arlington,...

  20. Reviews.

    Science.gov (United States)

    Journal of Chemical Education, 1988

    1988-01-01

    Reviews three computer software packages for chemistry education including "Osmosis and Diffusion" and "E.M.E. Titration Lab" for Apple II and "Simplex-V: An Interactive Computer Program for Experimental Optimization" for IBM PC. Summary ratings include ease of use, content, pedagogic value, student reaction, and…

  1. Reviews

    NARCIS (Netherlands)

    Sleumer, H.; Steenis, van C.G.G.J.

    1966-01-01

    An exhaustive Flora of Delhi, compiled by J. K. Maheshwari, was published by C.S.I.R. in 1963 (for a review see Blumea 13, 1965, p. 174). During the compilation of that flora, 278 line-drawings, illustrating the habits and chief features of the plants found in Delhi, were prepared; they form a welco

  2. Reviews

    NARCIS (Netherlands)

    NN,

    1998-01-01

    BALGOOY, M.M.J, VAN. 1998. Malesian Seed Plants. Volume 2. Portraits of tree families. 307 pp., numerous text figures. Published by Rijksherbarium/Hortus Botanicus, Leiden. ISBN 90-71236-36-6. Paperback. Price: NLG 100.00. This is the second volume of a trilogy [see the review of ‘Spot-characters’ b

  3. Reviews.

    Science.gov (United States)

    Repak, Arthur J.; And Others

    1988-01-01

    Computer software, audiovisuals, and books are reviewed. Includes topics on interfacing, ionic equilibrium, space, the classification system, Acquired Immune Disease Syndrome, evolution, human body processes, energy, pesticides, teaching school, cells, and geological aspects. Availability, price, and a description of each are provided. (RT)

  4. Review

    DEFF Research Database (Denmark)

    Van Den Hazel, H B; Kielland-Brandt, Morten; Winther, Jakob R.

    1996-01-01

    The yeast vacuole, which is equivalent to the lysosome of higher eukaryotes, is one of the best characterized degradative organelles. This review describes the biosynthesis and function of yeast vacuolar proteases. Most of these enzymes are delivered to the vacuole via the early compartments...

  5. Review

    NARCIS (Netherlands)

    Wilde, de W.J.J.O.

    1994-01-01

    This review marks the appearance of Volume II, after the publication of Volume I, Pteridophytes and Gymnosperms, in 1990; several more volumes are expected in the future before completion of the Vascular plants as a whole. The present volume contains 73 families out of some 250-500 families which ca

  6. Reviews

    NARCIS (Netherlands)

    Adema, Frits

    1995-01-01

    This is the second volume of a revision of Tabernaemontana (Apocynaceae). The volume covers the New World species (44) and the genus Stemmadenia (10 species). This part of the revision of Tabernaemontana comes up to the high standards set in the first volume [see the review by Leenhouts, Blumea 38 (

  7. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  8. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  9. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  10. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  11. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  12. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  13. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  14. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  15. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  16. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  17. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  18. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  19. Free radicals, antioxidant defense systems, and schizophrenia.

    Science.gov (United States)

    Wu, Jing Qin; Kosten, Thomas R; Zhang, Xiang Yang

    2013-10-01

    The etiopathogenic mechanisms of schizophrenia are to date unknown, although several hypotheses have been suggested. Accumulating evidence suggests that excessive free radical production or oxidative stress may be involved in the pathophysiology of schizophrenia as evidenced by increased production of reactive oxygen or decreased antioxidant protection in schizophrenic patients. This review aims to summarize the basic molecular mechanisms of free radical metabolism, the impaired antioxidant defense system and membrane pathology in schizophrenia, their interrelationships with the characteristic clinical symptoms and the implications for antipsychotic treatments. In schizophrenia, there is accumulating evidence of altered antioxidant enzyme activities and increased levels of lipid peroxidation, as well as altered levels of plasma antioxidants. Moreover, free radical-mediated abnormalities may contribute to specific aspects of schizophrenic symptomatology and complications of its treatment with antipsychotic drugs, as well as the development of tardive dyskinesia (TD). Finally, the potential therapeutic strategies implicated by the accumulating data on oxidative stress mechanisms for the treatment of schizophrenia are discussed.

  20. 75 FR 60424 - Submission for OMB Review; Comment Request

    Science.gov (United States)

    2010-09-30

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Submission for OMB Review; Comment Request ACTION: Notice. The Department of Defense... used to verify the professional and ecclesiastical qualifications of Religious Ministry...

  1. Reviews

    Directory of Open Access Journals (Sweden)

    Wilma D'Ambrosio

    2013-12-01

    Full Text Available In the wake of the great interest raised by Maurizio Gabrieli’s review of the book Musical Networks. Parallel Distributed Perception and Performance (various authors; edited by Niall Griffith and Peter M. Todd, MA: MIT Press, Cambridge, 1999 which appeared in our last issue of Analitica, the present review section no longer follows the format used up to now but offers a survey of texts dedicated to the relationship between music analysis and technology. This decision was also made as a result of the request for more information on the subject by many of our readers. In coming issues we plan to extend this bibliography and comment on at least some of the most interesting texts published in recent years, among which we would immediately like to draw attention to the important work by Baroni, Dalmonte and Jacoboni published in 1999 (Le regole della musica. Indagine sui meccanismi della comunicazione, Torino, I Manuali EDT/SIdM, 1999.

  2. Reviews

    Directory of Open Access Journals (Sweden)

    Philip Barker

    1998-12-01

    Full Text Available There were two copy-editing blunders in Clive Betts's review, in ALT-J 5 (3, of Shirley Fletcher's Designing Competence-Based Training, one in paragraph 2 line 1, the other in paragraph 3 line 8. The errors (the result of the Editor, Gabriel Jacobs, trying to perform a final proof of the journal at lightning speed in order to meet the printing deadline, and not of any mistake on the part of either Philip Barker or the University of Wales Press hardly affected meaning, but the fact that they appeared in a review of a book on competence makes the embarrassment all the more telling. The Editor apologizes, and thanks eagle-eyed readers. He has decided to read the book in the hope that such errors will not recur.

  3. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  4. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  5. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  6. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes.

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens.

  7. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens. PMID:28360923

  8. Reviews

    Directory of Open Access Journals (Sweden)

    Philip Barker

    1997-12-01

    Full Text Available For a variety of different reasons, increasing use is now being made of the Internet for the delivery of course materials and/or for the support of teaching and learning activities. The details of the mechanisms used will obviously vary from one situation to another, depending upon the types of problem to be addressed. These may involve mentoring, teaching, monitoring, recording, tutoring, assessing, and so on. In this book, the author attempts to review the educational and administrative considerations of offering courses, course materials or course delivery via the Internet.

  9. Exemplar Practices for Department of Defense Technology Transfer

    Science.gov (United States)

    2013-01-01

    as Amazon, Discovery Studios, Google, Under Armour , McCormick, and Cisco are invited to speak to researchers about innovation, how they manage it...commercialization and marketing strategies for each of the selected DoD technologies; • actively markets these technologies to industry...Publication This work was conducted by the Institute for Defense Analyses (IDA) under contract DASW01-04-C-0003, Task AI-6-3558 “Review of DoD

  10. Defense Acquisitions: How and Where DOD Spends Its Contracting Dollars

    Science.gov (United States)

    2015-04-30

    Nuclear Reactors 45 - Plumbing, Heating, and Sanitation Equipment 46 - Water Purification and Sewage Treatment Equipment 47 - Pipe, Tubing, Hose...587681. pdf . Based also on CRS review of data found in FPDS-NG. 5 FPDS-NG lists the General Accounting Office, which in 2004 was renamed the Government...Version_1.4_specs/FPDSNG_DataDictionary_V1.4. pdf . 18 U.S. Government Accountability Office, Defense Acquisitions: Further Actions Needed to Improve

  11. The Venturia Apple Pathosystem: Pathogenicity Mechanisms and Plant Defense Responses

    Directory of Open Access Journals (Sweden)

    Gopaljee Jha

    2009-01-01

    Full Text Available Venturia inaequalis is the causal agent of apple scab, a devastating disease of apple. We outline several unique features of this pathogen which are useful for molecular genetics studies intended to understand plant-pathogen interactions. The pathogenicity mechanisms of the pathogen and overview of apple defense responses, monogenic and polygenic resistance, and their utilization in scab resistance breeding programs are also reviewed.

  12. Defense Partnerships: Documenting Trends and Emerging Topics for Action

    Science.gov (United States)

    2015-03-01

    NGOs, and private-sector project databases , National Defense University researchers have identified 124 examples of effective P4s across a wide...placed on DOD in the new strategic environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000... Biodiversity ,” press release, May 21, 2010, available at <http://farmingfirst.org/tag/public-private-partnership/>. 9 Wells and Bendett. 10 Martha Amram

  13. Defense Acquisition Research Journal. Volume 21, Number 3, Issue 70

    Science.gov (United States)

    2014-07-01

    Studies of Science, 30(5), 737–757. Porter , M. E. (1980). Value chain analysis. London: Oxford Press Ltd. Porter , M. E. (2008). The five competitive...2007). Reinventing project management: The diamond approach to successful growth and innovation. Boston: Harvard Business Review Press. 736Defense...can be used in a CBA (e.g., to analyze threats, etc.). Generally criticized for its lack of depth and rigor. Porter’s 5 Forces Analysis ( Porter

  14. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  15. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  16. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  17. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  18. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  19. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  20. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  1. REVIEW

    Directory of Open Access Journals (Sweden)

    N. F. Bugay

    2016-01-01

    Full Text Available Review of Study Guide: «KUBAN STUDIES. KUBAN IN THE XX CENTURY – THE BEGINNING OF THE XXI CENTURY. HISTORY. PEOPLE SOCIETY.» Study Guide (electronic version to grade 11 of educational institutions. A.A. Zaitsev, E.V. Morozova, N.V. Plotichkina and O.A. Borisko, M.A. Egupova, A.B. Sazantovich, I.S. Bashkakov, T.I. Belyaeva. Krasnodar: Perspectives on Education, 2015.In a review of a thorough analysis of all the component parts of the book that will surely attract the attention first of all history teachers and students in 11 classes of educational institutions of the region. A comprehensive presentation of the material significantly adds to the course of modern history of Russia and enrich its specific material about the life of the Russian Cossacks and as part of the – of the Kuban Cossacks. Along with the reference materials of pure nature that is needed for this kind of research are presented and informative sections on the socio-economic condition of the region, the interests of different strata of the population, the multinational factor and the religious beliefs of the population. Cossacks in its warlike mentality, and this trait is passed from generation to generation. But the aspirations of the Cossacks in this respect are transparent – protecting the integrity of the Fatherland, faithful service to him, boundless devotion to the Orthodox faith. The important story is linked with the identity of the Russian Cossacks, its mentality, "Kuban" specificity, especially for the rule on different sections of history, to various of its exponents, both military and civilians. As is known from the Cossacks received a development institute of judging for each Ataman smoking, working village judge. Cossacks series comply with the law as applied his own family, and chic plan – in the state, fought against offenders, it is considered in relation to the Cossacks and representatives of different ethnic communities living with the Cossacks, and

  2. Plant innate immunity: An updated insight into defense mechanism

    Indian Academy of Sciences (India)

    Mehanathan Muthamilarasan; Manoj Prasad

    2013-06-01

    Plants are invaded by an array of pathogens of which only a few succeed in causing disease. The attack by others is countered by a sophisticated immune system possessed by the plants. The plant immune system is broadly divided into two, viz. microbial-associated molecular-patterns-triggered immunity (MTI) and effector-triggered immunity (ETI). MTI confers basal resistance, while ETI confers durable resistance, often resulting in hypersensitive response. Plants also possess systemic acquired resistance (SAR), which provides long-term defense against a broad-spectrum of pathogens. Salicylic-acid-mediated systemic acquired immunity provokes the defense response throughout the plant system during pathogen infection at a particular site. Trans-generational immune priming allows the plant to heritably shield their progeny towards pathogens previously encountered. Plants circumvent the viral infection through RNA interference phenomena by utilizing small RNAs. This review summarizes the molecular mechanisms of plant immune system, and the latest breakthroughs reported in plant defense. We discuss the plant–pathogen interactions and integrated defense responses in the context of presenting an integral understanding in plant molecular immunity.

  3. Modulation of Intestinal Epithelial Defense Responses by Probiotic Bacteria.

    Science.gov (United States)

    Wan, L Y M; Chen, Z J; Shah, N P; El-Nezami, H

    2016-12-09

    Probiotics are live microorganisms, which when administered in food confer numerous health benefits. In previous studies about beneficial effects of probiotic bacteria to health, particularly in the fields of intestinal mucosa defense responses, specific probiotics, in a strain-dependent manner, show certain degree of potential to reinforce the integrity of intestinal epithelium and/or regulate some immune components. The mechanism of probiotic action is an area of interest. Among all possible routes of modulation by probiotics of intestinal epithelial cell-mediated defense responses, modulations of intestinal barrier function, innate, and adaptive mucosal immune responses, as well as signaling pathways are considered to play important role in the intestinal defense responses against pathogenic bacteria. This review summarizes the beneficial effects of probiotic bacteria to intestinal health together with the mechanisms affected by probiotic bacteria: barrier function, innate, and adaptive defense responses such as secretion of mucins, defensins, trefoil factors, immunoglobulin A (IgA), Toll-like receptors (TLRs), cytokines, gut associated lymphoid tissues, and signaling pathways.

  4. Defense Headquarters: Geographic Combatant Commands Rely on Subordinate Commands for Mission Management and Execution

    Science.gov (United States)

    2016-06-30

    Additionally, in November 2015, the Secretary of Defense directed a review of DOD’s organizational structures and is considering a number of actions... changes have occurred since the 2011 Unified Command Plan was published. Page 2 GAO-16-652R Defense Headquarters sufficiently reliable for the...commands. • We found that the combatant commands utilize subordinate commands to execute assigned missions. The organizational construct DOD created

  5. Should the Defense Fuel Supply Center Trade in the Futures Market?

    Science.gov (United States)

    1993-12-01

    Market Research and Analysis . This department employs numerous industry economists, market analysts, and Strategic Petroleum Reserve experts. They provide...Contract Review. The actual buying offices include the 2 1nterview between C. Lee, Director of Market Research and Analysis , Defense Fuel Supply Center...redoubled their efforts to dramatically reduce military budgets. 4Interview between C. Lee, Director of Market Research and Analysis , Defense

  6. Defense AR Journal. Issue 56, Volume 17, Number 4. Measuring Programs and Progress

    Science.gov (United States)

    2010-10-01

    DEFENSE ACQUISITION REVIEW JOURNAL October 2010 Vol. 17 No. 4 | ISSUE 56 508 THE P-51 MUSTANG: A CASE STUDY IN DEFENSE ACQUISITION Alan Haggerty and Roy...time and money by exploring new test and analyses methods to assess aeromedical equipment for safety certification. The final article by Alan ...Fasanella, Tabiei, Brinkley , and Shemwell (2008) studied a crash test dummy model for NASA’s Orion crew module landings using FEA. Viisoreanu, Rutman, and

  7. Intrinsic and Innate Defenses of Neurons: Détente with the Herpesviruses.

    Science.gov (United States)

    Enquist, Lynn W; Leib, David A

    2017-01-01

    Neuroinvasive herpesviruses have evolved to efficiently infect and establish latency in neurons. The nervous system has limited capability to regenerate, so immune responses therein are carefully regulated to be nondestructive, with dependence on atypical intrinsic and innate defenses. In this article we review studies of some of these noncanonical defense pathways and how herpesvirus gene products counter them, highlighting the contributions that primary neuronal in vitro models have made to our understanding of this field. Copyright © 2016 American Society for Microbiology.

  8. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  9. Inorganic chemistry of defensive peroxidases in the human oral cavity.

    Science.gov (United States)

    Ashby, M T

    2008-10-01

    The innate host response system is comprised of various mechanisms for orchestrating host response to microbial infection of the oral cavity. The heterogeneity of the oral cavity and the associated microenvironments that are produced give rise to different chemistries that affect the innate defense system. One focus of this review is on how these spatial differences influence the two major defensive peroxidases of the oral cavity, salivary peroxidase (SPO) and myeloperoxidase (MPO). With hydrogen peroxide (H(2)O(2)) as an oxidant, the defensive peroxidases use inorganic ions to produce antimicrobials that are generally more effective than H(2)O(2) itself. The concentrations of the inorganic substrates are different in saliva vs. gingival crevicular fluid (GCF). Thus, in the supragingival regime, SPO and MPO work in unison for the exclusive production of hypothiocyanite (OSCN(-), a reactive inorganic species), which constantly bathes nascent plaques. In contrast, MPO is introduced to the GCF during inflammatory response, and in that environment it is capable of producing hypochlorite (OCl(-)), a chemically more powerful oxidant that is implicated in host tissue damage. A second focus of this review is on inter-person variation that may contribute to different peroxidase function. Many of these differences are attributed to dietary or smoking practices that alter the concentrations of relevant inorganic species in the oral cavity (e.g.: fluoride, F(-); cyanide, CN(-); cyanate, OCN(-); thiocyanate, SCN(-); and nitrate, NO(3)(-)). Because of the complexity of the host and microflora biology and the associated chemistry, it is difficult to establish the significance of the human peroxidase systems during the pathogenesis of oral diseases. The problem is particularly complex with respect to the gingival sulcus and periodontal pockets (where the very different defensive stratagems of GCF and saliva co-mingle). Despite this complexity, intriguing in vitro and in vivo

  10. Japanese Scholars Review on Self-Defense Forces Participation in PKO Action%日本学术界关于自卫队参与PKO行动研究综述

    Institute of Scientific and Technical Information of China (English)

    张晓刚; 邹圣婴

    2016-01-01

    Japan’s self-defense forces (SDF) as a military reconstruction organization after World War II, it has undergone several periods of change. For Japanese society, the awareness, attention and research about SDF has evolved with the changes of the times. After World War II, American troops was stationed in Japan , which made Japanese government avoid the consumption of national defense during the cold war and rapidly completed the post-war recovery; Just because of the presence of the American troops, Japanese society has paid less at-tention to the existence and action of the SDF under the influence of the thought of peace. SDF really began to receive the attention of the society after the Gulf War and the subsequent participation in ”PKO Action”. Japanese scholars began to make the extensive researches on the function, scale, activities and some other things related to the SDF just following its participation in the United Nations peacekeeping activities and US troops military action. Among them, the research on PKO has an important reference value to the exploration on the domestic and international position of SDF, meanwhile, it also plays an important role in China’s participation in Peacekeeping operations and some other related research.%日本自卫队作为二战以后重新组建的军事组织,其自身经历了若干个时期的变化。而对于日本社会而言,关于自卫队的认识、关注以及研究也随着时代的变迁而发生演化。由于战后美国在日本进行驻军,使得日本在冷战期间可以避免因国防而消耗国力,从而快速完成战后的复苏;但也正是因为驻日美军的存在,使得日本社会在和平主义思潮的影响下较少关注过自卫队的存在及行动。而自卫队真正开始受到社会的重视则是始于海湾战争以及随后参与“PKO行动”1⃝等因素。在日本学术界,对于自卫队的职能、规模、活动以及其他相关问题的研究也随

  11. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  12. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  13. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  14. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  15. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  16. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  17. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  18. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  19. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  20. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  1. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  2. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  3. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  4. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  5. Soluble Host Defense Lectins in Innate Immunity to Influenza Virus

    Directory of Open Access Journals (Sweden)

    Wy Ching Ng

    2012-01-01

    Full Text Available Host defenses against viral infections depend on a complex interplay of innate (nonspecific and adaptive (specific components. In the early stages of infection, innate mechanisms represent the main line of host defense, acting to limit the spread of virus in host tissues prior to the induction of the adaptive immune response. Serum and lung fluids contain a range of lectins capable of recognizing and destroying influenza A viruses (IAV. Herein, we review the mechanisms by which soluble endogenous lectins mediate anti-IAV activity, including their role in modulating IAV-induced inflammation and disease and their potential as prophylactic and/or therapeutic treatments during severe IAV-induced disease.

  6. Strategic impasse offense, defense and deterence theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Cimbala, S.J.

    1989-01-01

    The book is divided into three parts: the first section, scrutinizes the relationship between offense and defense and examines SDI and more inclusive strategic defense matters. It also questions the connection between policy objectives and force, and explores the complication of externalities, such as relations with allies. In section two, Cimbala reviews the operational art likely to be employed by the Soviets in a conventionally fought European war and defines and appraised the sensor-cyber revolution in technology and its impacts on preferred strategies. The final part, considers was termination scenarios and related issues, including superpower competition in the Third World, and explains how issues of sovereignty effect deterrence, avoidance, and future super power relations.

  7. NOD1-Mediated Mucosal Host Defense against Helicobacter pylori

    Directory of Open Access Journals (Sweden)

    Tomohiro Watanabe

    2010-01-01

    Full Text Available Infection of the stomach with Helicobacter pylori is an important risk factor for gastritis, peptic ulcer, and gastric carcinoma. Although it has been well established that persistent colonization by H. pylori is associated with adaptive Th1 responses, the innate immune responses leading to these Th1 responses are poorly defined. Recent studies have shown that the activation of nucleotide-binding oligomerization domain 1 (NOD1 in gastric epithelial cells plays an important role in innate immune responses against H. pylori. The detection of H. pylori-derived ligands by cytosolic NOD1 induces several host defense factors, including antimicrobial peptides, cytokines, and chemokines. In this paper, we review the molecular mechanisms by which NOD1 contributes to mucosal host defense against H. pylori infection of the stomach.

  8. The role of earthworm defense mechanisms in ecotoxicity studies

    Directory of Open Access Journals (Sweden)

    R Roubalová

    2015-08-01

    Full Text Available Earthworms are important soil organisms that affect the soil structure by influencing organic and inorganic matter breakdown. Earthworms are in permanent contact with soil particles via their permeable skin and digestive tract and are thus strongly affected by pollutants present in the soil. Earthworms often live in very hostile environments with an abundant microflora and therefore have developed very potent defense mechanisms. These mechanisms have been described to be influenced by various types of organic and inorganic pollutants and also by the nanoparticles that reach the soil system. Reduced abilities of earthworms to protect themselves against pathogenic microorganisms result in lower reproduction rates and increased mortality. In this review, a summary of the up-to-date data describing the effects of contaminants on the natural defense barriers and immune system of earthworms is presented.

  9. Interleukin 17-Mediated Host Defense against Candida albicans

    Directory of Open Access Journals (Sweden)

    Florian Sparber

    2015-08-01

    Full Text Available Candida albicans is part of the normal microbiota in most healthy individuals. However, it can cause opportunistic infections if host defenses are breached, with symptoms ranging from superficial lesions to severe systemic disease. The study of rare congenital defects in patients with chronic mucocutaneous candidiasis led to the identification of interleukin-17 (IL-17 as a key factor in host defense against mucosal fungal infection. Experimental infections in mice confirmed the critical role of IL-17 in mucocutaneous immunity against C. albicans. Research on mouse models has also contributed importantly to our current understanding of the regulation of IL-17 production by different cellular sources and its effector functions in distinct tissues. In this review, we highlight recent findings on IL-17-mediated immunity against C. albicans in mouse and man.

  10. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  11. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  12. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  13. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  14. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  15. Activation of Defense Mechanisms against Pathogens in Mosses and Flowering Plants.

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2013-02-04

    During evolution, plants have developed mechanisms to cope with and adapt to different types of stress, including microbial infection. Once the stress is sensed, signaling pathways are activated, leading to the induced expression of genes with different roles in defense. Mosses (Bryophytes) are non-vascular plants that diverged from flowering plants more than 450 million years ago, allowing comparative studies of the evolution of defense-related genes and defensive metabolites produced after microbial infection. The ancestral position among land plants, the sequenced genome and the feasibility of generating targeted knock-out mutants by homologous recombination has made the moss Physcomitrella patens an attractive model to perform functional studies of plant genes involved in stress responses. This paper reviews the current knowledge of inducible defense mechanisms in P. patens and compares them to those activated in flowering plants after pathogen assault, including the reinforcement of the cell wall, ROS production, programmed cell death, activation of defense genes and synthesis of secondary metabolites and defense hormones. The knowledge generated in P. patens together with comparative studies in flowering plants will help to identify key components in plant defense responses and to design novel strategies to enhance resistance to biotic stress.

  16. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  17. 32 CFR 2400.45 - Information Security Program Review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Program Review. 2400.45 Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science...

  18. Life of an Idea: DLIFLC Annual Program Review.

    Science.gov (United States)

    Woytak, Lidia

    1999-01-01

    Discusses the Defense Language Institute's Foreign Language Center's (DLIFLC) annual program review. Representatives from the Army, Air Force, Marine Corps, HQ TRADOC, National Security Agency, Defense Intelligence Agency, and the Office of the Assistant Secretary of Defense for Command, Control, Communication, and Intelligence met to discuss…

  19. 76 FR 62046 - Membership of the Performance Review Board

    Science.gov (United States)

    2011-10-06

    ...), Defense Finance and Accounting Service. ACTION: Notice. SUMMARY: This notice announces the appointment of the members of the Performance Review Board (PRB) of the Defense Finance and Accounting Service (DFAS... Manager, Defense Finance and Accounting Service, Arlington, Virginia, (303) 337-3288....

  20. 32 CFR 70.8 - Discharge review procedures.

    Science.gov (United States)

    2010-07-01

    ... National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY AND CIVILIAN... review. (6) Failure to appear at a hearing or respond to a scheduling notice. (i) Except as otherwise... copies of their military personnel records by submitting a General Services Administration Standard...

  1. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  2. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  3. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  4. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  5. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  6. The "False Memory" DefenseUsing Disinformation and Junk Science In and Out of Court.

    Science.gov (United States)

    Whitfield, C L

    2000-01-01

    This article describes a seemingly sophisticated, but mostly contrived and often erroneous “false memory” defense, and compares it in a brief review to what the science says about the effect of trauma on memory. Child sexual abuse is widespread and dissociative/traumatic amnesia for it is common. Accused, convicted and self-confessed child molesters and their advocates have crafted a strategy that tries to negate their abusive, criminal behavior, which we can call a “false memory” defense. Each of 22 of the more commonly used components of this defense is described and discussed with respect to what the science says about them. Armed with this knowledge, survivors, their clinicians, and their attorneys will be better able to refute this defense of disinformation.

  7. 32 CFR Appendix E to Part 247 - DoD Command Newspaper and Magazine Review System

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DoD Command Newspaper and Magazine Review System... OF DEFENSE (CONTINUED) MISCELLANEOUS DEPARTMENT OF DEFENSE NEWSPAPERS, MAGAZINES AND CIVILIAN ENTERPRISE PUBLICATIONS Pt. 247, App. E Appendix E to Part 247—DoD Command Newspaper and Magazine Review...

  8. Defense Acquisition Research Journal. Volume 23, Number 4, Issue 79, October 2016

    Science.gov (United States)

    2016-10-01

    context to assist current defense decision makers, acquisition officials, and the acquisition schoolhouse. Review The Harvard Business School’s J...New Public Managers at All Levels Author(s): Michael D. Watkins, Peter H. Daly, with Cate Reavis Publisher: Harvard Business Review Press...Clayton M. Christensen Publisher: Harvard Business Review Press Copyright Date: 1997 ISBN: 978-0875845852 Hard/Softcover: Hardcover, 256 pages

  9. Application of passive defense in urban housing planning

    Directory of Open Access Journals (Sweden)

    H. Kamran

    2013-01-01

    .Farzamshad, Mostafa (2010. Landscaping design in passive defense, passive defense Quarterly, Year II, No. 1.Fathi, Rashid and Gholizadeh, Elham (2009. Selected Proceedings of the Second Conference on Safety of Tehran, Tehran Municipality.Karimian, Hossein (1987. Ray in the Book of Iranian Cities, TehranKhoramabadi, Mohammad (2011. History and concepts of passive defense, Journal of Construction Engineering Organization, No. 36.Kiannezhad, Seyyed Ghasem and Firoozpour, Imamali (2012. Reviewing and explaining the role of passive defense in the promotion of safety in urban space, Urban Management Conference. Peyman, Safa and Ghazanfarinia, Sajad (2007. Fortifications and secure structures, first edition, Tehran, Malek Ashtar University Press.Pourmohammadi, mohammadreza (2009. Housing programs, Samt Press, sixth edition, Tehran. Rahnamee, Mohammad Taghi (2008. Topics and procedures of Urbanization: Geography, Department of Planning and Architecture, Department of Housing and Urban Development, Fourth Edition, Tehran.Shahnaz, Ali Akbar, Rezaeenia, Hassan (2012. Assessing Seismic Vulnerability of Urban Network (Case Study of Tabriz, Fourth Conference on Planning and Urban Management, Mashhad. Stillion, John, David T. Orletsk, (2002, Defensive Responses To and Enemy-Missile Threat.Vautravers, Alexandre, Military operations in urban areas, International review of the red cross, Volume 92 Number 878 June 2010.www.abaCAD.ir

  10. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  11. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  12. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours

    2012-07-01

    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  13. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  14. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  15. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  16. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  17. Optimal defense strategy: storage vs. new production.

    Science.gov (United States)

    Shudo, Emi; Iwasa, Yoh

    2002-12-07

    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  18. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  19. 75 FR 13763 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217...

    Science.gov (United States)

    2010-03-23

    ... ADMINISTRATION DEPARTMENT OF DEFENSE NATIONAL AERONAUTICS AND SPACE ADMINISTRATION General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217, Lessor's Annual Cost Statement AGENCY: Department of Defense (DOD), General Services Administration (GSA), and National Aeronautics...

  20. Host Defense Peptides from Asian Frogs as Potential Clinical Therapies

    Directory of Open Access Journals (Sweden)

    Vineeth T.V. Kumar

    2015-03-01

    Full Text Available Host defense peptides (HDPs are currently major focal points of medical research as infectious microbes are gaining resistance to existing drugs. They are effective against multi-drug resistant pathogens due to their unique primary target, biological membranes, and their peculiar mode of action. Even though HDPs from 60 Asian frog species belonging to 15 genera have been characterized, research into these peptides is at a very early stage. The purpose of this review is to showcase the status of peptide research in Asia. Here we provide a summary of HDPs from Asian frogs.

  1. Host Defense Peptides from Asian Frogs as Potential Clinical Therapies

    Science.gov (United States)

    Kumar, Vineeth T.V.; Holthausen, David; Jacob, Joshy; George, Sanil

    2015-01-01

    Host defense peptides (HDPs) are currently major focal points of medical research as infectious microbes are gaining resistance to existing drugs. They are effective against multi-drug resistant pathogens due to their unique primary target, biological membranes, and their peculiar mode of action. Even though HDPs from 60 Asian frog species belonging to 15 genera have been characterized, research into these peptides is at a very early stage. The purpose of this review is to showcase the status of peptide research in Asia. Here we provide a summary of HDPs from Asian frogs. PMID:27025618

  2. Functions of antimicrobial peptides in host defense and immunity.

    Science.gov (United States)

    Beisswenger, Christoph; Bals, Robert

    2005-06-01

    Antimicrobial peptides (AMPs) are effector molecules of the innate immune system. AMPs have a broad antimicrobial spectrum and lyse microbial cells by interaction with biomembranes. Besides their direct antimicrobial function, they have multiple roles as mediators of inflammation with impact on epithelial and inflammatory cells influencing diverse processes such as cytokine release, cell proliferation, angiogenesis, wound healing, chemotaxis, immune induction, and protease-antiprotease balance. Furthermore, AMPs qualify as prototypes of innovative drugs that may be used as antibiotics, anti-lipopolysaccharide drugs, or modifiers of inflammation. This review summarizes the current knowledge about the basic and applied biology of antimicrobial peptides and discusses features of AMPs in host defense and inflammation.

  3. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  4. Strategies for Dealing with the Defense Budget

    Science.gov (United States)

    1983-08-17

    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  5. Defense Financial and Investment Review. Appendix 4. Part 2. Survey of Defense Procurement Personnel Narrative Comments.

    Science.gov (United States)

    1984-12-01

    on improving productivity (cost) save one: PROGRAM STABILITY. The rest is light rain drops. o The Acqusition /Procurement environment is exceedingly... language I know, but I believe close scrutiny of contractor files would bear it out. Despite this, there is nothing wrong with the system--leave us...would compromise the validity and value of the policy. Questionnaire Item 31 Comments o Response is directed to the enervative language contained in DoD

  6. The Role of Trans-Atlantic Defense Alliances in a Globalizing World

    Science.gov (United States)

    2009-04-22

    Yoshino and Rangan (1995). Strategic alliances can even be a defensive strategy in that, as Gomez- Casseres (1994) discussed, as more alliances are...en.wikipedia.org. Gomez- Casseres , B. (1994, July/August). Group versus group: How alliance networks compete. Harvard Business Review, 72(4

  7. Strategy and Mechanisms for Encouraging Reuse in the Acquisition of Strategic Defense Initiative Software.

    Science.gov (United States)

    1990-06-01

    that are narrower in scope than those covered in Reports. IDA Papers are reviewed to ensure that they meet the high standards expected of refereed ...Inc. 133 Defense Hwy Suite 212 Annapolis, MD 21401 0 301-261-8373 SDIO Technical Information Center 1 DRC 1755 Jeff Davis Highway Suite 802 Crystal

  8. Near Term Command and Control of Homeland Air and Missile Defense

    Science.gov (United States)

    2003-01-01

    grounded the aircraft prior to take off. Special Operations forces might be best suited to eliminate a terrorist cell with minimal collateral 32 damage. We...Review. 27 March 2002. HAER No. ND-9 (Excerpt from Historic American Engineering Record,) Safeguard Ballistic Missile Defense Center ( BMDC ). Heller

  9. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  10. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  11. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  12. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  13. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force

    Science.gov (United States)

    2007-06-01

    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  14. Defense Downsizing and Blacks in the Military

    Science.gov (United States)

    1993-06-01

    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  15. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  16. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  17. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  18. Carp erythrodermatitis: host defense-pathogen interaction.

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  19. The Future of Theater Missile Defense

    Science.gov (United States)

    1994-06-01

    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  20. Department of Defense Recovering Warrior Task Force

    Science.gov (United States)

    2014-09-02

    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from http://www.armytimes.com/article...Coordination briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from http://www.defense.gov/news/newsarticle.aspx?id=121796.  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  1. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses.

    Science.gov (United States)

    Boyd, Robert S

    2012-10-01

    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  2. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  3. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  4. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  5. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  6. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  7. Defense Acquisition Research Journal. Volume 24, Number 1, Issue 80, January 2017

    Science.gov (United States)

    2017-01-01

    International Journal of Production Economics, 87(3), 333–347. Henderson, R. (1994). Managing innovation in the information age. Harvard Business Review , 72... Harvard Business Review , 70(1), 71–79. Keebler, J. S., Manrodt, K. B., Durtsche, D. A., & Ledyard, D. M. (1999). Keeping score: Measuring the business ...Eisenhower School for National Security and Resource Strategy Dr. J. Ronald Fox Harvard Business School Mr. David Gallop Defense Acquisition

  8. 75 FR 60090 - Membership of the Performance Review Board

    Science.gov (United States)

    2010-09-29

    ... Board (PRB) of the Missile Defense Agency (MDA). The publication of PRB membership is required by 5 U.S.... SUPPLEMENTARY INFORMATION: The Performance Review Board (PRB) provides fair and impartial review of Senior... appointed to the Missile Defense Agency PRB: RDML Randall M. Hendrickson, USN (Chair), RADM Joseph A....

  9. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  10. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  11. The Impact of the Defense Industry Consolidation on the Aerospace Industry

    Science.gov (United States)

    2006-03-01

    Markets, School of Economics, University of Nottingham, May 2000. 9. Demski, Joel S. and Robert P. Magee. “A Perspective on Accounting for Defense...Takuji. “What Do the Purified Solow Residuals Tell Us about Japan’s Lost Decade?” Monetary and Economic Studies: 113-148 (February 2005). 26. Kim... Robert E. Waller. “Consolidation of the U.S. Defense Industrial Base: Impact on Research Expenditures,” Acquisition Review Quarterly, 9: 143-150 (Spring

  12. Candida Infections: An Update on Host Immune Defenses and Anti-Fungal Drugs

    Directory of Open Access Journals (Sweden)

    Ning Gao

    2016-04-01

    Full Text Available Infections by fungal pathogens such as Candida albicans and non-albicans Candida species are becoming increasing prevalent in the human population. Such pathogens cause life-threatening diseases with high mortality, particularly in immunocompromised patients. Host defenses against fungal infections are provided by an exquisite interplay between innate and adaptive immune responses. However, effective anti-fungal agents for Candida infections are limited, and fungal drug resistance is a significant treatment challenge. In this review, we summarize the current understanding of host–fungal interactions, discuss the modes action of anti-fungal drugs, explore host defense mechanisms, and define the new challenges for treating Candida infections.

  13. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  14. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims

    Science.gov (United States)

    2013-01-01

    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  15. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Science.gov (United States)

    2010-10-25

    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  16. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  17. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  18. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  19. Independent Review Panel Report on the Defense Contract Audit Agency

    Science.gov (United States)

    2008-10-01

    for the current year. 3. An annual performance report and balanced scorecard that compares actual results against goals established in the annual...operating) plan and a balanced scorecard tied to the strategic plan, and (2) a human capital strategic plan. • DCAA obtain an independent assessment of...revised DCAA strategic plan and balanced scorecard in a manner that is transparent, understood, and accepted by the workforce. • DCAA establish an

  20. Independent Review of the Defense Logistics Agencys Roles and Missions

    Science.gov (United States)

    2014-12-01

    MA - Class IX 84.0 85.9 86.5 87.2 88.8 88.5 89.3 89.7 MA - Constr . & Equip. 79.6 82.8 85.2 86.2 89.4 90.7 91.5 MA - Aviation 79.6 82.9 84.5 86.1 86.4...Maritime MA - Land MA - Class IX MA - Constr . & Equip. MA - Aviation Backorders (Class IX) (Ks) Aged Backorders (Class IX) (Ks) To overcome this challenge

  1. Defense Acquisition Review Journal. Volume 16, Number 3, Issue 52

    Science.gov (United States)

    2009-10-01

    individual ships, or within flights, of the same class. And even one-of-a-kind, nearly immutable projects like skyscrapers and bridges can be later...standardized interfaces that enable exchange of energy (e.g., electrical current via a wall plug); material (e.g., replacement of components/parts

  2. The DTIC Review. Volume 5, Number 4. Homeland Defense

    Science.gov (United States)

    2001-07-01

    stop a terrorist attack, arrest terrorists, and gather evidence for criminal prosecution. When terrorist attacks occur without adequate warning...Management Capabilities forResponse to Nuclear, Biologica , or Chemical Terrorism (Feb. 1997). Page 16 GAO-01-15 Combating Terrorism FEMA Has Increased...hazards approach. Following are other terrorism preparedness courses developed and offered by the Institute: * Emergency Response to Criminal and

  3. Quality Control Review of the Defense Logistics Agency Audit Organization

    Science.gov (United States)

    2014-12-19

    all auditors are required to follow, and established an internal quality assurance division that performs ongoing, periodic assessments of work...audit organization performing audits or attestation engagements or both have an appropriate internal quality control system in place and undergo an...2010, the DLA OIG addressed our recommendation to implement official policies and procedures, which all auditors are required to follow. The DLA

  4. Defense Acquisition Review Journal. Volume 17, Number 2, Issue 54

    Science.gov (United States)

    2010-04-01

    epistemology ? The British Journal of Sociology, 35, 75–92. Business Executives for National Security (BENS). (2009, July). Getting to best: Reforming the...the broad type of materiel solution preferred in the ICD (i.e., information system, evolutionary development of an existing capability, or a...tap into the advice of these CPMs about 9 to 12 months earlier, during the planning phase of the PPBE process. The deliberate, evolutionary pace of the

  5. Defense Acquisition Review Journal. Volume 17, Number 1, Issue 53

    Science.gov (United States)

    2010-01-01

    Paterson holds a BS in Mathematics from Virginia Polytechnic Institute and State University and an MS in Applied Mathematics from the Naval...order of magnitude or ROM (DoD, 2006). However, the term ROM is problematic in that it has a well-understood mathematical definition that does not...must have the capacity to incorporate future technological advances as they matriculate through development and are incorporated within existing

  6. Defense Acquisition Review Journal. Volume 14, Number 2

    Science.gov (United States)

    2007-09-01

    customer focus can be deduced from the Customer Relationship Management ( CRM ) movement. The CRM advocates believe that the key to... relationship is formed, it must be managed (Boulding, et al., 2005). At its foundation, CRM demands the accumulation of a tremendous amount of data...According to CRM , a relationship with the customer cannot be established unless the firm knows and understands the customer . This knowledge

  7. Independent Review of the Defense Logistics Agencys Roles and Missions

    Science.gov (United States)

    2014-12-01

    to as “Peak” items. In these last two categories (NextGen and Peak), DLA employs algorithms and statistical analyses designed to make the most...and local governments, and to other organizations, before being offered for sale at auction or destroyed as scrap. Disposition Services has played a...decisions (also known as emergency buys), and (2) make changes to inventory and stocking decisions being set by the algorithms in EBS. As an example

  8. Hypermedia Laboratory, Defense Applied Information Technology Center; Review for 1988

    Science.gov (United States)

    1988-12-01

    des images. La proliferation des reseatix publics et prives et des services de messagerie oti courrier electronique utilisant de larges bandes et des...technologies tres fiables permer de transporter du texte integral et de proceder a des transferts eLectroniques de documents la oti pour l’instant on...des reseaux de coumrer electronique (comme Infotap et Geomail), et des possibilites de transferts rapides entre collections archivees sur disques et

  9. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  10. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  11. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  12. NADPH oxidases in lung biology and pathology: host defense enzymes, and more.

    Science.gov (United States)

    van der Vliet, Albert

    2008-03-15

    The deliberate production of reactive oxygen species (ROS) by phagocyte NADPH oxidase is widely appreciated as a critical component of antimicrobial host defense. Recently, additional homologs of NADPH oxidase (NOX) have been discovered throughout the animal and plant kingdoms, which appear to possess diverse functions in addition to host defense, in cell proliferation, differentiation, and in regulation of gene expression. Several of these NOX homologs are also expressed within the respiratory tract, where they participate in innate host defense as well as in epithelial and inflammatory cell signaling and gene expression, and fibroblast and smooth muscle cell proliferation, in response to bacterial or viral infection and environmental stress. Inappropriate expression or activation of NOX/DUOX during various lung pathologies suggests their specific involvement in respiratory disease. This review summarizes the current state of knowledge regarding the general functional properties of mammalian NOX enzymes, and their specific importance in respiratory tract physiology and pathology.

  13. 77 FR 51783 - Federal Acquisition Regulation; Information Collection; Contractors' Purchasing Systems Reviews

    Science.gov (United States)

    2012-08-27

    ... Regulation; Information Collection; Contractors' Purchasing Systems Reviews AGENCY: Department of Defense... previously approved information collection requirement concerning contractors' purchasing systems reviews...: Submit comments identified by Information Collection 9000- 0132, Contractors' Purchasing Systems Reviews...

  14. 77 FR 27073 - Center for Scientific Review; Notice of Closed Meetings

    Science.gov (United States)

    2012-05-08

    ... of Committee: Immunology Integrated Review Group; Immunity and Host Defense Study Section. Date: June... . Name of Committee: Immunology Integrated Review Group; Transplantation, Tolerance, and Tumor Immunology... . Name of Committee: Oncology 2--Translational Clinical Integrated Review Group; Cancer Biomarkers...

  15. West European and East Asian Perspectives on Defense, Deterrence and Strategy. Volume 2. Western European Perspectives on Defense, Deterrence and Strategy.

    Science.gov (United States)

    1984-05-16

    supports George Kennan’s proposal for an immediate 50 percent reduction of U.S. and Soviet nuclear arsenals, stating, "If you have massive overkill...die Freie Welt.’ Text of speech before the West German Bundestag, Bonn, January 17, 1980. (Bonn: Bundesgeschaftstelle der CDU, 1980). 35. Leber, Georg ...34 International Defense Review, Vol. 12, No. 3 (1979). 82. Geneste, Colonel Marc. ’La Bataille Terrestre Nuc1~aire,5 Strategie, (July-September 1976). 83.t, u

  16. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  17. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  18. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  19. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  20. Oncology clinicians' defenses and adherence to communication skills training with simulated patients: an exploratory study.

    Science.gov (United States)

    Bernard, Mathieu; de Roten, Yves; Despland, Jean-Nicolas; Stiefel, Friedrich

    2012-06-01

    -12 participants) and have a minimal duration of at least 3 days in order to be effective. Several systematic reviews evaluated the impact of CST on clinicians' communication skills [9-11]. Effectiveness of CST can be assessed by two main approaches: participant-based and patient-based outcomes. Measures can be self-reported, but, according to Gysels et al. [10], behavioral assessment of patient-physician interviews [12] is the most objective and reliable method for measuring change after training. Based on 22 studies on participants' outcomes, Merckaert et al. [9] reported an increase of communication skills and participants' satisfaction with training and changes in attitudes and beliefs. The evaluation of CST remains a challenging task and variables mediating skills improvement remain unidentified. We recently thus conducted a study evaluating the impact of CST on clinicians' defenses by comparing the evolution of defenses of clinicians participating in CST with defenses of a control group without training [13]. Defenses are unconscious psychological processes which protect from anxiety or distress. Therefore, they contribute to the individual's adaptation to stress [14]. Perry refers to the term "defensive functioning" to indicate the degree of adaptation linked to the use of a range of specific defenses by an individual, ranging from low defensive functioning when he or she tends to use generally less adaptive defenses (such as projection, denial, or acting out) to high defensive functioning when he or she tends to use generally more adaptive defenses (such as altruism, intellectualization, or introspection) [15, 16]. Although several authors have addressed the emotional difficulties of oncology clinicians when facing patients and their need to preserve themselves [7, 17, 18], no research has yet been conducted on the defenses of clinicians. For example, repeated use of less adaptive defenses, such as denial, may allow the clinician to avoid or reduce distress, but it also

  1. Salivary Defense Proteins: Their Network and Role in Innate and Acquired Oral Immunity

    Directory of Open Access Journals (Sweden)

    Gábor Fábián

    2012-04-01

    Full Text Available There are numerous defense proteins present in the saliva. Although some of these molecules are present in rather low concentrations, their effects are additive and/or synergistic, resulting in an efficient molecular defense network of the oral cavity. Moreover, local concentrations of these proteins near the mucosal surfaces (mucosal transudate, periodontal sulcus (gingival crevicular fluid and oral wounds and ulcers (transudate may be much greater, and in many cases reinforced by immune and/or inflammatory reactions of the oral mucosa. Some defense proteins, like salivary immunoglobulins and salivary chaperokine HSP70/HSPAs (70 kDa heat shock proteins, are involved in both innate and acquired immunity. Cationic peptides and other defense proteins like lysozyme, bactericidal/permeability increasing protein (BPI, BPI-like proteins, PLUNC (palate lung and nasal epithelial clone proteins, salivary amylase, cystatins, prolin-rich proteins, mucins, peroxidases, statherin and others are primarily responsible for innate immunity. In this paper, this complex system and function of the salivary defense proteins will be reviewed.

  2. The current status of the elemental defense hypothesis in relation to pathogens

    Directory of Open Access Journals (Sweden)

    Anja C. Hoerger

    2013-10-01

    Full Text Available Metal hyperaccumulating plants are able to accumulate exceptionally high concentrations of metals, such as zinc, nickel, or cadmium, in their aerial tissues. These metals reach concentrations that would be toxic to most other plant species. This trait has evolved multiple times independently in the plant kingdom. Recent studies have provided new insight into the ecological and evolutionary significance of this trait, by showing that some metal hyperaccumulating plants can use high concentrations of accumulated metals to defend themselves against attack by pathogenic microorganisms and herbivores. Here, we review the evidence that metal hyperaccumulation acts as a defensive trait in plants, with particular emphasis on plant-pathogen interactions. We discuss the mechanisms by which defense against pathogens might have driven the evolution of metal hyperaccumulation, including the interaction of this trait with other forms of defense. In particular, we consider how physiological adaptations and fitness costs associated with metal hyperaccumulation could have resulted in trade-offs between metal hyperaccumulation and other defenses. Drawing on current understanding of the population ecology of metal hyperaccumulator plants, we consider the conditions that might have been necessary for metal hyperaccumulation to be selected as a defensive trait, and discuss the likelihood that these were fulfilled. Based on these conditions, we propose a possible scenario for the evolution of metal hyperaccumulation, in which selective pressure for resistance to pathogens or herbivores, combined with gene flow from non-metallicolous populations, increases the likelihood that the metal hyperaccumulating trait becomes established in plant populations.

  3. The current status of the elemental defense hypothesis in relation to pathogens.

    Science.gov (United States)

    Hörger, Anja C; Fones, Helen N; Preston, Gail M

    2013-10-16

    Metal hyperaccumulating plants are able to accumulate exceptionally high concentrations of metals, such as zinc, nickel, or cadmium, in their aerial tissues. These metals reach concentrations that would be toxic to most other plant species. This trait has evolved multiple times independently in the plant kingdom. Recent studies have provided new insight into the ecological and evolutionary significance of this trait, by showing that some metal hyperaccumulating plants can use high concentrations of accumulated metals to defend themselves against attack by pathogenic microorganisms and herbivores. Here, we review the evidence that metal hyperaccumulation acts as a defensive trait in plants, with particular emphasis on plant-pathogen interactions. We discuss the mechanisms by which defense against pathogens might have driven the evolution of metal hyperaccumulation, including the interaction of this trait with other forms of defense. In particular, we consider how physiological adaptations and fitness costs associated with metal hyperaccumulation could have resulted in trade-offs between metal hyperaccumulation and other defenses. Drawing on current understanding of the population ecology of metal hyperaccumulator plants, we consider the conditions that might have been necessary for metal hyperaccumulation to be selected as a defensive trait, and discuss the likelihood that these were fulfilled. Based on these conditions, we propose a possible scenario for the evolution of metal hyperaccumulation, in which selective pressure for resistance to pathogens or herbivores, combined with gene flow from non-metallicolous populations, increases the likelihood that the metal hyperaccumulating trait becomes established in plant populations.

  4. Carrageenans from red seaweeds as promoters of growth and elicitors of defense response in plants

    Directory of Open Access Journals (Sweden)

    Pushp Sheel Shukla

    2016-05-01

    Full Text Available Plants incessantly encounter abiotic and biotic stresses that limit their growth and productivity. However, conversely, plant growth can also be induced by treatments with various abiotic and biotic elicitors. Carrageenans are sulfated linear polysaccharides that represent major cellular constituents of seaweeds belonging to red algae (Rhodophyta. Recent research has unraveled the biological activity of carrageenans and of their oligomeric forms, the oligo carrageenans (OCs, as promoters of plant growth and as elicitors of defense responses against pests and diseases. In this review, we discuss the molecular mechanisms by which carrageenans and OCs mediate plant growth and plant defense responses. Carrageenans and OCs improve plant growth by regulating various metabolic processes such as photosynthesis and ancillary pathways, cell division, purine and pyrimidine synthetic pathways as well as metabolic pathways involved in nitrogen and sulfur assimilation. Carrageenans and OCs also induce plant defense responses against viroids, viruses, bacteria, fungi and insects by modulating the activity of different defense pathways, including salicylate, jasmonate and ethylene signaling pathways. Further studies will likely substantiate the beneficial effects of carrageenans and of OCs on plant growth and plant defense responses and open new avenues for their use in agriculture and horticultural industry.

  5. The evolutionary strategies of plant defenses have a dynamic impact on the adaptations and interactions of vectors and pathogens

    Institute of Scientific and Technical Information of China (English)

    Ordom Brian Huot; Punya Nachappa; Cecilia Tamborindeguy

    2013-01-01

    Plants have evolved and diversified to reduce the damages imposed by infectious pathogens and herbivorous insects.Living in a sedentary lifestyle,plants are constantly adapting to their environment.They employ various strategies to increase performance and fitness.Thus,plants developed cost-effective strategies to defend against specific insects and pathogens.Plant defense,however,imposes selective pressure on insects and pathogens.This selective pressure provides incentives for pathogens and insects to diversify and develop strategies to counter plant defense.This results in an evolutionary arms race among plants,pathogens and insects.The ever-changing adaptations and physiological alterations among these organisms make studying plant-vector-pathogen interactions a challenging and fascinating field.Studying plant defense and plant protection requires knowledge of the relationship among organisms and the adaptive strategies each organism utilize.Therefore,this review focuses on the integral parts of plant-vectorpathogen interactions in order to understand the factors that affect plant defense and disease development.The review addresses plant-vector-pathogen co-evolution,plant defense strategies,specificity of plant defenses and plant-vector-pathogen interactions.Improving the comprehension of these factors will provide a multi-dimensional perspective for the future research in pest and disease management.

  6. Directed Energy Missions for Planetary Defense

    OpenAIRE

    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  7. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    Science.gov (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  8. Energy and the national defense

    Energy Technology Data Exchange (ETDEWEB)

    Bucknell, H. III

    1981-01-01

    An overview of the US energy situation and its attendant policy problems, this book surveys the availability of different forms and sources of energy. It reviews alternatives to heavy reliance on oil and natural gas, the inseparability of political and economic factors during a transition period, the linkage of domestic and foreign policy, worldwide ramifications of the energy problem, the consequences of policy failures for the prospects of war and peace, and the energy problem as a test of the way the US national policymaking system functions. While the most unsettling discussion relates to the possibilities of energy wars in the Persian Gulf and elsewhere, attention is also given to questions of industrial vigor, high food production, environmental safety, and domestic peace and freedom. A hopeful conclusion stresses the importance of individual effort as the baseline for the democratic system. 378 references, 24 figures, 7 tables.

  9. Innate Defense against Fungal Pathogens.

    Science.gov (United States)

    Drummond, Rebecca A; Gaffen, Sarah L; Hise, Amy G; Brown, Gordon D

    2014-11-10

    Human fungal infections have been on the rise in recent years and proved increasingly difficult to treat as a result of the lack of diagnostics, effective antifungal therapies, and vaccines. Most pathogenic fungi do not cause disease unless there is a disturbance in immune homeostasis, which can be caused by modern medical interventions, disease-induced immunosuppression, and naturally occurring human mutations. The innate immune system is well equipped to recognize and destroy pathogenic fungi through specialized cells expressing a broad range of pattern recognition receptors (PRRs). This review will outline the cells and PRRs required for effective antifungal immunity, with a special focus on the major antifungal cytokine IL-17 and recently characterized antifungal inflammasomes.

  10. American Bar Association Supplementary Guidelines for the Mitigation Function of Defense Teams in Death Penalty Cases: implications for social work.

    Science.gov (United States)

    Andrews, Arlene Bowers

    2012-04-01

    When a client faces a penalty of death, defense attorneys may call on social workers in many capacities: mitigation specialist, expert witness, consulting specialist, direct witness, or defense-initiated victim outreach worker. The American Bar Association set forth standards for capital defense attorneys, which led an interdisciplinary team to produce the "Supplementary Guidelines for the Mitigation Function of Defense Teams in Death Penalty Cases" to promote the exceptional competence and diligence required when the consequence is life or death. This article summarizes the "Supplementary Guidelines," with implications for social work practice--that is, professional responsibility, competence, interviewing skill, knowledge of behavioral and mental impairment, records review, life history compilation, data interpretation, witness support, law-related knowledge, and testimony. The social work, which is scrutinized in a court of law, requires cultural competence, diverse oral and written communication skills, diligence, and the highest ethical standards.

  11. RNAi and Antiviral Defense in the Honey Bee

    Science.gov (United States)

    Brutscher, Laura M.; Flenniken, Michelle L.

    2015-01-01

    Honey bees play an important agricultural and ecological role as pollinators of numerous agricultural crops and other plant species. Therefore, investigating the factors associated with high annual losses of honey bee colonies in the US is an important and active area of research. Pathogen incidence and abundance correlate with Colony Collapse Disorder- (CCD-) affected colonies in the US and colony losses in the US and in some European countries. Honey bees are readily infected by single-stranded positive sense RNA viruses. Largely dependent on the host immune response, virus infections can either remain asymptomatic or result in deformities, paralysis, or death of adults or larvae. RNA interference (RNAi) is an important antiviral defense mechanism in insects, including honey bees. Herein, we review the role of RNAi in honey bee antiviral defense and highlight some parallels between insect and mammalian immune systems. A more thorough understanding of the role of pathogens on honey bee health and the immune mechanisms bees utilize to combat infectious agents may lead to the development of strategies that enhance honey bee health and result in the discovery of additional mechanisms of immunity in metazoans. PMID:26798663

  12. RNAi and Antiviral Defense in the Honey Bee

    Directory of Open Access Journals (Sweden)

    Laura M. Brutscher

    2015-01-01

    Full Text Available Honey bees play an important agricultural and ecological role as pollinators of numerous agricultural crops and other plant species. Therefore, investigating the factors associated with high annual losses of honey bee colonies in the US is an important and active area of research. Pathogen incidence and abundance correlate with Colony Collapse Disorder- (CCD- affected colonies in the US and colony losses in the US and in some European countries. Honey bees are readily infected by single-stranded positive sense RNA viruses. Largely dependent on the host immune response, virus infections can either remain asymptomatic or result in deformities, paralysis, or death of adults or larvae. RNA interference (RNAi is an important antiviral defense mechanism in insects, including honey bees. Herein, we review the role of RNAi in honey bee antiviral defense and highlight some parallels between insect and mammalian immune systems. A more thorough understanding of the role of pathogens on honey bee health and the immune mechanisms bees utilize to combat infectious agents may lead to the development of strategies that enhance honey bee health and result in the discovery of additional mechanisms of immunity in metazoans.

  13. Global Change Effects on Plant Chemical Defenses against Insect Herbivores

    Institute of Scientific and Technical Information of China (English)

    M. Gabriela Bidart-Bouzat; Adebobola Imeh-Nathaniel

    2008-01-01

    This review focuses on individual effects of major global change factors, such as elevated CO2, Oa, UV light and temperature,on plant secondary chemistry. These secondary metabolites are well-known for their role in plant defense against insect herbivory. Global change effects on secondary chemicals appear to be plant species-specific and dependent on the chemical type. Even though plant chemical responses induced by these factors are highly variable, there seems to be some specificity in the response to different environmental stressors. For example, even though the production of phenolic compounds is enhanced by both elevated CO2 and UV light levels, the latter appears to primarily increase the concentrations of fiavonoids. Likewise, specific phenolic metabolites seem to be induced by O3 but not by other factors, and an increase in volatile organic compounds has been particularly detected under elevated temperature. More information is needed regarding how global change factors influence inducibility of plant chemical defenses as well as how their indirect and direct effects impact insect performance and behavior, herbivory rates and pathogen attack. This knowledge is crucial to better understand how plants and their associated natural enemies will be affected in future changing environments.

  14. Towards a European Defense Identity Compatible with NATO

    Directory of Open Access Journals (Sweden)

    Rafael Estrella

    1997-12-01

    Full Text Available The European Security and Defense Identity (ESDI is a common but not defined goal, due to disagreements among Europeans on its political content. Reasons to explain this are related to the resistance to the idea of a European defense authority, fears of German hegemony, and the conviction that Europe is uncapable of defending herselfwithout the assistance of the United States. Estrella states that, with the end of the Cold War, some arguments opposing ESDI lost weight. However, the evolution and restructuring of NATO is not the product of European initiative, but rather an element of the U.S.strategy in Europe. Moreover, while the U.S. has a global strategy, Europe has not yet defined its security interests neither globally nor regionally. The author reviews the steps undertaken by NATO and the WEU towards further collaboration and the development of a European identity. He wonders whether there is enough political will either in Europe or the U.S. to overcome archaic views on trans-atlantic relations and narrow concepts about the future of Europe.

  15. Defense Health Agency and the Deployment of the Electronic Health Record: Building an Organizational Framework for Implementation and Sustainment

    Science.gov (United States)

    2016-12-01

    change. In On Change Management (pp. 137–154). Boston, MA: Harvard Business Review Press. Best, M., & Neuhauser, D. (2004). Ignaz Semmelweiss and...pp. 47–62). Boston, MA: Harvard Business Review Press. 72 Government Accountability Office. (2015). Defense health care reform: Actions needed to...2012). Commentary #1. In HBR Guide to Project Management (96–98). Boston: Harvard Business Review Press. 73 Murphy, J. (2011). Leading from the

  16. The Full Costs of Ballistic Missile Defense

    Science.gov (United States)

    2003-01-01

    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  17. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  18. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  19. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  20. Enhancing Air Base Defense Through Joint Doctrine

    Science.gov (United States)

    2009-01-01

    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  1. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  2. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this doctrine...to forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  3. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  4. Defense Advanced Research Projects Agency Strategic Plan

    Science.gov (United States)

    2007-02-01

    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  5. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  6. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  7. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  8. Rigorous Cyberspace Defense Expert Training Moves Forward

    Science.gov (United States)

    2012-09-01

    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  9. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  10. Host Defense against Opportunist Microorganisms Following Trauma.

    Science.gov (United States)

    1988-06-30

    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  11. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  12. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  13. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  14. The equal effectiveness of different defensive strategies

    Science.gov (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming

    2015-01-01

    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  15. 48 CFR 201.170 - Peer Reviews.

    Science.gov (United States)

    2010-10-01

    ... Procurement and Acquisition Policy, will organize teams of reviewers and facilitate Peer Reviews for... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Peer Reviews. 201.170... OF DEFENSE GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Purpose, Authority, Issuance 201.170...

  16. 32 CFR 195.12 - Judicial review.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Judicial review. 195.12 Section 195.12 National... RIGHTS ACT OF 1964 § 195.12 Judicial review. Action taken pursuant to section 602 of the Act is subject to judicial review as provided in section 603 of the Act....

  17. 48 CFR 215.270 - Peer Reviews.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Peer Reviews. 215.270 Section 215.270 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT... of Proposals and Information 215.270 Peer Reviews. Agency officials shall conduct Peer Reviews...

  18. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    warfare will be the sine qua non for maintaining stability and security in key maritime theatres , and for defeating high-end military threats if...several Department of State Superior Honor Awards. In January 2011 he was awarded the Legion d’Honneur by the French Government. 76 He received a

  19. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata

    2016-01-01

    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  1. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  2. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore

    2016-01-01

    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  3. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  4. Microbiota-Mediated Inflammation and Antimicrobial Defense in the Intestine

    Science.gov (United States)

    Caballero, Silvia; Pamer, Eric G.

    2015-01-01

    The diverse microbial populations constituting the intestinal microbiota promote immune development and differentiation, but because of their complex metabolic requirements and the consequent difficulty culturing them, they remained, until recently, largely uncharacterized and mysterious. In the last decade, deep nucleic acid sequencing platforms, new computational and bioinformatics tools, and full-genome characterization of several hundred commensal bacterial species facilitated studies of the microbiota and revealed that differences in microbiota composition can be associated with inflammatory, metabolic, and infectious diseases, that each human is colonized by a distinct bacterial flora, and that the microbiota can be manipulated to reduce and even cure some diseases. Different bacterial species induce distinct immune cell populations that can play pro- and anti-inflammatory roles, and thus the composition of the microbiota determines, in part, the level of resistance to infection and susceptibility to inflammatory diseases. This review summarizes recent work characterizing commensal microbes that contribute to the antimicrobial defense/inflammation axis. PMID:25581310

  5. Attacked from All Sides: RNA Decay in Antiviral Defense

    Directory of Open Access Journals (Sweden)

    Jerome M. Molleston

    2017-01-01

    Full Text Available The innate immune system has evolved a number of sensors that recognize viral RNA (vRNA to restrict infection, yet the full spectrum of host-encoded RNA binding proteins that target these foreign RNAs is still unknown. The RNA decay machinery, which uses exonucleases to degrade aberrant RNAs largely from the 5′ or 3′ end, is increasingly recognized as playing an important role in antiviral defense. The 5′ degradation pathway can directly target viral messenger RNA (mRNA for degradation, as well as indirectly attenuate replication by limiting specific pools of endogenous RNAs. The 3′ degradation machinery (RNA exosome is emerging as a downstream effector of a diverse array of vRNA sensors. This review discusses our current understanding of the roles of the RNA decay machinery in controlling viral infection.

  6. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and will...management systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden survivability...technology for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  7. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  8. The US-Japan Alliance: Sharing the Burden of Defense

    Science.gov (United States)

    1983-01-01

    expenditures to GNP. Japan Is also far down the list in defense spending per capita, behind nations such as Sweden, Australia, and Canada. Table 1.2 compares...TABLES Figures 1.1 Trends in Japanese Defense Spending ................. 14 Tables 1.1 Defense Expenditures of Major Countries ............... 12 1.2...Percentage Breakdown of Japanese Defense Expenditures by Category, FY 1977-1981 ............ 40 3.3 Disposition of US Forces in Japan

  9. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that the Defense Intelligence Agency Advisory Board, will meet on March 22 and 23, 2010....

  10. 76 FR 20336 - Defense Audit Advisory Committee (DAAC)

    Science.gov (United States)

    2011-04-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Defense Audit Advisory Committee (DAAC) AGENCY: Under Secretary of Defense... (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as...

  11. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain

    Science.gov (United States)

    2015-10-28

    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  12. Urban Youth, Fear of Crime, and Resulting Defensive Actions.

    Science.gov (United States)

    Williams, J. Sherwood; And Others

    1994-01-01

    Used data from 1,775 urban youth collected in 1986 to examine fear of crime and defensive actions taken by youth. Results revealed that only 11% reported having taken no defensive actions as result of fear of crime. Nearly three-fifths took precaution of having escort at night. Learning self-defense techniques was reported by 19%; 10% indicated…

  13. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  14. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  15. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  16. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  17. Children's Use of Defenses and Self-Esteem Management.

    Science.gov (United States)

    Hay, Deborah

    Children's use of defenses to maintain or enhance self-esteem was investigated. Attention was given to four questions: Do children with different levels of self-esteem differ in (1) the frequency with which they employ defenses? (2) kinds of emotions they defend against? (3) the kinds of social situations which elicit their defensive responses?…

  18. 32 CFR 644.333 - Screening for defense needs.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Screening for defense needs. 644.333 Section 644... Screening for defense needs. Real property which becomes excess to the needs of any element of the Army or... the property is excess to the needs of the using command, without screening for other requirements....

  19. Defense Institution Reform Initiative Program Elements Need to Be Defined

    Science.gov (United States)

    2012-11-09

    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership Strategy...to the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  20. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.

    2003-01-01

    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  1. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    P.G.J. Roosenboom (Peter); T. van der Goot

    2003-01-01

    textabstractThe central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO

  2. Current knowledge and future research perspectives on cassava (Manihot esculenta Crantz) chemical defenses: An agroecological view.

    Science.gov (United States)

    Pinto-Zevallos, Delia M; Pareja, Martín; Ambrogi, Bianca G

    2016-10-01

    Cassava (Manihot esculenta Crantz) is one of the most important staple crops worldwide. It constitutes the major source of carbohydrates for millions of low-income people living in rural areas, as well as a cash crop for smallholders in tropical and sub-tropical regions. The Food and Agriculture Organization of the United Nations predicts that cassava plantations will increase and production systems will intensify in the future, highlighting the need for developing strategies that improve the sustainability of production. Plant chemical defenses hold the potential for developing pest management strategies, as these plant traits can influence the behavior and performance of both pests and beneficial arthropods. Cassava plants are well-defended and produce a number of compounds involved in direct defense, such as cyanogenic glycosides, flavonoid glycosides, and hydroxycoumarins. In addition, volatile organic compounds induced upon herbivory and the secretion of extrafloral nectar act as indirect defense against herbivores by recruiting natural enemies. Here, cassava chemical defenses against pest arthropods are reviewed, with the aim of identifying gaps in our knowledge and areas of research that deserve further investigation for developing sound pest control strategies to improve sustainable production of this crop, and how these defenses can be used to benefit other crops. Cyanogenic content in cassava is also highly toxic to humans, and can cause irreversible health problems even at sub-lethal doses when consumed over prolonged periods. Therefore, the promotion of chemical defense in this crop should not aggravate these problems, and must be accompanied with the education on processing methods that reduce human exposure to cyanide.

  3. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence... a closed meeting of the Defense Intelligence Agency National Intelligence University Board...

  4. Defense-related Proteins from Chelidonium majus L. as Important Components of its Latex.

    Science.gov (United States)

    Nawrot, Robert

    2017-01-01

    The aim of this review is to cover most recent research on plant pathogenesis- and defenserelated proteins from latex-bearing medicinal plant Chelidonium majus (Papaveraceae) in the context of its importance for latex activity, function, pharmacological activities, and antiviral medicinal use. These results are compared with other latex-bearing plant species and recent research on proteins and chemical compounds contained in their latex. This is the first review, which clearly summarizes pathogenesisrelated (PR) protein families in latex-bearing plants pointing into their possible functions. The possible antiviral function of the latex by naming the abundant proteins present therein is also emphasized. Finally latex-borne defense system is hypothesized to constitute a novel type of preformed immediate defense response against viral, but also non-viral pathogens, and herbivores. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  5. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  6. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  7. 32 CFR 169a.8 - Inventory and review schedule (Report Control Symbol DD-P&L(A)).

    Science.gov (United States)

    2010-07-01

    ... Symbol DD-P&L(A)). 169a.8 Section 169a.8 National Defense Department of Defense OFFICE OF THE SECRETARY... and review schedule (Report Control Symbol DD-P&L(A)). (a) Information in each DoD Component's... (DIA) Shall be submitted to the Assistant Secretary of Defense Production and Logistics)...

  8. Inhibition of Orthopaedic Implant Infections by Immunomodulatory Effects of Host Defense Peptides

    Science.gov (United States)

    2014-12-01

    Foundation for Medical and Pharmaceutical Research (HC), the Cleveland Department of Veterans Affairs (RAB), the Veterans Affairs Merit Review...the Department of Defense, the Mochida Memorial Foundation for Medical and Pharmaceutical Research, the National Institutes of Health, or the Department...Mookherjee N, Brown KL, Bowdish DM, Doria S, Falsafi R, Hokamp K, Roche FM, Mu R, Doho GH, Pistolic J, Powers JP, Bryan J, Brinkman FS, Hancock RE

  9. Improving Defense Acquisition Management and Policy Through a Life-Cycle Affordability Framework

    Science.gov (United States)

    2014-02-04

    Evolving to a new dominant logic for marketing . Journal of Marketing , 68(1), 1–17. Vargo, S. L., & Lusch, R. F. (2011). It’s all B2B ...and beyond...also conducted archival and literature reviews to identify non-defense markets including the rail industry, fence-to-fence highway construction...applied knowledge. Conceptualizing the market as shifting from conversion of material to conversion of knowledge represents the move globally to

  10. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    bs./gallon EROS H0JRFGEl)ADY NA V e non cbt casualties reconerable/da~vjES] 0011 REFON/DAY s O;I eh losses reoverable, dav [B21 CAS REGEN COFF Ne 0.33...Organization and Equipment," Military Review, Vol. 62, No. 12, December 1982, pp. 2-12. Jacobs, G., "Air-Land Battle 2000," Asian Defense Journal

  11. When the Guns Fall Silent: a Leader’s Guide to Understanding Defensive Coping Mechanisms

    Science.gov (United States)

    2011-05-19

    Ego, and Superego. An entire chapter is dedicated to the introduction of the psychological theorist Sigmund Freud but only a small section is used to...awareness.” 18 Though some may find the study of Freud to be outdated and hard to prove because it is based on the unconscious; review of this theory...Intellectualization, and Undoing. Allen stated, “ Freud believed that exaggerated use of such defense mechanisms result in neuroses; anxiety-driven

  12. Immediate-Early (IE) gene regulation of cytomegalovirus: IE1- and pp71-mediated viral strategies against cellular defenses.

    Science.gov (United States)

    Torres, Lilith; Tang, Qiyi

    2014-12-01

    Three crucial hurdles hinder studies on human cytomegalovirus (HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus-host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host (latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate-early (IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate-early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses.

  13. Immediate–Early (IE) gene regulation of cytomegalovirus: IE1- and pp71-mediated viral strategies against cellular defenses

    Science.gov (United States)

    Torres, Lilith; Tang, Qiyi

    2015-01-01

    Three crucial hurdles hinder studies on human cytomegalovirus (HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host (latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early (IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses. PMID:25501994

  14. Immediate–Early(IE) gene regulation of cytomegalovirus:IE1-and pp71-mediated viral strategies against cellular defenses

    Institute of Scientific and Technical Information of China (English)

    Lilith; Torres; Qiyi; Tang

    2014-01-01

    Three crucial hurdles hinder studies on human cytomegalovirus(HCMV): strict species specificity, differences between in vivo and in vitro infection, and the complexity of gene regulation. Ever since the sequencing of the whole genome was first accomplished, functional studies on individual genes have been the mainstream in the CMV field. Gene regulation has therefore been elucidated in a more detailed fashion. However, viral gene regulation is largely controlled by both cellular and viral components. In other words, viral gene expression is determined by the virus–host interaction. Generally, cells respond to viral infection in a defensive pattern; at the same time, viruses try to counteract the cellular defense or else hide in the host(latency). Viruses evolve effective strategies against cellular defense in order to achieve replicative success. Whether or not they are successful, cellular defenses remain in the whole viral replication cycle: entry, immediate–early(IE) gene expression, early gene expression, DNA replication, late gene expression, and viral egress. Many viral strategies against cellular defense, and which occur in the immediate–early time of viral infection, have been documented. In this review, we will summarize the documented biological functions of IE1 and pp71 proteins, especially with regard to how they counteract cellular intrinsic defenses.

  15. Validity of Self-Report Measures of Defense Mechanisms

    Science.gov (United States)

    Mehlman; Slane

    1994-06-01

    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  16. National Defense Budget Estimates for FY 2012

    Science.gov (United States)

    2011-03-01

    Military Construction, Navy Reserve 21,708 26,299 26,299 26,299 Military Construction, Air Force Reserve 25,986 33,620 33,620 33,620 Chemical Demil ...Air Force Reserve 7,634 Chemical Demil Construction, Defense 75,312 13,071,701 Appropriation 13,071,701 Budget Authority 13,071,701 TOA...7.00 3.00 Defense Prod Act 59.00 25.00 16.00 Chemical Demil 53.00 30.00 15.00 2.00 RDT&E Army 34.28 48.72 11.33 3.17 1.70 0.80 Navy 36.87 50.51 9.82

  17. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  18. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  19. Information on Japanese Defensive Installations and Tactics

    Science.gov (United States)

    1945-01-01

    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  20. Research on Nonlinear Dynamics with Defense Applications

    Science.gov (United States)

    2006-04-01

    numerical verifications, we have experimentally realized the scheme by using a Duffing -type of nonlinear electronic oscillator (originally developed by C...circuits In defense applications it may be desirable to induce chaos in nonlinear oscillators operating in a stable regime. Examples of such oscillators ...evolutions of the target Duffing circuit and deliver resonant perturbations to generate robust chaotic attractors. A brief account of the work has been

  1. Defense Trade Data: Sources and Recommendations

    Science.gov (United States)

    2010-11-01

    detailed trade information on such products may be difficult. Recent U.S. concerns have ranged from dependency on rare earths and first level products...BHUTAN BR INDIAN OCEAN TERR EGYPT INDIA IRAN IRAQ ISRAEL JORDAN KOWAIT LEBANON LIBYA MALDIVES MOROCCO NEPAL OMAN PAKISTAN QATAR SAODI...specifically designed or developed for military application and any computer specifically modified for use with any defense article in any category of

  2. Russian Ballistic Missile Defense: Rhetoric and Reality

    Science.gov (United States)

    2015-06-01

    2012/06/08/russia_installs_new_radars_as_a_ deterrent_15834.html. 130. “Direct Line with Vladimir Putin ,” President of Russia , April 17, 2014...and increases the danger of war. In his 2012 pre-election treatise on defense policy and national security, Rus- sian President Vladimir Putin ...Kontsern PVO Almaz-Antey) was established by President Vladimir Putin in 2002 uniting no fewer than 46 enterprises, including factories, research and

  3. Implications of Germany's declining defense spending

    OpenAIRE

    Merrath, Jurgen

    2000-01-01

    With its reunification on 3 October 1990, Germany regained its full sovereignty and stands now in a position of greater global responsibility. Faced with dramatically increased demands on and expectations for Germany's armed forces, it must answer the question of how much it is willing to invest for safety and stability in Europe and for protection of peace in the world. In determining the level of commitment behind Germany's foreign and security policy, defense spending is an important indic...

  4. The Defense of Henderson Field, Guadalcanal

    Science.gov (United States)

    2011-03-31

    of US airpower an4 know disruption ofsuch power is critical to achieving their goals. Most US airpower operates from airbases, which can be...Vandegrift remained in his defensive positions because he did not know the size, strength, location, or intentions of the Japanese main body.67 Ichiki...Parachute/Raider Battalion. 75 Edson deployed his 830 men South of Henderson Field in a series of mut ~ally supporting strongnolds. He was flanked to

  5. A Content Analysis of Defense Budget Rhetoric

    Science.gov (United States)

    2011-06-01

    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  6. Affordability Constraints in Major Defense Acquisitions

    Science.gov (United States)

    2016-11-01

    price , this is actually an inverse supply curve. In competitive markets, the inverse supply curve is the firm’s marginal cost curve. When firms have a...support features and functions. The vertical axis represents the unit sale price , inclusive of all life-cycle or total ownership costs as appropriate...Three Defense Programs 3 We can easily extend the example to incorporate cost - plus payment schemes

  7. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  8. Department of Defense Energy Management Plan, 1980

    Science.gov (United States)

    1980-07-01

    Energy Usage in Existing Buildings . .......... .111-29 111-11 Timetable for Developing Utility Efficiency Standards ................. .......... 111-30...in the Defense Energy Emergency Planning System (DEEMS) document (Appendix A). The purpose of the DEEMS is to assure the availabilty of fuels to the...unleaded gasoline usage , y 1985. It is anticipated that sufficient supplies of ’alcohol and non-petroleum derived fuel will be available. DoD’s

  9. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  10. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral...

  11. FRENDAK to PHENIS to BREIVIK: An Examination of the Imposed Insanity Defense

    Directory of Open Access Journals (Sweden)

    William Donald Richie

    2014-12-01

    Full Text Available The imposition of the insanity defense is a complicated psycho-legal scenario. Globally, definitions of insanity differ from country to country. In a multitude of cases, a determination of insanity at the time of a criminal act means the offender will not be considered responsible for his or her action(s. In many jurisdictions, concerns have been raised that the insanity defense has been used to mitigate punishment, usually after a particularly heinous crime. In this review, the authors use three cases - FRENDAK, PHENIS, and BREIVIK to demonstrate how the imposition of the insanity defense has been used for legal purposes in the past and present. In an effort to give more background to each of the above-mentioned cases, the writers have provided some details to aid comprehension. The authors offer recommendations for the ethical forensic evaluator unburdened by partisan allegiance and invested in the search for truth. This review article relies on peer-reviewed articles available from PubMed, Meharry Online Library and legal dictionaries. We also cross-referenced reputable news sources to ensure the validity of the facts we present.

  12. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  13. Inducible defenses in prey intensify predator cannibalism.

    Science.gov (United States)

    Kishida, Osamu; Trussell, Geoffrey C; Nishimura, Kinya; Ohgushi, Takayuki

    2009-11-01

    Trophic cascades are often a potent force in ecological communities, but abiotic and biotic heterogeneity can diffuse their influence. For example, inducible defenses in many species create variation in prey edibility, and size-structured interactions, such as cannibalism, can shift predator diets away from heterospecific prey. Although both factors diffuse cascade strength by adding heterogeneity to trophic interactions, the consequences of their interactioh remain poorly understood. We show that inducible defenses in tadpole prey greatly intensify cannibalism in predatory larval salamanders. The likelihood of cannibalism was also strongly influenced by asymmetries in salamander size that appear to be most important in the presence of defended prey. Hence, variation in prey edibility and the size structure of the predator may synergistically affect predator-prey population dynamics by reducing prey mortality and increasing predator mortality via cannibalism. We also suggest that the indirect effects of prey defenses may shape the evolution of predator traits that determine diet breadth and how trophic dynamics unfold in natural systems.

  14. Tsunami Defense Efforts at Samcheok Port, Korea

    Science.gov (United States)

    Cho, Y. S.

    2016-02-01

    Tsunamis mainly triggered by impulsive undersea motions are long waves and can propagate a long distance. Thus, they can cause huge casualties not only neighboring countries but also distant countries. Recently, several devastating tsunamis have been occurred around the Pacific Ocean rim. Among them, the Great East Japan tsunami occurred on March 11, 2011 is probably recorded as one of the most destructive tsunamis during last several decades. The Tsunami killed more than 20,000 people (including missing people) and deprived of property damage of approximately 300 billion USD. The eastern coast of the Korean Peninsula has been attacked historically by unexpected tsunami events. These tsunamis were generated by undersea earthquakes occurred off the west coast of Japan. For example, the Central East Sea Tsunami occurred on May 26, 1983 killed 3 people and caused serious property damage at Samcheok Port located at the eastern coast of Korea. Thus, a defense plan against unexpected tsunami strikes is an essential task for the port authority to protect lives of human beings and port facilities. In this study, a master plan of tsunami defense is introduced at Samcheok Port. A tsunami hazard map is also made by employing both propagation and inundation models. Detailed defense efforts are described including the procedure of development of a tsunami hazard map. Keywords: tsunami, hazard map, run-up height, emergency action plan

  15. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  16. Antiviral Defenses in Plants through Genome Editing

    Science.gov (United States)

    Romay, Gustavo; Bragard, Claude

    2017-01-01

    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  17. Electroconvulsive Therapy Malpractice: Verdict for the Defense.

    Science.gov (United States)

    Goodman, Theodore; McCall, W Vaughn

    2015-09-01

    Malpractice cases involving electroconvulsive therapy (ECT) are rare. Even rarer are those malpractice cases alleging ECT-related brain damage. The few cases of ECT malpractice lawsuits are not described in the medical literature in detail. We provide a detailed account of a case of a patient and subsequent alleged ECT-related malpractice. The details of the case were collated using the handwritten notes of one of the authors who was present at the trial and the pretrial documents of discovery that were entered into evidence. The plaintiff alleged complete autobiographical amnesia after ECT, supposedly as a result of ECT-related brain damage. The defense was aided by the presence of extensive neurological examination and brain imaging both before and after ECT. The defense team also offered to the jury the concept of "dissociative amnesia" as an alternative explanation for the plaintiff's memory complaints. The case went to trial and was successfully defended. Electroconvulsive therapy malpractice cases alleging brain damage can be successfully defended, and the successful defense is aided by adequate documentation before, during, and after ECT. Malpractice cases, especially if they are baseless, can occur unpredictably, but they can be defended if the medical documentation is thorough.

  18. DEFENSE RESOURCES MANAGEMENT USING GAME THEORY

    Directory of Open Access Journals (Sweden)

    Marian NEDELCU

    2014-04-01

    Full Text Available Game theory provides a number of analytical tools designed to assist in developing a more comprehensive understanding of phenomena emerging when decision makers interact. A game describes the strategic interactions between players who act guided by their interests and with the consciousness that their actions affect each other. The basic entity in all game theory models is the player. A player may be understood as an individual, group of individuals or any kind of organization, even countries or alliances facing decisions-making challenges and opportunities. In this respect, the concept providing the dimensions and variables informing on the planning “game” elements required for an optimal defense resource allocation is that of ‘capabilities’. The model developed in this paper is focused on allocations of the available defense resources over the assumed capabilities in order to achieve the best response to national security. I consider as a game the competition between strategic decision-makers involved in defense resource management and the threats to the national security.

  19. NATO Phase Zero Contracting - A Proposed Strategic and Operational Planning Construct Within the NATO Framework for Defense Planning and Standardization

    Science.gov (United States)

    2015-02-12

    ethical business protocols; • Primary and secondary customers/supported units and nations; • Anticipated requirements (in relative time-phase...prowess. And, critical to business operations integrity, the STANAG creation can incorporate tenets of ethical and sound business practices in contracting...Expeditionary Operations, Defense Acquisition Review Journal , October 2013, Volume 20, pages 349-372. Acquisition Research Program Graduate School of Business

  20. An Analysis of Proposed Alternatives to the Defense Technical Information Center’s Announcement Products and Services

    Science.gov (United States)

    1985-10-01

    from NTIS," Library Journal , CX, No. 1 (1985): 29. "National Library of Medicine Offers Subsets of MEDLINE," Online Review, VIII, No. 6 (1984...Sandra Young - Defense Nuclear Agency - 25 Jan 85 -41- BIBLIOGRAPHY "Data tiles on floppies coming soon from NT1S." Library Journal , CX, No. 1 (1985

  1. Stuart Johnson: NATO on Eesti julgeolekugarantii / intervjueerinud Margus Kolga

    Index Scriptorium Estoniae

    Johnson, Stuart

    2008-01-01

    USA julgeolekuanalüütik tutvustab Ühendriikide kaitsepoliitika dokumenti "Quadrennial Defence Review 2006" (QDR). Ettevalmistus reeglitega sõjaks. Venemaa, Hiina ja India tulevik. Soovitused Eestile

  2. Stuart Johnson: NATO on eesti julgeolekugarantii / Stuart Johnson ; interv. Margus Kolga

    Index Scriptorium Estoniae

    Johnson, Stuart

    2006-01-01

    Mõjukas USA julgeolekuanalüütik tutvustab Ühendriikide kaitsepoliitika dokumenti "Quadrennial Defence Review 2006" (QDR). Ettevalmistus reeglitega sõjaks. Venemaa, Hiina ja India tulevik. Soovitused Eestile

  3. Stuart Johnson: NATO on Eesti julgeolekugarantii / intervjueerinud Margus Kolga

    Index Scriptorium Estoniae

    Johnson, Stuart

    2008-01-01

    USA julgeolekuanalüütik tutvustab Ühendriikide kaitsepoliitika dokumenti "Quadrennial Defence Review 2006" (QDR). Ettevalmistus reeglitega sõjaks. Venemaa, Hiina ja India tulevik. Soovitused Eestile

  4. Stuart Johnson: NATO on eesti julgeolekugarantii / Stuart Johnson ; interv. Margus Kolga

    Index Scriptorium Estoniae

    Johnson, Stuart

    2006-01-01

    Mõjukas USA julgeolekuanalüütik tutvustab Ühendriikide kaitsepoliitika dokumenti "Quadrennial Defence Review 2006" (QDR). Ettevalmistus reeglitega sõjaks. Venemaa, Hiina ja India tulevik. Soovitused Eestile

  5. Molecular mechanisms of insect adaptation to plant defense:Lessons Iearned from a Bruchid beetle

    Institute of Scientific and Technical Information of China (English)

    Keyan Zhu-Salzman; Ren Sen Zeng

    2008-01-01

    Plants can accumulate,constitutively and/or after induction,a wide variety of defense compounds in their tissues that confer resistance to herbivorous insects.The naturally occurring plant resistance gene pool can serve as an arsenal in pest management via transgenic approaches.As insect-plant interaction research rapidly advances,it has gradually become clear that the effects of plant defense compounds ale determined not only by their toxicity toward target sites,but also by how insects respond to the challenge.Insect digestive tracts age not passive targets of plant defense,but often can adapt to dietary challenge and successfully deal with various plant toxins and anti-metabolites.This adaptive response has posed an obstacle to biotechnology-based pest control approaches,which underscores the importance of understanding insect adaptive mechanisms.Molecular studies on the impact of protease inhibitors on insect digestion have contributed significantly to our understanding of insect adaptation to plant defense.This review will focus on exposing how the insect responds to protease inhibitors by both qualitative and quantitative remod-eling of their digestive proteases using the cowpea bruchid-soybean cysteine protease inhibitor N system.

  6. Plant defense response against Fusarium oxysporum and strategies to develop tolerant genotypes in banana.

    Science.gov (United States)

    Swarupa, V; Ravishankar, K V; Rekha, A

    2014-04-01

    Soil-borne fungal pathogen, Fusarium oxysporum causes major economic losses by inducing necrosis and wilting symptoms in many crop plants. Management of fusarium wilt is achieved mainly by the use of chemical fungicides which affect the soil health and their efficiency is often limited by pathogenic variability. Hence understanding the nature of interaction between pathogen and host may help to select and improve better cultivars. Current research evidences highlight the role of oxidative burst and antioxidant enzymes indicating that ROS act as an important signaling molecule in banana defense response against Fusarium oxysporum f.sp. cubense. The role of jasmonic acid signaling in plant defense against necrotrophic pathogens is well recognized. But recent studies show that the role of salicylic acid is complex and ambiguous against necrotrophic pathogens like Fusarium oxysporum, leading to many intriguing questions about its relationship between other signaling compounds. In case of banana, a major challenge is to identify specific receptors for effector proteins like SIX proteins and also the components of various signal transduction pathways. Significant progress has been made to uncover the role of defense genes but is limited to only model plants such as Arabidopsis and tomato. Keeping this in view, we review the host response, pathogen diversity, current understanding of biochemical and molecular changes that occur during host and pathogen interaction. Developing resistant cultivars through mutation, breeding, transgenic and cisgenic approaches have been discussed. This would help us to understand host defenses against Fusarium oxysporum and to formulate strategies to develop tolerant cultivars.

  7. Regulation of primary plant metabolism during plant-pathogen interactions and its contribution to plant defense

    Directory of Open Access Journals (Sweden)

    Clemencia M Rojas

    2014-02-01

    Full Text Available Plants are constantly exposed to microorganisms in the environment and, as a result, have evolved intricate mechanisms to recognize and defend themselves against potential pathogens. One of these responses is the downregulation of photosynthesis and other processes associated with primary metabolism that are essential for plant growth. It has been suggested that the energy saved by downregulation of primary metabolism is diverted and used for defense responses. However, several studies have shown that upregulation of primary metabolism also occurs during plant-pathogen interactions. We propose that upregulation of primary metabolism modulates signal transduction cascades that lead to plant defense responses. In support of this thought, we here compile evidence from the literature to show that upon exposure to pathogens or elicitors, plants induce several genes associated with primary metabolic pathways, such as those involved in the synthesis or degradation of carbohydrates, amino acids and lipids. In addition, genetic studies have confirmed the involvement of these metabolic pathways in plant defense responses. This review provides a new perspective highlighting the relevance of primary metabolism in regulating plant defense against pathogens with the hope to stimulate further research in this area.

  8. Function of ABA in Stomatal Defense against Biotic and Drought Stresses

    Directory of Open Access Journals (Sweden)

    Chae Woo Lim

    2015-07-01

    Full Text Available The plant hormone abscisic acid (ABA regulates many key processes involved in plant development and adaptation to biotic and abiotic stresses. Under stress conditions, plants synthesize ABA in various organs and initiate defense mechanisms, such as the regulation of stomatal aperture and expression of defense-related genes conferring resistance to environmental stresses. The regulation of stomatal opening and closure is important to pathogen defense and control of transpirational water loss. Recent studies using a combination of approaches, including genetics, physiology, and molecular biology, have contributed considerably to our understanding of ABA signal transduction. A number of proteins associated with ABA signaling and responses—especially ABA receptors—have been identified. ABA signal transduction initiates signal perception by ABA receptors and transfer via downstream proteins, including protein kinases and phosphatases. In the present review, we focus on the function of ABA in stomatal defense against biotic and abiotic stresses, through analysis of each ABA signal component and the relationships of these components in the complex network of interactions. In particular, two ABA signal pathway models in response to biotic and abiotic stress were proposed, from stress signaling to stomatal closure, involving the pyrabactin resistance (PYR/PYR-like (PYL or regulatory component of ABA receptor (RCAR family proteins, 2C-type protein phosphatases, and SnRK2-type protein kinases.

  9. Roles of the Mevalonate Pathway and Cholesterol Trafficking in Pulmonary Host Defense.

    Science.gov (United States)

    Gabor, Kristin A; Fessler, Michael B

    2017-01-01

    The mevalonic acid synthesis pathway, cholesterol, and lipoproteins play fundamental roles in lung physiology and the innate immune response. Recent literature investigating roles for cholesterol synthesis and trafficking in host defense against respiratory infection was critically reviewed. The innate immune response and the cholesterol biosynthesis/trafficking network regulate one another, with important implications for pathogen invasion and host defense in the lung. The activation of pathogen recognition receptors and downstream cellular host defense functions are critically sensitive to cellular cholesterol. Conversely, microorganisms can co-opt the sterol/lipoprotein network in order to facilitate replication and evade immunity. Emerging literature suggests the potential for harnessing these insights towards therapeutic development. Given that >50% of adults in the U.S. have serum cholesterol abnormalities and pneumonia remains a leading cause of death, the potential impact of cholesterol on pulmonary host defense is of tremendous public health significance and warrants further mechanistic and translational investigation. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  10. 75 FR 69642 - Membership of the Performance Review Board (PRB)

    Science.gov (United States)

    2010-11-15

    ... Office of the Secretary Membership of the Performance Review Board (PRB) AGENCY: Department of Defense, Defense Threat Reduction Agency (DTRA). ACTION: Notice of PRB membership. SUMMARY: This notice announces the appointment of DTRA's PRB membership. The publication of the PRB membership is required by 5...

  11. Don’t Break the Bank with COIN: Re-setting U.S. Defense Strategy after Iraq and Afghanistan

    Science.gov (United States)

    2011-10-25

    veterans be factored in to the total cost estimate of a war? Joseph E. Stiglitz and Linda J. Bilmes posited a ―deliberately conservative estimate...2007 & 2009. 37 Joseph E. Stiglitz and Linda J. Bilmes, ―The $3 Trillion War‖, excerpted in Vanity...Spinney, Franklin C. ―Pork Barrels & Budgeteers: What Went Wrong With The Defense Review,‖ Strategic Review, 1997. Stiglitz , Joseph E. and Bilmes, Linda

  12. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Brown, P.S. (ed.)

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base. (GHT)

  13. Low energy proton induced single event upset in 65 nm DDR and QDR commercial SRAMs

    Science.gov (United States)

    Ye, B.; Liu, J.; Wang, T. S.; Liu, T. Q.; Maaz, K.; Luo, J.; Wang, B.; Yin, Y. N.; Ji, Q. G.; Sun, Y. M.; Hou, M. D.

    2017-09-01

    The single event upset (SEU) response of 65 nm commercial double data rate static random access memory (SRAM) and quad data rate SRAM was investigated by using proton beams with energies in the range of 0.15 MeV to 8.0 MeV. Experimental results show that a significant number of SEU occurrences can be triggered when the energy of incident proton is below 1 MeV. For the low energy protons, the SEU cross section measured in these SRAMs was found to increase with increasing proton energy, attaining a peak value, and then decreases as the proton energy was further increased. While in case of quad data rate SRAMs, it seems that they are more sensitive to SEU occurrences as compared with double data rate SRAMs. The bias voltage and data pattern dependence on SEU cross section induced by the low energy protons were also investigated in this work. In addition, the over-layer thickness of the SRAMs and the impact of degrader use in proton induced SEU test were also analyzed in detail. Monte Carlo simulations results indicate that the use of degrader in case of low energy proton induced SEU test results in a significant reduction of the SEU cross section.

  14. The QDR in Perspective: Meeting America’s National Security Needs in the 21st Century

    Science.gov (United States)

    2010-07-28

    retirement annuity that would start in the 60s age group for those who are not selected or who choose not to join the career force; longer tenure, more... pensions that reflect additional years of service, both through their size and through the age at which they start. For medical care. The rising

  15. 32 CFR 321.8 - DSS review of request for amendment.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false DSS review of request for amendment. 321.8... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.8 DSS review of request for... correspondence. (b) DSS determination to approve or deny. Determination to approve or deny and request to amend...

  16. 32 CFR 310.52 - Computer matching publication and review requirements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify...

  17. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  18. Report of the Defense Science Board Subcommittee on Department of Defense Research Policy. Part 1. Policy on Support of Basic Research

    Science.gov (United States)

    1963-12-31

    f. .. AD-A955 482 Report of the Defen e Science Board Subcomtnittee on Depart•eat of Defense RESEARCH POLICY OTIC SELECTED NOV 2 91J88 0(/H...ACCESSION NO NA 11 TITLE (inc/ud* Stcunty Oassificat/on) Report of the Defense Science Board Subcomittee on Department of Defense Research Policy , Part...Defense Research Policy Office of the Director of Defense Research and Engineering Washington, D. C. 31 December 1963 OFFICE OF THE DIRECTOR OF DEFENSE

  19. Toward a defense-dominated world

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  20. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  1. Stop or move: Defensive strategies in humans.

    Science.gov (United States)

    Bastos, Aline F; Vieira, Andre S; Oliveira, Jose M; Oliveira, Leticia; Pereira, Mirtes G; Figueira, Ivan; Erthal, Fatima S; Volchan, Eliane

    2016-04-01

    Threatening cues and surrounding contexts trigger specific defensive response patterns. Potential threat evokes attentive immobility; attack evokes flight when escape is available and immobility when escape is blocked. Tonic immobility installs when threat is overwhelming and life-risky. In humans, reduced body sway characterizes attentive and tonic immobility, the former with bradycardia, and the later with expressive tachycardia. Here, we investigate human defensive strategies in the presence or absence of an escape route. We employed pictures depicting a man carrying a gun and worked with participants exposed to urban violence. In pictures simulating more possibility of escape, the gun was directed away from the observer; in those simulating higher risk and less chance of escape, the gun was directed toward the observer. Matched control pictures depicted similar layouts, but a non-lethal object substituted the gun. Posturographic and electrocardiographic recordings were collected. Amplitude of sway and heart rate were higher for gun directed-away and lower for gun direct-toward. Compared to their respective matched controls, there was a general increase in the amplitude of sway for the gun directed-away pictures; and a reduction in back-and-forth sway and in heart rate for gun directed-toward pictures. Taken together, those measures suggest that, when exposed to threat invading their margin of safety in a context indicating possible escape route, humans, as non-human species, engage in active escape, resembling the flight stage of the defensive cascade. When facing threat indicating less possibility of escape, humans present an immobile response with bradycardia.

  2. Directed energy missions for planetary defense

    Science.gov (United States)

    Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-09-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.

  3. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    Science.gov (United States)

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  4. The Reagan Defense Budget: Prospects and Pressures,

    Science.gov (United States)

    1981-12-01

    policy and to stimulate U.S. economic growth; and ( ii ) the urgent requirement to build up America’s defense capabilities. The former theme is a traditional...Paris in the Fall of 1981: a ver- sion of it will appear in the Ramses conference proceedings. -2- Unfortunately, it now seems as though these two...Proposed OMB Cut Alternatives (August) Level I 221.9 183.6 247.3 219.2 278.4 246.9 Level II 221.4 183.4 238.5 217.4 276.9 243.5 Level III 216.0 182.0

  5. The Relationship between Inflation and Defense Expenditures.

    Science.gov (United States)

    1979-12-01

    resources they would be bid up in the expanding sector. See Robert Solow , "Evaluation," in After the Phillips Curve: Persistence of High Inflation and...can be explained by the respective rates of growth of money supply per unit of national product. ’𔃼 IF’risch, op. cit., p. 1311. Robert J. Gordon...Statistical Approach for Forecasting Defense Expenditures in the Short-run," in William F. Butler, Robert A. Kavesh, and Robert B. Platt, eds., "Methods and

  6. Bacterial gasotransmitters: an innate defense against antibiotics.

    Science.gov (United States)

    Luhachack, Lyly; Nudler, Evgeny

    2014-10-01

    In recent decades, there has been growing interest in the field of gasotransmitters, endogenous gaseous signaling molecules (NO, H2S, and CO), as regulators of a multitude of biochemical pathways and physiological processes. Most of the concerted effort has been on eukaryotic gasotransmitters until the subsequent discovery of bacterial counterparts. While the fundamental aspects of bacterial gasotransmitters remain undefined and necessitate further research, we will discuss a known specific role they play in defense against antibiotics. Considering the current dilemma of multidrug-resistant bacteria we consider it particularly prudent to exploring novel targets and approaches, of which the bacterial gasotransmitters, nitric oxide and hydrogen sulfide represent.

  7. Goblet Cells and Mucins: Role in Innate Defense in Enteric Infections

    Directory of Open Access Journals (Sweden)

    Janice J. Kim

    2013-02-01

    Full Text Available Goblet cells reside throughout the gastrointestinal (GI tract and are responsible for the production and preservation of a protective mucus blanket by synthesizing and secreting high molecular weight glycoproteins known as mucins. The concept of the mucus layer functioning as a dynamic protective barrier is suggested by studies showing changes in mucins in inflammatory conditions of the GI tract, by the altered goblet cell response in germ-free animals, and by the enhanced mucus secretion seen in response to infections. The mucin-containing mucus layer coating the GI epithelium is the front line of innate host defense. Mucins are likely to be the first molecules that invading pathogens interact with at the cell surface and thus, can limit binding to other glycoproteins and neutralize the pathogen. This review will focus on what is known about goblet cell response in various GI infections and the regulatory networks that mediate goblet cell function and mucin production in response to intestinal insults. In addition, we describe the current knowledge on the role of mucins in intestinal innate defense. It is the aim of this review to provide the readers with an update on goblet cell biology and current understanding on the role of mucins in host defense in enteric infections.

  8. Diverse mechanisms evolved by DNA viruses to inhibit early host defenses.

    Science.gov (United States)

    Crow, Marni S; Lum, Krystal K; Sheng, Xinlei; Song, Bokai; Cristea, Ileana M

    In mammalian cells, early defenses against infection by pathogens are mounted through a complex network of signaling pathways shepherded by immune-modulatory pattern-recognition receptors. As obligate parasites, the survival of viruses is dependent on the evolutionary acquisition of mechanisms that tactfully dismantle and subvert the cellular intrinsic and innate immune responses. Here, we review the diverse mechanisms by which viruses that accommodate DNA genomes are able to circumvent activation of cellular immunity. We start by discussing viral manipulation of host defense protein levels by either transcriptional regulation or protein degradation. We next review viral strategies used to repurpose or inhibit these cellular immune factors by molecular hijacking or by regulating their post-translational modification status. Additionally, we explore the infection-induced temporal modulation of apoptosis to facilitate viral replication and spread. Lastly, the co-evolution of viruses with their hosts is highlighted by the acquisition of elegant mechanisms for suppressing host defenses via viral mimicry of host factors. In closing, we present a perspective on how characterizing these viral evasion tactics both broadens the understanding of virus-host interactions and reveals essential functions of the immune system at the molecular level. This knowledge is critical in understanding the sources of viral pathogenesis, as well as for the design of antiviral therapeutics and autoimmunity treatments.

  9. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  10. Defense Intelligence Agency: 50 Years Committed to Excellence in Defense of the Nation

    Science.gov (United States)

    2011-01-01

    to the September 11th terrorist attacks on the Pentagon. Rosa Chapa , Sandra Foster, Robert Hymel, Shelley Marshall, Patricia Mickley, Charles...the Nation MASTER SERGEANT WILLIAM W. BULTMEIER, USA, (RET) Defense Attaché Offi ce, Niamey 23 December 2000 ROSA M. CHAPA Offi ce of the Comptroller

  11. The silent defense: Micro-RNA directed defense against HIV-1 replication

    Directory of Open Access Journals (Sweden)

    Kumar Ajit

    2007-04-01

    Full Text Available Abstract MicroRNAs play critical role in regulating gene expression. MicroRNA profile of particular cell type bears the signature of cell type specific gene expression. Given that viral pathogens replicate by evading host defenses, research is now focused on the miRNA-regulated genes that critically regulate HIV-1 propagation in human host cells.

  12. Plant chemical defense against herbivores and pathogens: generalized defense or trade-offs?

    NARCIS (Netherlands)

    Biere, A.; Marak, H.B.; Van Damme, J.M.M.

    2004-01-01

    Plants are often attacked by multiple enemies, including pathogens and herbivores. While many plant secondary metabolites show specific effects toward either pathogens or herbivores, some can affect the performance of both these groups of natural enemies and are considered to be generalized defense

  13. Transitioning Defense Organizational Initiatives: An Assessment of Key 2001-2008 Defense Reforms

    Science.gov (United States)

    2008-12-01

    Pierre Chao Dr. Daniel Y. Chiu Mr. Raymond F. DuBois Ms. Michèle A. Flournoy Gen Ronald R. Fogleman, USAF (Ret.) Dr. Jacques S. Gansler Mr. Paul R.S...transformation was the Defense Business Board. First chaired by General Gus Pagonis (U. S. Army, Ret.), the chair since 2007 has been Michael Bayer . This

  14. Making Department of Defense Basic Research Purple (Joint), but NOT the Department of Defense Laboratories

    Science.gov (United States)

    2013-12-01

    outside of government, where they report to the chief executive officer (CEO) or to the CEO through a chief technology officer ( CTO ). The panel...Technology ASDR&E Assistant Secretary of Defense for Research and Engineering CEO chief executive officer COE Center of Excellence CTO chief

  15. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2011-07-25

    ... presented by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated... offered price. These provisions must also be used in acquisitions of commercial items conducted using part...--ACQUISITION OF COMMERCIAL ITEMS 4. Add new section 212.205 to read as follows: 212.205 Offers. (c) When...

  16. STUDY OF THE DEFENSIVE PERFORMANCE INDICATORS IN PEAK PERFORMANCE BASKETBALL

    Directory of Open Access Journals (Sweden)

    Alejandro \\u00C1lvarez

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the different defensive performance indicators in basketball, analyzing the difference in relation to success (efficacious or non-efficacious defenses and the game result (win or loss. All halfcourt offenses (n=1045 from the quarterfinal, semifinal, consolation game, and final of the 2008 Olympics Games were analyzed. In each defense phase, the following variables were analyzed with regard to the team on defense: (1 Type of defense used, (2 Pressure in offense transition, (3 Defensive switches, (4 Helping on defense, (5 Inside passes, (6 Degree of opposition when shooting, (7 Points allowed, (8 Final result of the game, and (9 Defensive efficacy. The most significant results show that: : a the type of defense that was most used was quarter-court an-on-man (man-on-man at 6.25m, but the one that was most efficacious was the half-court zone defense; b transition pressure was used in 23.83% of the game phases; c defensive switches were done in 7.85% of the game phases; d helping on defense was used in 60% of the game phases; e inside passes were taken in 30.9% of the game phases; f 38.9% of the shots were done with high opposition; and g points were scored in 42.28% of the game phases, such that winning teams allowed the opponent to score in 38.81% of the game phases, and losing teams in 45.77%.

  17. Extracellular Alkalinization as a Defense Response in Potato Cells

    OpenAIRE

    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-de...

  18. Deming's Management Philosophy and the defense industrial base.

    OpenAIRE

    Graff, David Jacques

    1991-01-01

    Approved for public release: distribution is unlimited The purpose of this thesis is to analyze why firms are leaving the defense industrial base and to determine if Dr. Edwards Deming's Management Philosophy can offer a more constructive way of doing business in the Defense Acquisition System. A comparative analysis was conducted between industry's reasons for wanting to leave the defense sector and Deming's Management Philosophy. This analysis determined if adoption of Deming's Managemen...

  19. Assessing Future Trends in the Defense Burdens of Western Nations

    Science.gov (United States)

    1993-04-01

    Summary Table 1). A weighted average for the four allies that spend most heavily on defense -- Japan , France, Germany, and the United Kingdom--is projected...military was dismantled. Among the largest allies, Japan represents the other extreme. Japanese defense spending as a percentage of GDP is projected to...January 1993. d. Weighted average for Japan , France, Germany, and the United Kingdom--countries that spend the greatest amounts on defense . e The 1990

  20. Defense Exportability Features Initiative: A New Paradigm for International Cooperation

    Science.gov (United States)

    2015-02-01

    exportability process. Consequently DEF should en- hance these traditional benefits in two important ways: • By providing advanced capability to allies and...Defense AT&L: January–February 2015 24 Defense Exportability Features Initiative A New Paradigm for International Cooperation Frank D. Kenlon n...Jay Mandelbaum Kenlon is a professor of international acquisition management (intermittent) in the Defense Systems Management College’s International

  1. Analysis of Defense Products Contract Trends, 1990-2014

    Science.gov (United States)

    2015-04-30

    Analysis of Defense Products Contract Trends , 1990–2014 Andrew Hunter—is a senior fellow in the International Security Program and director of the Defense...a decade, the Defense-Industrial Initiatives Group at the Center for Strategic and International Studies (CSIS) has analyzed and reported on trends ...countervailing trend of divestments, including Northrop Grumman’s divestment of its shipbuilding business into Huntington Ingalls Industries. As

  2. Department of Defense Laboratories: Finding a Future in Technology Transfer

    Science.gov (United States)

    1993-04-01

    investment. There is no mention of DoD even trying. This, then, presents a problem for Defense technology transfer management. The President expects both...effort, but nonetheless felt unable to express their effort quantitatively. The potential size and demand for Defense technology transfer calls for some... Defense technology transfer is taking place, it is doing so on the enthusiasm and drive of a few key individuals. Political demand and legislation

  3. Total Quality Management in the Department of Defense

    Science.gov (United States)

    1989-09-01

    DTI ELECT SDu TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS BRUCE E. SPRINGS, B.S. CAPTAIN, USAF AFIT/GLN/LSR/ 89S -57 I1- DEPARTMENT...13 0 3 AFIT/GLM/LSR/89S-57 TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS BRUCE E. SPRINGS, B.S. CAPTAIN, USAF AFIT/GLH/LSR/89S-57...Defense. # AFIT/GLM/LSR/89S-57 TOTAL QUALITY MANAGEMENT IN THE DEPARTMENT OF DEFENSE THESIS Presented to the Faculty of the School of Systems and Logistics

  4. Defense strategies used by two sympatric vineyard moth pests.

    Science.gov (United States)

    Vogelweith, Fanny; Thiéry, Denis; Moret, Yannick; Colin, Eloïse; Motreuil, Sébastien; Moreau, Jérôme

    2014-05-01

    Natural enemies including parasitoids are the major biological cause of mortality among phytophagous insects. In response to parasitism, these insects have evolved a set of defenses to protect themselves, including behavioral, morphological, physiological and immunological barriers. According to life history theory, resources are partitioned to various functions including defense, implying trade-offs among defense mechanisms. In this study we characterized the relative investment in behavioral, physical and immunological defense systems in two sympatric species of Tortricidae (Eupoecilia ambiguella, Lobesia botrana) which are important grapevine moth pests. We also estimated the parasitism by parasitoids in natural populations of both species, to infer the relative success of the investment strategies used by each moth. We demonstrated that larvae invest differently in defense systems according to the species. Relative to L. botrana, E. ambiguella larvae invested more into morphological defenses and less into behavioral defenses, and exhibited lower basal levels of immune defense but strongly responded to immune challenge. L. botrana larvae in a natural population were more heavily parasitized by various parasitoid species than E. ambiguella, suggesting that the efficacy of defense strategies against parasitoids is not equal among species. These results have implications for understanding of regulation in communities, and in the development of biological control strategies for these two grapevine pests.

  5. Law & psychiatry: Does the constitution require an insanity defense?

    Science.gov (United States)

    Appelbaum, Paul S

    2013-10-01

    Idaho is one of four states that have abolished the insanity defense. Hence, John Delling, on trial for two murders in Idaho, was unable to plead insanity or to argue that he lacked intent to kill, the only available option under Idaho law. After being sentenced to life in prison without parole, Delling challenged the constitutionality of Idaho's law. The state's supreme court rejected his appeal, holding that--despite the long history of the insanity defense and its widespread acceptance--there was no constitutional right to an insanity defense. Delling's petition to the U.S. Supreme Court was turned away, leaving the constitutional status of the insanity defense uncertain.

  6. Plant antiherbivore defenses in Fabaceae species of the Chaco

    Directory of Open Access Journals (Sweden)

    T. E. Lima

    Full Text Available Abstract The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defensedefense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species, leaves (67%, and reproductive organs (56%. The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  7. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... Defense Health Board Subcommittees will present updates to the Board: National Capital Region Base... Forces, Military/ Occupational Health and Medical Surveillance, and the Psychological Health...

  8. Does self-defense training prevent sexual violence against women?

    Science.gov (United States)

    Hollander, Jocelyn A

    2014-03-01

    Self-defense classes are offered across the nation as a strategy for reducing women's vulnerability to sexual assault. Yet there has been little systematic research assessing the effectiveness of these classes. In this article, I use data from a mixed methods study of a 10-week, university-based, feminist self-defense class to examine the effectiveness of self-defense training over a 1-year follow-up period. My analyses indicate that women who participate in self-defense training are less likely to experience sexual assault and are more confident in their ability to effectively resist assault than similar women who have not taken such a class.

  9. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  10. Directed Energy Missions for Planetary Defense

    CERN Document Server

    Lubin, Philip; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathon; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional prop...

  11. Beryllium--important for national defense

    Science.gov (United States)

    Boland, M.A.

    2012-01-01

    Beryllium is one of the lightest and stiffest metals, but there was little industrial demand for it until the 1930s and 1940s when the aerospace, defense, and nuclear sectors began using beryllium and its compounds. Beryllium is now classified by the U.S. Department of Defense as a strategic and critical material because it is used in products that are vital to national security. The oxide form of beryllium was identified in 1797, and scientists first isolated metallic beryllium in 1828. The United States is the world's leading source of beryllium. A single mine at Spor Mountain, Utah, produced more than 85 percent of the beryllium mined worldwide in 2010. China produced most of the remainder, and less than 2 percent came from Mozambique and other countries. National stockpiles also provide significant amounts of beryllium for processing. To help predict where future beryllium supplies might be located, U.S.Geological Survey (USGS) scientists study how and where beryllium resources are concentrated in Earth's crust and use that knowledge to assess the likelihood that undiscovered beryllium resources may exist. Techniques to assess mineral resources have been developed by the USGS to support the stewardship of Federal lands and to better evaluate mineral resource availability in a global context. The USGS also compiles statistics and information on the worldwide supply of, demand for, and flow of beryllium. These data are used to inform U.S. national policymaking.

  12. Evolution of RNA- and DNA-guided antivirus defense systems in prokaryotes and eukaryotes: common ancestry vs convergence.

    Science.gov (United States)

    Koonin, Eugene V

    2017-02-10

    Complementarity between nucleic acid molecules is central to biological information transfer processes. Apart from the basal processes of replication, transcription and translation, complementarity is also employed by multiple defense and regulatory systems. All cellular life forms possess defense systems against viruses and mobile genetic elements, and in most of them some of the defense mechanisms involve small guide RNAs or DNAs that recognize parasite genomes and trigger their inactivation. The nucleic acid-guided defense systems include prokaryotic Argonaute (pAgo)-centered innate immunity and CRISPR-Cas adaptive immunity as well as diverse branches of RNA interference (RNAi) in eukaryotes. The archaeal pAgo machinery is the direct ancestor of eukaryotic RNAi that, however, acquired additional components, such as Dicer, and enormously diversified through multiple duplications. In contrast, eukaryotes lack any heritage of the CRISPR-Cas systems, conceivably, due to the cellular toxicity of some Cas proteins that would get activated as a result of operon disruption in eukaryotes. The adaptive immunity function in eukaryotes is taken over partly by the PIWI RNA branch of RNAi and partly by protein-based immunity. In this review, I briefly discuss the interplay between homology and analogy in the evolution of RNA- and DNA-guided immunity, and attempt to formulate some general evolutionary principles for this ancient class of defense systems.

  13. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting Service • Defense Health Agency • Defense Human Resource Activity • Defense

  14. 32 CFR 37.1030 - What information must I report to the Defense Technical Information Center?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What information must I report to the Defense Technical Information Center? 37.1030 Section 37.1030 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing...

  15. 77 FR 29443 - 60-Day Notice of Two Proposed Directorate of Defense Trade Controls Information Collections...

    Science.gov (United States)

    2012-05-17

    ... collection: The export, temporary import, temporary export and brokering of defense articles, defense... Export Control Act. Those of the public who manufacture or export defense articles, defense services, and... personal delivery. Dated: May 14, 2012. Robert S. Kovac, Managing Director of Defense Trade...

  16. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program

    Science.gov (United States)

    1994-02-01

    Defense Technology Transfer Working Group AGENCY...Director, Defense Research and Engineering. ACTION: solicitation in inputs for defense technology transfer . The Defense Technology Transfer Working...DAILY, 2.3 July 1993 Detense Nuclear Agency, 6801 Telegraph Road, Alexandria,, VA 22310D-3398 A - SOURCES SOUGHT FOR INPUTS FOR DEFENSE TECHNOLOGY TRANSFER

  17. Defense of breast cancer malpractice claims.

    Science.gov (United States)

    Zylstra, S; D'Orsi, C J; Ricci, B A; Halloran, E E; Resseguie, L J; Greenwald, L; Mondor, M C

    2001-01-01

    The goal of this study was to determine whether factors associated with the successful defense and cost of malpractice cases involving the failure to diagnose breast cancer could be identified in medical and legal records. Secondary goals were to develop a multidisciplinary clinical algorithm utilizing National Comprehensive Cancer Network (NCCN) practice guidelines with practitioner risk management strategies. Physician deviations from these guidelines were tracked to identify high-risk areas in the diagnosis of breast cancer. A multidisciplinary clinical algorithm was introduced and practitioner risk management issues were addressed. In this study specific medical, legal, and cost factors were retrospectively abstracted and analyzed to identify associations between medical and legal factors and medicolegal outcome. ProMutual handled 156 malpractice cases involving breast cancer between January 22, 1986, and November 20, 1997. Of the total, 124 cases involving 212 defendants were closed. The closed cases were analyzed, using multivariable stepwise logistic and linear regression, to identify associations between clinical factors and case outcome. Women's health practitioners (WHPs), including obstetrician-gynecologists (OB-GYNs), family medicine, and internal medicine clinicians, were the largest group of defendants (97). Others included radiologists (43), surgeons (33), and pathologists (3). OB-GYNs accounted for 31% of these defendants, with a cost of more than $16 million. The greatest number of specialists represented in the open cases were radiologists, with 38% of the total. The defense model predicts that the probability of successful defense is lessened with inadequate record keeping, a patient that has metastasis and is alive, and a delay in diagnosis of 12 months or more. The overall indemnity model predicts a higher indemnity with the spread of disease at the time of evaluation, a patient who has metastasis and is alive, and a date of occurrence closer

  18. Choosing the Discount Rate for Defense Decisionmaking.

    Science.gov (United States)

    1976-07-01

    rate. .,k U E -14- Pl Pl Pla Plb ( A simple model described by Professor Dan Usher in his 1969 com- munication to the American Economic Review can be...Arrow and Robert C. Lind, "Uncertainty and the Evalua- tion of Public Investment Decisions," American Economic Review , Vol. 60, June 1970, pp. 364...Lind, "Uncertainty and the Evaluation of Public Investment Decisions: Reply," American Economic Review , Vol. 62, March 1972, pp. 171-172. Bailey, Martin

  19. Incentives and Information Quality in Defense Management.

    Science.gov (United States)

    1976-08-01

    American Economic Review , Vol. 62, No. 5, December 1972; Kenneth J. Arrow, Infor-mation and Economic Behavior, Harvard University, Cam- bridge, Mass...Technical Report No. 14, September 1973; and F. A. Hayek, "The Use of Knowledge in Society," The American Economic Review , Vol. 35, No. 4...vs. ’X-Efficiency, "’ The American Economic Review , Vol. 56, No. 3, June 1966, pp. 392-415. For examples treating comparable government or nonprofit

  20. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... recognition by Congress of the remedial nature of the Fair Labor Standards Act and of the need...