WorldWideScience

Sample records for defense superior service

  1. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  2. Batching System for Superior Service

    Science.gov (United States)

    2001-01-01

    Veridian's Portable Batch System (PBS) was the recipient of the 1997 NASA Space Act Award for outstanding software. A batch system is a set of processes for managing queues and jobs. Without a batch system, it is difficult to manage the workload of a computer system. By bundling the enterprise's computing resources, the PBS technology offers users a single coherent interface, resulting in efficient management of the batch services. Users choose which information to package into "containers" for system-wide use. PBS also provides detailed system usage data, a procedure not easily executed without this software. PBS operates on networked, multi-platform UNIX environments. Veridian's new version, PBS Pro,TM has additional features and enhancements, including support for additional operating systems. Veridian distributes the original version of PBS as Open Source software via the PBS website. Customers can register and download the software at no cost. PBS Pro is also available via the web and offers additional features such as increased stability, reliability, and fault tolerance.A company using PBS can expect a significant increase in the effective management of its computing resources. Tangible benefits include increased utilization of costly resources and enhanced understanding of computational requirements and user needs.

  3. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  4. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  5. Privatizing the Defense Finance and Accounting Service

    Science.gov (United States)

    2007-11-02

    STATEMENT A: Approved for public release. Distribution is unlimited. tffllC QUALITY INSPECTED 3 USAWC CLASS OF 1998 U.S. ARMY WAR COLLEGE, CARLISLE...Colonel Richard Meinhart Project Advisor The views expressed in this paper are those of the author and do not necessarily reflect the views of the...military service or government agency. U.S. Army War College CARLISLE BARRACKS, PENNSYLVANIA 17013 DISTRIBUTION STATEMENT A: Approved for public

  6. 76 FR 27274 - Defense Federal Acquisition Regulation Supplement; Rules of the Armed Services Board of Contract...

    Science.gov (United States)

    2011-05-11

    ... Defense Acquisition Regulations System 48 CFR Chapter 2 Defense Federal Acquisition Regulation Supplement; Rules of the Armed Services Board of Contract Appeals AGENCY: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is issuing a final rule to update the Rules...

  7. Considerate Service Plus Convenient Facilities Brings Superior Comfort

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    @@ During Canton Fair and the upcoming Asian Games, China's Foreign Trade has a special interview with Mr. Fang, general manager of Baiyun International Convention Center, and he introduced us the quality service this convention center can provide ?

  8. 75 FR 57906 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2010-09-23

    ... appraisals and make recommendations to the Director, DCAA, regarding final performance ratings and... INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management Division, Defense Contract Audit... of the Secretary Membership of the Defense Contract Audit Agency Senior Executive Service...

  9. Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization

    Science.gov (United States)

    2014-12-01

    No. DODIG-2015-043 D E C E M B E R 1 , 2 0 1 4 Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization... FINANCE AND ACCOUNTING SERVICE SUBJECT: Quality Control Review of the Defense Finance and Accounting Service Internal Audit Organization (Report No...organization, Defense Finance and Accounting Service Office of Internal Review (DFAS IR), in effect for the period ended June 30, 2014. The generally

  10. Lexical Link Analysis (LLA) Application: Improving Web Service to Defense Acquisition Visibility Environment (DAVE)

    Science.gov (United States)

    2015-05-01

    1 LEXICAL LINK ANALYSIS (LLA) APPLICATION: IMPROVING WEB SERVICE TO DEFENSE ACQUISITION VISIBILITY ENVIRONMENT(DAVE) May 13-14, 2015 Dr. Ying...Improving Web Service to Defense Acquisition Visibility Environment (DAVE) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...to install the LLA/CLA/SSA system as a web service in the Defense Acquisition Visibility Environment (DAVE) test bed via the AT&L eBusiness Center

  11. 75 FR 20578 - Availability of the Fiscal Year 2008 Defense Threat Reduction Agency Services Contracts Inventory

    Science.gov (United States)

    2010-04-20

    ... of the Secretary Availability of the Fiscal Year 2008 Defense Threat Reduction Agency Services... Defense Authorization Act for Fiscal Year 2008 (NDAA 08) section 807, the Director of DTRA and the Office of the Director, Defense Procurement and Acquisition Policy, Office of Strategic Sourcing (DPAP/SS...

  12. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... Defense Logistics Agency Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES... performance awards and other actions related to management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency, 8725 John J. Kingman Road, Suite 2533, Fort...

  13. OpenFlow Security Threat Detection and Defense Services

    Directory of Open Access Journals (Sweden)

    Wanqing You

    2014-11-01

    Full Text Available The emergence of OpenFlow-capable switches de- couples control plane from the data flow plane so that they support programmable network and allow network administrators to have programmable central control of network traffic via a controller. The controller and its communication with switches and users become a malicious attack target. This paper explores major possible security threats and attacks on the controller of SDN and proposes a new approach to automatically and dynamically detect and monitor malicious behaviors on flow message passing and defend such attacks to ensure the security of SDN. We have built a FlowEye prototype at service level on Mininet API, and simulation tests are done on two feasible attacks on OpenFlow Beacon platform. The paper provides the feasibility study of such attacks and defense protection strategies in SDN security research.

  14. 76 FR 59664 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2011-09-27

    ... Service (SES) performance appraisals and make recommendations to the Director, DCAA, regarding final... this notice. FOR FURTHER INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management... of the Secretary Membership of the Defense Contract Audit Agency Senior Executive Service...

  15. 76 FR 4322 - Availability of the Fiscal Year 2009 Missile Defense Agency Services Contracts Inventory Pursuant...

    Science.gov (United States)

    2011-01-25

    ... of the Secretary Availability of the Fiscal Year 2009 Missile Defense Agency Services Contracts... United States Code as amended by the National Defense Authorization Act for Fiscal Year 2008 (NDAA 08... Procurement and Acquisition Policy, Office of Strategic Sourcing (DPAP/SS) will make available to the public...

  16. 75 FR 64710 - Availability of the Fiscal Year 2009 Department of Defense Services Contracts Inventory

    Science.gov (United States)

    2010-10-20

    ... of the Secretary Availability of the Fiscal Year 2009 Department of Defense Services Contracts... Fiscal Year 2008 (NDAA 08) section 807, the Office of the Director, Defense Procurement and Acquisition Policy, Office of Program Acquisition and Strategic Sourcing (DPAP/PASS) will make available to the...

  17. The impact of strategic planning process variation on superior organizational performance in nonprofit human service organizations providing mental health services

    Science.gov (United States)

    Singh, Karun Krishna

    This research investigated the question: What is the impact of strategic planning process variation on superior organizational performance in nonprofit human service organizations providing mental health services? The study employed a retrospective, cross-sectional, comparison group design using a combination of survey data, unobtrusive agency backup data, and follow-up in-person interview data. The sample was comprised of two main groups of organizations, those that were doing strategic planning and those that were not engaged in strategic planning. Responses were obtained from the chief executive officers of 306 of the 380 randomly selected organizations resulting in a response rate of 81%. Hypotheses were tested using multiple and logistic regression procedures. The major finding of this study was that complete strategic planning is highly correlated with superior organizational performance. The implications of the findings for administration, policy, research, and the social work profession are discussed.

  18. Report of the Defense Task Force on Sexual Assault in the Military Services

    Science.gov (United States)

    2009-12-01

    that military separation physicals shall include an assessment of sexual trauma, previously disclosed or undisclosed, during active duty service...comply with these standards. Further, SAPRO must be actively engaged in prevention policy development and legislation. Defense Task Force on Sexual ...SAPRO develop training policies and exercise oversight over Military Service training programs. Sexual assault prevention and response training must

  19. 75 FR 14095 - Defense Federal Acquisition Regulation Supplement; Appendix A, Armed Services Board of Contract...

    Science.gov (United States)

    2010-03-24

    ...; Appendix A, Armed Services Board of Contract Appeals, Part 1--Charter AGENCY: Defense Acquisition... Charter of the Armed Services Board of Contract Appeals (ASBCA), dated May 14, 2007. The ASBCA is... of records and to such other instruments as the Board may determine. 11. This revised charter...

  20. 78 FR 34083 - Meeting of the Defense Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2013-06-06

    ... Marine Corps Infantry Officer Course, commissioning sources related to representation of women, and an... of the Secretary Meeting of the Defense Advisory Committee on Women in the Services (DACOWITS) AGENCY... Advisory Committee on Women in the Services (DACOWITS). The purpose of the meeting is to receive briefings...

  1. Managing the Services Supply Chain in the Department of Defense: An Empirical Study of Current Management Practices

    Science.gov (United States)

    2008-04-23

    of services and the increasing importance of services acquisition offer a unique and significant opportunity for conducting research in the management of the service supply chain in the Department of Defense.

  2. Defense Working Capital Fund Pricing in the Defense Finance Accounting Service: A Useful, but Limited, Tool

    Science.gov (United States)

    2015-01-01

    nization at least partially dependent on payments from other govern- 1 The nomenclature fixed cost does not mean that a cost cannot be cut. Rather, the...term refers to cost levels that are unrelated, at least in the short run, to the firm’s level of produc- tion or sales . For example, a firm’s...expenditures on corporate management are unlikely to be changed based on a short-run change in sales levels. 2 Defense Working Capital Fund Pricing in the

  3. Defense Inventory: Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations

    Science.gov (United States)

    2016-06-01

    to be used up beyond recovery or repair—and provides these items to the services when requisitioned in support of approximately 2,400 weapon...distribution functions for depot maintenance operations varies across the services . For example, the Air Force and DLA have agreed to a local recovery ...DEFENSE INVENTORY Further Analysis and Enhanced Metrics Could Improve Service Supply and Depot Operations Report

  4. Managing the Services Supply Chain in the Department of Defense: Empirical Study of the Current Management Practices in the Army

    Science.gov (United States)

    2009-09-21

    Managing the Services Supply Chain in the Department of Defense: Empirical Study of the Current Management Practices in the Army 21 September...Managing the Services Supply Chain in the Department of Defense: Empirical Study of the Current Management Practices in the Army 5a. CONTRACT NUMBER 5b...Service Supply Chain , Services Acquisition, Service Lifecycle, Contract Management, Project Management, Program Management = = ^Åèìáëáíáçå=oÉëÉ~êÅÜ

  5. Military Base Closures and Affected Defense Department Civil Service Employees

    Science.gov (United States)

    2006-03-07

    employees adversely affected by BRAC. Outplacement subsidies could also be offered to other federal agencies to hire displaced DOD employees through...for its civilians, such as outplacement services, priority placement and separation incentives, will be available to employees under NSPS

  6. 76 FR 32358 - Meeting of the Defense Department Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2011-06-06

    ... Law 92-463, as amended, notice is hereby given of a forthcoming meeting of the Defense Department... the results of their Workplace and Gender Relations survey. Additionally, the Committee will also... Military Personnel Policy will brief on the laws and policies that restrict the service of female...

  7. 41 CFR 101-30.504 - Cataloging data from Defense Logistics Services Center (DLSC).

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Cataloging data from Defense Logistics Services Center (DLSC). 101-30.504 Section 101-30.504 Public Contracts and Property Management Federal Property Management Regulations System FEDERAL PROPERTY MANAGEMENT REGULATIONS SUPPLY...

  8. DRMS (Defense Reutilization and Marketing Service) Total Quality Management (TQM) Implementation Plan

    Science.gov (United States)

    1989-07-01

    ORGANIZATION -j’ Defense Reutilization and Marketing Service. (DR:S) REPORT NUMBER Battle Creek, MI 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS...to assure continuing improvement and maintenance of high quality service to customers worldwide. EDUCATION The heart of our effort is the continuous...Workshops (Operations, Reutilization, Precious Metals, Environmental and Marketing ). In addition, we will strive to incorporate them into all

  9. 38 CFR 17.51 - Emergency use of Department of Defense, Public Health Service or other Federal hospitals.

    Science.gov (United States)

    2010-07-01

    ... Health Service Or Other Federal Hospitals § 17.51 Emergency use of Department of Defense, Public Health... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Emergency use of Department of Defense, Public Health Service or other Federal hospitals. 17.51 Section 17.51...

  10. 38 CFR 17.50 - Use of Department of Defense, Public Health Service or other Federal hospitals with beds...

    Science.gov (United States)

    2010-07-01

    ... Defense, Public Health Service or other Federal hospitals with beds allocated to the Department of... of Department of Defense, Public Health Service or other Federal hospitals with beds allocated to the... hospital covered by the agreement, care may be authorized within the bed allocation for any veteran...

  11. DCASR (Defense Contract Administration Service Region), Boston Is the Customer’s Voice. Total Quality Management

    Science.gov (United States)

    1989-10-01

    This document contains information concerning actions taken in FY 89 to implement Total Quality Management at Defense Contract Administration Services Region, Boston. Results of Quality Improvement efforts are discussed in detail. Management by planning vision elements which drive the DCASR Boston approach to management are customer focus, process focus and measures of vision attainment. Each of the elements is discussed in depth. Keywords: Continuous process improvement; Quality improvement prototype nomination.

  12. Defense Management in the 1980s: The Role of the Service Secretaries,

    Science.gov (United States)

    1980-10-01

    defense." In assessing the significance of the 1949 amendments on the role of Service Secretaries, Professor John C. Ries has written: As the Secretary of...in military organizations those difficulties are 24 particularly acute. In his classic study of innovation and the military. Edward Katzenbach ...Secretaries often do provide DOD with unique managerial capabilities unavailable from other sources. 48 ENDNOTES 1. The literature is extensive. John

  13. A Dynamic Defense Modeling and Simulation Methodology using Semantic Web Services

    Directory of Open Access Journals (Sweden)

    Kangsun Lee

    2010-04-01

    Full Text Available Defense Modeling and Simulations require interoperable and autonomous federates in order to fully simulate complex behavior of war-fighters and to dynamically adapt themselves to various war-game events, commands and controls. In this paper, we propose a semantic web service based methodology to develop war-game simulations. Our methodology encapsulates war-game logic into a set of web services with additional semantic information in WSDL (Web Service Description Language and OWL (Web Ontology Language. By utilizing dynamic discovery and binding power of semantic web services, we are able to dynamically reconfigure federates according to various simulation events. An ASuW (Anti-Surface Warfare simulator is constructed to demonstrate the methodology and successfully shows that the level of interoperability and autonomy can be greatly improved.

  14. A Survey of Denial-of-Service and Distributed Denial of Service Attacks and Defenses in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Adrien Bonguet

    2017-08-01

    Full Text Available Cloud Computing is a computing model that allows ubiquitous, convenient and on-demand access to a shared pool of highly configurable resources (e.g., networks, servers, storage, applications and services. Denial-of-Service (DoS and Distributed Denial-of-Service (DDoS attacks are serious threats to the Cloud services’ availability due to numerous new vulnerabilities introduced by the nature of the Cloud, such as multi-tenancy and resource sharing. In this paper, new types of DoS and DDoS attacks in Cloud Computing are explored, especially the XML-DoS and HTTP-DoS attacks, and some possible detection and mitigation techniques are examined. This survey also provides an overview of the existing defense solutions and investigates the experiments and metrics that are usually designed and used to evaluate their performance, which is helpful for the future research in the domain.

  15. Services Supply Chain in the Department of Defense: Drivers of Success in Services Acquisition

    Science.gov (United States)

    2014-04-30

    Maverick Missile, C-20 (Gulfstream IV), and the F-22 Raptor . He was also a contracting squadron commander for an Air Force pilot training base and the...managerial implications. Introduction The service sector represents the largest and the fastest-growing segment of the economies of the United States...labeled a failure because of quality. The group consisting of contracts greater than $1 to $10 million was the largest of all the grouped dollar

  16. Missions of the French Defense Radiation Protection Service Concerning The Medical Management of Radio-contaminated Patients.

    Science.gov (United States)

    Gagna, G; Pégorié, A; Entine, F; Michel, X; Dondey, M; Amabile, J-C

    2016-08-01

    The French Defense Radiation Protection Service (SPRA) is an institution of the French Armed Forces (SSA) that provides technical support in radiation protection matters for French military units. It provides services for the armed forces and when necessary for the national public health system. The aim of this note is to describe the variety of services provided by the SPRA in France and abroad, not only in a military context but also in the broader field of radiation protection.

  17. Oversight of Aegis’s Performance on Security Services Contracts in Iraq with the Department of Defense

    Science.gov (United States)

    2009-01-14

    for three Reconstruction Security Support Services ( RSSS ) contracts. This report focuses on the RSSS contracts, examining the cost of the...SECURITY SERVICES CONTRACTS IN IRAQ WITH THE DEPARTMENT OF DEFENSE What SIGIR Found In addition to the $612.8 million in RSSS contract costs...at costs that are not readily available. Under the RSSS contract, almost 1,400 Aegis personnel provide DoD a variety of security services

  18. Increased host investment in extrafloral nectar (EFN improves the efficiency of a mutualistic defensive service.

    Directory of Open Access Journals (Sweden)

    Marcia González-Teuber

    Full Text Available Extrafloral nectar (EFN plays an important role as plant indirect defence through the attraction of defending ants. Like all rewards produced in the context of a mutualism, however, EFN is in danger of being exploited by non-ant consumers that do not defend the plant against herbivores. Here we asked whether plants, by investing more in EFN, can improve their indirect defence, or rather increase the risk of losing this investment to EFN thieves. We used the obligate plant-ant Acacia-Pseudomyrmex system and examined experimentally in the field during the dry and the rainy seasons how variations in EFN secretion are related to (i ant activity, to (ii the ant-mediated defence against herbivores and (iii the exploitation of EFN by non-ant consumers. Extrafloral investment enhanced ant recruitment and was positively related to the ant mediated defence against herbivores. The ant-mediated protection from exploiters also increased in proportion to the nectar sugar concentration. Although the daily peak of EFN production coincided with the highest activity of EFN thieves, Pseudomyrmex ferrugineus ants protected this resource effectively from exploiters. Nevertheless, the defensive effects by ants differed among seasons. During the dry season, plants grew slower and secreted more EFN than in the rainy season, and thus, experienced a higher level of ant-mediated indirect defence. Our results show that an increased plant investment in an indirect defence trait can improve the resulting defensive service against both herbivores and exploiters. EFN secretion by obligate ant-plants represents a defensive trait for which the level of investment correlates positively with the beneficial effects obtained.

  19. Increased host investment in extrafloral nectar (EFN) improves the efficiency of a mutualistic defensive service.

    Science.gov (United States)

    González-Teuber, Marcia; Silva Bueno, Juan Carlos; Heil, Martin; Boland, Wilhelm

    2012-01-01

    Extrafloral nectar (EFN) plays an important role as plant indirect defence through the attraction of defending ants. Like all rewards produced in the context of a mutualism, however, EFN is in danger of being exploited by non-ant consumers that do not defend the plant against herbivores. Here we asked whether plants, by investing more in EFN, can improve their indirect defence, or rather increase the risk of losing this investment to EFN thieves. We used the obligate plant-ant Acacia-Pseudomyrmex system and examined experimentally in the field during the dry and the rainy seasons how variations in EFN secretion are related to (i) ant activity, to (ii) the ant-mediated defence against herbivores and (iii) the exploitation of EFN by non-ant consumers. Extrafloral investment enhanced ant recruitment and was positively related to the ant mediated defence against herbivores. The ant-mediated protection from exploiters also increased in proportion to the nectar sugar concentration. Although the daily peak of EFN production coincided with the highest activity of EFN thieves, Pseudomyrmex ferrugineus ants protected this resource effectively from exploiters. Nevertheless, the defensive effects by ants differed among seasons. During the dry season, plants grew slower and secreted more EFN than in the rainy season, and thus, experienced a higher level of ant-mediated indirect defence. Our results show that an increased plant investment in an indirect defence trait can improve the resulting defensive service against both herbivores and exploiters. EFN secretion by obligate ant-plants represents a defensive trait for which the level of investment correlates positively with the beneficial effects obtained.

  20. Increased Host Investment in Extrafloral Nectar (EFN) Improves the Efficiency of a Mutualistic Defensive Service

    Science.gov (United States)

    González-Teuber, Marcia; Silva Bueno, Juan Carlos; Heil, Martin; Boland, Wilhelm

    2012-01-01

    Extrafloral nectar (EFN) plays an important role as plant indirect defence through the attraction of defending ants. Like all rewards produced in the context of a mutualism, however, EFN is in danger of being exploited by non-ant consumers that do not defend the plant against herbivores. Here we asked whether plants, by investing more in EFN, can improve their indirect defence, or rather increase the risk of losing this investment to EFN thieves. We used the obligate plant-ant Acacia-Pseudomyrmex system and examined experimentally in the field during the dry and the rainy seasons how variations in EFN secretion are related to (i) ant activity, to (ii) the ant-mediated defence against herbivores and (iii) the exploitation of EFN by non-ant consumers. Extrafloral investment enhanced ant recruitment and was positively related to the ant mediated defence against herbivores. The ant-mediated protection from exploiters also increased in proportion to the nectar sugar concentration. Although the daily peak of EFN production coincided with the highest activity of EFN thieves, Pseudomyrmex ferrugineus ants protected this resource effectively from exploiters. Nevertheless, the defensive effects by ants differed among seasons. During the dry season, plants grew slower and secreted more EFN than in the rainy season, and thus, experienced a higher level of ant-mediated indirect defence. Our results show that an increased plant investment in an indirect defence trait can improve the resulting defensive service against both herbivores and exploiters. EFN secretion by obligate ant-plants represents a defensive trait for which the level of investment correlates positively with the beneficial effects obtained. PMID:23056362

  1. A Discrete Event Simulator for Extensive Defense Mechanism for Denial of Service Attacks Analysis

    Directory of Open Access Journals (Sweden)

    Maryam Tanha

    2012-01-01

    Full Text Available Problem statement: Seeking for defense mechanisms against low rate Denial of Service (DoS attacks as a new generation of DoS attacks has received special attention during recent years. As a decisive factor, evaluating the performance of the offered mitigation techniques based on different metrics for determining the viability and ability of these countermeasures requires more research. Approach: The development of a new generalized discrete event simulator has been deliberated in detail. The research conducted places high emphasis on the benefits of creating a customized discrete event simulator for the analysis of security and in particular the DoS attacks. The simulator possesses a niche in terms of the small scale, low execution time, portability and ease of use. The attributes and mechanism of the developed simulator is complemented with the proposed framework. Results: The simulator has been extensively evaluated and has proven to provide an ideal tool for the analysis and exploration of DoS attacks. In-depth analysis is enabled by this simulator for creating multitudes of defense mechanisms against HTTP low rate DoS attacks. The acquired results from the simulation tool have been compared against a simulator from the same domain. Subsequently, it enables the validation of developed simulator utilizing selected performance metrics including mean in-system time, average delay and average buffer size. Conclusion: The proposed simulator serves as an efficient and scalable performance analysis tool for the analysis of HTTP low rate DoS attack defense mechanism. Future work can encompass the development of discrete event simulators for analysis of other security issues such as Intrusion Detection Systems.

  2. An example of defense service using HYCOM output of the bay of Biscay

    Science.gov (United States)

    Maraldi, Claire; Corréard, Stéphanie; Louazel, Stéphanie; Faillot, Mathilde; Jourdan, Didier

    2013-04-01

    With the continuous improvement of both ocean physics description by numerical models and operational information systems in oceanography to process and analyze coastal observations and forecasts, it becomes now feasible to support defense applications with appropriate production and service at regional scale. On one hand, a real time system based on the HYCOM model has been set up in the bay of Biscay. This system, without assimilation, is run daily. The purpose is to well describe all the processes which occur in this area : the large scale and the mesoscale circulation (eddies, thermal fronts,...), the tidal circulation (the well-known homogeneous one but also the stratified case), the mixing processes... The system provides everyday forecasts of temperature, salinity, currents and sea surface height. Moreover, the system includes a validation component. This validation is automatically performed everyday. In term of temperature and salinity, the model is compared with in-situ profiles, the modeled sea surface height is compared with tide gauge data and the modeled currents are compared with HF radar data in the Iroise sea. On the other hand, SHOM has developped a System for Operational Analysis and Forecast (SOAP) to support French Navy activities. Primarily designed and developed to support anti-submarine warfare at operative level (description of the synoptic scale), the Soap System is dedicated to routinely compute, qualify, prepare and deliver added-value military products. The final version of the Soap System (Soap-3) entered service early 2010 and has become the core component of the oceanographic support for naval operations. It relies on various functionalities ranging from observations and/or model retrieval to the processing and layout of the products. In this talk, we propose to present the real time HYCOM system and we will show how its outputs can be used as inputs of SOAP. Examples of defense products provided in the framework of the the SPONTEX

  3. Object/Shape Recognition Technology: An Assessment of the Feasibility of Implementation at Defense Logistics Agency Disposition Services

    Science.gov (United States)

    2015-02-25

    IV.  ANALYSIS OF THE CURRENT PROPERTY PROCESS AT DEFENSE LOGISTICS AGENCY DISPOSITION SERVICES AND MATURITY ASSESSMENT OF OBJECT/SHAPE RECOGNITION...implement full automation with optical sorting and data mining that included sensors, laser, object/shape recognition technology on conveyor belt...the current state of object/shape recognition technology and assess the feasibility of implementing it at DLA DS. C. RESEARCH QUESTIONS, SCOPE AND

  4. Defense Science Board 1996 Summer Study Task Force On Tactics and Technology for 21st Century Military Superiority. Volume 2, Part 1. Supporting Materials

    Science.gov (United States)

    1996-10-01

    Nancy Chesser • Defense Science Board member ** Members Ex Officio Volume 2, Part 1, Conops 1- Leading Edge Strike Force Volume 2, Part 1, Conops 1...the Sense and Destroy Armor (SADARM) Munition (U), RAND, 1995, MR-510-A. Matsumura, J., E. Cardenas , K. Horn, E. McDonald, Future Army Long- Range

  5. 75 FR 28542 - Superior Resource Advisory Committee

    Science.gov (United States)

    2010-05-21

    ... orient the new Superior Resource Advisory Committee members on their roles and responsibilities. DATES... of the roles and responsibilities of the Superior Resource Advisory Committee members; Election of... Forest Service Superior Resource Advisory Committee AGENCY: Forest Service, USDA. ACTION: Notice...

  6. Green Products and Services from the Defense Logistics Agency: Support for Environmental Requirements

    Science.gov (United States)

    2009-05-07

    further information please call our toll free number 1-800-352-2852 Defense Supply Center Philadelphia Biobased Plastic Flatware • Biobased resin... Biobased Plastic Flatware Offered by JWOD NIB/NISH Partner: L C Industries Product Description NSN Biobased Dining Packet...Remanufactured Toner Cartridges • Vehicular Wet Battery Program • Heavy Equipment Procurement Program • Energy Efficient Lighting • Biobased Fuels • Biobased

  7. Managing the Service Supply Chain in Department of Defense: Implications for the Program Management Infrastructure

    Science.gov (United States)

    2007-04-30

    Supply Chain in Department of Defense: Implications for the Program Management Infrastructure Published: 30 April 2007 by Rene G. Rendon, Lecturer, and Uday Apte, Professor, Naval Postgraduate School 4th Annual Acquisition Research Symposium of the Naval Postgraduate School: Approved for public release, distribution unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 Acquisition Research: Creating Synergy for Informed Change May 16-17, 2007 Report Documentation Page Form ApprovedOMB No. 0704-0188

  8. Promoting Freight Carrier EDI Participation with the Defense Finance and Accounting Service - Indianapolis Center

    Science.gov (United States)

    1993-07-01

    of the Defense Logistics Agency (DLA) and three Army regional data centers known as Multifunctional Information Processing Activities (MIPAs) that...environment (now 49 mainframe computers at 22 different locations) into four regional data centers known as Multifunctional Information Processing...15.4 5 0.1 Yes (LGAQ) Freightways Yellow Freight 676 14.1 0 0 Yes System G. I. Trucking 512 10.7 0 0 Yes Danzas - Northern 485 10.1 0 0 No Air Condor

  9. 76 FR 58155 - Defense Federal Acquisition Regulation Supplement; Construction and Architect-Engineer Services...

    Science.gov (United States)

    2011-09-20

    ... Regulation Supplement; Construction and Architect-Engineer Services Performance Evaluation (DFARS Case 2010... construction and architect-engineer services. DATES: Effective Date: September 20, 2011. FOR FURTHER... construction and Architect- Engineer services. On April 19, 2011, DoD published a proposed rule in the...

  10. 76 FR 55653 - Meeting of the Defense Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2011-09-08

    ... the Sexual Assault Prevention and Response Office and the Services on the Committee's requests for information concerning sexual assault and sexual harassment. Additionally, the Committee will develop and... sexual assault and harassment information. --Receive briefings from the Services on sexual assault...

  11. 76 FR 21851 - Defense Federal Acquisition Regulation Supplement; Construction and Architect-Engineer Services...

    Science.gov (United States)

    2011-04-19

    ... Regulation Supplement; Construction and Architect-Engineer Services Performance Evaluation (DFARS Case 2010... construction and architect-engineer services. DATES: Comments on the proposed rule should be submitted in... requirement to use DoD-unique forms to document contractor past performance for construction and...

  12. 78 FR 52457 - Defense Federal Acquisition Regulation Supplement; Appendix A, Armed Services Board of Contract...

    Science.gov (United States)

    2013-08-23

    ...; Appendix A, Armed Services Board of Contract Appeals, Part 1--Charter CFR Correction 0 In Title 48 of the..., in Appendix A to Chapter 2, add two lines to the list immediately preceding Part 1-- Charter to read as follows: Appendix A to Chapter 2--Armed Services Board of Contract Appeals * * * * *...

  13. A Survey On Various Defense Mechanisms Against Application Layer Distributed Denial Of Service Attack

    Directory of Open Access Journals (Sweden)

    Ms. Anuja R. Zade

    2011-11-01

    Full Text Available The severity of application layer Distributed Denial of Service attack has become a major threat to network operators nowadays. Application layer Distributed Denial of Service attack causes unavailability of resources, revenue loss, and customer churns etc and is one of the most difficult problems to defend against in the internet. The goal of paper is to understand various techniquesproposed recently to defend against specifically application layer Distributed Denial of Service attack. The next step in the path would be to come up with a better solution to solve this problem. Undoubtedly the following discussed techniques are extremely good. A collaborative approach using few of them can be a better solution.

  14. 77 FR 7139 - Public Availability of Defense Nuclear Facilities Safety Board; FY 2010 Service Contract...

    Science.gov (United States)

    2012-02-10

    ... guidance issued on December 19, 2011, by the Office of Management and Budget's Office of Federal... service contract actions over $25,000 that were made in FY 2011. The information is organized by...

  15. 76 FR 11211 - Meeting of the Defense Department Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2011-03-01

    ... during an open portion of this meeting or at a future meeting. Determination of who will be making an... Services. If members of the public are interested in making an oral statement, a written statement must...

  16. 76 FR 7782 - Defense Federal Acquisition Regulation Supplement; Rules of the Armed Services Board of Contract...

    Science.gov (United States)

    2011-02-11

    ... request for the admission of specified facts and/or of the authenticity of any documents, to be answered or objected to within 45 days after service; the factual statements and/or the authenticity of...

  17. Department of Defense Use of Commercial Cloud Computing Capabilities and Services

    Science.gov (United States)

    2015-11-01

    storage systems to the cloud. DoD’s fast follower approach also allows it to move toward a diversified portfolio of cloud service providers and...However, DoD’s approach to its diversified portfolio may introduce some performance risk. With 32 vendors currently offering solutions, and an...service portfolio . Although not mentioned by name in the Cloud Computing Strategy, milCloud was envisioned to play a central role in the DoD Enterprise

  18. nowCOAST's Map Service for NOAA NOS Lake Superior Operational Forecast System (LSOFS) Forecast Guidance (Time Enabled)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Map Information: This nowCOAST time-enabled map service provides maps of the latest nowcasts and forecast guidance of water temperature, water currents, and water...

  19. nowCOAST's Map Service for NOAA NOS Lake Superior Operational Forecast System (LSOFS) Forecast Guidance (Time Offsets)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Map Information: This nowCOAST time-offsets map service provides maps of the latest nowcasts and forecast guidance of water temperature, water currents, and water...

  20. 76 FR 9832 - In the Matter of Superior Well Services, Ltd. Indiana, PA; Confirmatory Order Modifying License...

    Science.gov (United States)

    2011-02-22

    ... Association of Energy Services Companies publication, a North American Transportation Management Institute... Transportation Management Institute publication, and the Applied Health Physics newsletter; and c. Provide the... ADR mediation session, arranged through Cornell University's Scheinman Institute on Conflict...

  1. Services Supply Chain in the Department of Defense: Drivers of Acquisition Management Practices in the Army

    Science.gov (United States)

    2012-04-30

    corhb/Files/Training_Reference_Guidance/ACC%20Pamph let%2070-1%20Final%20Sig%20032610.pdf Williamson, O. E. (1979). Transaction - cost economics: The...Theory and Principal-Agent Problem – Transaction Cost Economics – Service Operations Management – Contractual Theory: How contracts are planned

  2. 77 FR 7138 - Meeting of the Defense Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2012-02-10

    ... Services (DACOWITS). The purpose of the meeting is to receive briefings on sexual harassment programs.... --Briefing--Sexual Harassment Prevention Programs. --Briefing--Health Issues in Combat Zone Deployments. --Briefing--Leadership Accountability in Prevention of Sexual Assault and Harassment. --Briefing--Women...

  3. 78 FR 13029 - Meeting of the Defense Advisory Committee on Women in the Services (DACOWITS)

    Science.gov (United States)

    2013-02-26

    ..., the Navy will provide a briefing on the Sexual Assault Prevention Program at Naval Station Great Lakes, and the Sexual Assault and Prevention Office will brief on the Annual Report on Sexual Harassment and... Sexual Harassment and Violence at the Military Service Academies --Public Comment Period Dated:...

  4. Defense Health Care: Evaluation of TRICARE Pharmacy Services Contract Structure is Warranted

    Science.gov (United States)

    2013-09-01

    costs by identifying high-cost beneficiaries, including those with chronic conditions such as asthma and diabetes , and targeting timely and cost...involves providing coordinated health care interventions and communications to patients who have chronic conditions, such as diabetes or asthma ...pressure, high cholesterol, and diabetes . Page 17 GAO-13-808 DOD Pharmacy Services Contract telecommunication standard from the National

  5. Services Supply Chain in the Department of Defense: Comparison and Analysis of Acquisition Management in the Army, Navy, and Air Force

    Science.gov (United States)

    2010-05-01

    product-based manufacturing models; and Schiele and McCue (2006) studied the acquisition of consulting services in public sector. Although these and...2008). Management of defense acquisition projects. Reston, VA: American Institute of Aeronautics and Astronautics. Schiele , J.J., & McCue, C.P

  6. The Department of Defense Critical Technologies Plan for the Committees on Armed Services United States Congress

    Science.gov (United States)

    1991-05-01

    suppression algorithms Passive * Demonstrate imaging IR * Demonstrate dual band 150 seekers seekers for multipla missions seekers supporting ATR...Program (TrCP) also provides exchange mechi i:, ms through a number of activities in conventional weapons. All of the Services have a number of data and...of 0 Prototyp garner"t and and blolig" aWM degradation enz ms to cloh fibeta and equipment finishos whkih equipmnent surfacesw% c~atiy degrade agenits

  7. Assistant Inspector General for Investigations Defense Criminal Investigative Service Annual Report for Calendar Year 2001

    Science.gov (United States)

    2001-01-01

    Inspection Service. • On March 16, 2001, Vencor, Incorporated (Vencor), and Ventas , Incorporated ( Ventas ), both in Louisville, KY, entered... Ventas , a real estate investment trust that owns and manages all of the real estate assets. The settlement agreement requires Vencor and Ventas to pay...the False Claims Act. The whistleblowers alleged that Vencor, Ventas and/or their subsidiaries submitted false and fraudulent claims to Medicare

  8. Report of the Defense Task Force on Sexual Harassment and Violence at the Military Service Academies

    Science.gov (United States)

    2005-06-01

    female students that an offender would be appropriately punished for sexual harassment. Women at the Academies also gen - erally showed no change in...civilian female paralegal who works at the Academy. The Victim Witness Coordinator is responsible for ensuring that victims’ and witnesses’ rights are...victim’s disclosure to a lawyer or the lawyer’s assistant or paralegal to obtain services, and that communication is protected under the lawyer-client

  9. Defense Logistics Agency Disposition Services Needs to Improve Demilitarization Program Self-Assessment Evaluations - Redacted

    Science.gov (United States)

    2016-12-20

    from reoccurring. In another example, for the March 30, 2015, self-assessment protocol “CPU [ central processing units ]/Laptops,”23 CDD Tucson personnel...the protocol required CDD personnel to review 23 Protocol ensures that CDD received only central processing units /laptops that had properly prepared...features from DoD property. 2 DLA Disposition Services operates three Centralized Demilitarization Divisions; the Tucson, Arizona, location processed

  10. Migrating Department of Defense (DoD) Web Service Based Applications to Mobile Computing Platforms

    Science.gov (United States)

    2012-03-01

    Application Archetype MVC Model View Controller NDFD National Digital Forecast Database NOAA National Oceanic and Atmospheric Administration’s NSSC...for Java (GAE-J). GWT and GAE are not required to implement the COLD-T application, any web framework (PHP, Struts, JSF, Spring MVC , etc.) could be...2010. [3] S. D. K. Hyun Jung La, “Balanced MVC Architecture for Developing Service-based Mobile Applications,” IEEE International Conference on E

  11. Developing Vibrant State Defense Forces: A Successful Medical and Health Service Model

    Science.gov (United States)

    2006-01-01

    MEDICAL AND HEALTH SERVICE MODEL Colonel (MD) H. Wayne Nelson, Ph.D. Colonel (MD) Robert Barish, M.D. Brigadier General (MD) Frederic Smalkin, J.D...Its Deputy Commander and MRC project action officer was (one of the authors, Nelson), a professor in the Health Science Department in Towson ...Director COL Wayne Nelson, to select “medically-qualified soldiers” who would accept assignment to “participate in humanitarian missions in response and

  12. User Feedback Mechanisms for Defense Technical Information Center Services and Products. Phase II,

    Science.gov (United States)

    1983-05-10

    these visitors are users or potential users of DTIC products L and services. A DTIC spokesperson summarizes the history of the agency and provides an...questionnaire and the user responses to it were studied and offered a number of useful insights for development of this qulestionnaire. Paul Klinefelter , Judy...questionnaire). * 5P. Klinefelter , J. Pickeral, and T. Lahr, 5, 7, 8, 21, and 25 April, 6 and 9 May 1983. 6 "DTIC-TOS Annual Historical Summary--FY82

  13. Defense Headquarters: DOD Needs to Reassess Personnel Requirements for the Office of Secretary of Defense, Joint Staff, and Military Service Secretariats

    Science.gov (United States)

    2015-01-01

    requirements as part of the effort to identify efficiencies as directed by former Secretary of Defense Robert Gates in 2010, as part of the OSD...Director), Tracy Barnes, Gabrielle A. Carrington, Neil Feldman , David Keefer, Carol D. Petersen, Bethann E. Ritter Snyder, Michael Silver, Amie Steele

  14. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  15. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  16. Managing the services supply chain in the Department of Defense: an empirical study of current management practices / by Aruna U. Apte, Uday M. Apte, and Rene G. Rendon.

    OpenAIRE

    Apte, Aruna U.; Uday M. Apte; Rendon, Rene G.

    2009-01-01

    This paper presents the results of our ongoing research on the management of services acquisition in the Department of Defense. In this empirical study we developed and used a web-based survey to collect data on the acquisition strategy, procurement methods, and contract types used at Air Force and Navy installations. Specifically, we studied the current management practices in such areas as life cycle approach, project management, organization/management structure, and training provided to s...

  17. Department of Defense Prime Contract Awards by Service Category and Federal Supply Classification. Fiscal Years 1996, 1995, 1994, and 1993.

    Science.gov (United States)

    1996-01-01

    Rehabilitation Services 1,260 555 118 357 Q519 Psychiatry Services 16,457 26,100 30,437 30,665 Q520 Podiatry Services 102 0 0 0 Q521 Pulmonary...Musical Inst, Phonographs, and Home-Type Radios 2,620 2,257 1,602 3,465 Recreational and Athletic Equipment 7810 Athletic and Sporting Equipment 7820...Rehabilitation Services Q519 Psychiatry Services Q520 Podiatry Services Q521 Pulmonary Services Q522 Radiology Services Q523 Surgery Services Q525

  18. Microfiche/Telex Oriented Document Services Center Established in Sylvania Library Through Cooperative Test Program with Defense Documentation Center.

    Science.gov (United States)

    Little, Dean K.

    In a cooperative program with Defense Documentation Center Headquarters, Sylvania arranged for procurement of 70,000 unclassified-unlimited documents without DDC Form I cards and 30,000 unclassified-limited and classified documents with Form I's. This was done in order to overcome effects of an in-house documents inventory/selective destruction…

  19. Joint-Service Integration: An Organizational Culture Study of the United States Department of Defense Voluntary Education System

    Science.gov (United States)

    Benson, Martin K.

    2010-01-01

    The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…

  20. An Analysis of Proposed Alternatives to the Defense Technical Information Center’s Announcement Products and Services

    Science.gov (United States)

    1985-10-01

    from NTIS," Library Journal , CX, No. 1 (1985): 29. "National Library of Medicine Offers Subsets of MEDLINE," Online Review, VIII, No. 6 (1984...Sandra Young - Defense Nuclear Agency - 25 Jan 85 -41- BIBLIOGRAPHY "Data tiles on floppies coming soon from NT1S." Library Journal , CX, No. 1 (1985

  1. Finance Near-Term Technical Architecture for the Defense Information Technology Services Organization. Version 1.1.

    Science.gov (United States)

    1992-11-01

    Government agencies. Gateways to Sprint’s Meeting Channel and AT&T’s Accunet Reserved Digital Services allow for meeting, with other national and...weaknesses, and provide varying degrees of video and audio quality. Facilities are connected by either dedicated digital lines and/or switched digital ... services . Standard communication interfaces include ISDN, using both the Sasic Rate Interface (BRI) and the Primary Rate Interface (PRI). Most systems

  2. [Development of an evidence-based managerial decision aid to assist in the provision of secondary medical services in the Israel Defense Forces (IDF)].

    Science.gov (United States)

    Green, Ilan; Huerta, Michael; Bar-Dayan, Yosefa; Fire, Gil

    2009-04-01

    Increasing global expenditures on health, together with increased patient demand for quality and service, have created a need for health care management tools based on economic and quaLity-based criteria. Despite the recognition of this need, decision-support tools are Lacking. In the Israel Defense Forces (IDF), policy change and budgetary and quality constraints necessitated the development of an evidence-based managerial decision aid, to assist in providing medical services at acceptable quality and availability leveLs, while addressing economic concerns. To develop a decision-support model for the IDF Medical Corps, that balances the conflicting considerations of service avaiLabiLity and cost. The authors developed a manageriaL model to characterize regional secondary medical care, and to compare it to country-wide patterns and to historic regional patterns. Secondary care systems were then analyzed by specialty. Finally, the relative costs of medical encounters for each speciaLty were anaLyzed. Core specialties examined included dermatology, orthopedics and otolaryngology. Two-thirds of all referrals to core specialists were made to intra-organizational resources. Furthermore, several intra-organizationaL clinics were found to have short waiting times and low output indices. In response to the application of the model, IDF Medical Corps policy was updated and suppliers were reprioritized, yielding substantial savings of up to NIS 5.5 million in 2006 alone. This cost saving enabled budgetary reallocation and alternative investment in the emergency and primary health care systems. Applying efficient managerial tools can lead to cost savings and to increased quality and availability of services. These tools must effectively follow changes in the dynamics of the health care system. These changes are to be impLemented rapidly, in order to provide practical guidance for medical administrators and to enable them to infLuence the real-time utiLization of medical

  3. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  4. Defense Health Care: Availability and Quality Measurement of Women’s Health Care Services in U.S. Military Hospitals

    Science.gov (United States)

    2016-06-01

    not selected randomly, they do not constitute a representative sample of all domestic military hospitals, and the information obtained from these...clinical judgement . The MHS, the Military Services and NCR, and Individual Military Hospitals Used Quality Measures to Identify and Implement

  5. Retention and Promotion of High-Quality Civil Service Workers in the Department of Defense Acquisition Workforce

    Science.gov (United States)

    2014-01-01

    quality, other factors that may deter- mine the performance rating include the methods used to monitor the worker’s output, the frequency with which...P. Sanders, and Constance Horner, Civil Service Reform: Building a Government That Works, Washington, D.C.: The Brookings Institution, 1996

  6. 34 CFR 674.57 - Cancellation for law enforcement or corrections officer service-Federal Perkins, NDSL and Defense...

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Cancellation for law enforcement or corrections officer... EDUCATION FEDERAL PERKINS LOAN PROGRAM Loan Cancellation § 674.57 Cancellation for law enforcement or... November 29, 1990, for full-time service as a law enforcement or corrections officer for an eligible...

  7. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  8. Ten-year experience of superior gluteal artery perforator flap for reconstruction of sacral defects in Tri-Service General Hospital

    Directory of Open Access Journals (Sweden)

    Chin-Ta Lin

    2014-01-01

    Full Text Available Background: Despite advances in reconstruction techniques, sacral sores continue to present a challenge to the plastic surgeon. The superior gluteal artery perforator (SGAP flap is a reliable flap that preserves the entire contralateral side as a future donor site. On the ipsilateral side, the gluteal muscle itself is preserved and all flaps based on the inferior gluteal artery are still possible. However, the dissection of the perforator is tedious and carries a risk of compromising the perforator vessels. Patients and Methods: During the period between April 2003 and March 2013, 30 patients presented to our section with sacral wounds causing by pressure sores or infected pilonidal cysts. Of a total of 30 patients, 13 were female and 17 were male. Their ages ranged from 22 to 92 years old (mean 79.8 years old. Surgical intervention was performed electively with immediate or delayed reconstruction using a SGAP flap. The characteristics of patients′ age, and sex, and cause of sacral defect, co-morbidities, wound culture, flap size, perforator number, hospital stay, and outcome were reviewed. Results: For all operations, the length of the pedicle dissection will not exceed 1 cm because of the vascular anatomy of the SGAP, which lies adjacent to the sacral region. Due to short pedicle dissection, all SGAP flap were elevated around an hour. All flaps survived except two, which had partial flap necrosis and were finally treated by contralateral V-Y advancement flaps coverage. The mean follow-up period was 14.8 months (range 3-24. No flap surgery-related mortality was found. Conclusion: Perforator-based flaps have become popular in modern reconstructive surgery because of low donor site morbidity and good preservation of muscle. Our study shows that deep pedicle dissection is unnecessary when the surgery involves an accurate indicating perforator, adequate flap size design, and correct selection of flap utilization between tunnel and rotation. The

  9. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  10. Superior Hiking Trail

    Data.gov (United States)

    Minnesota Department of Natural Resources — Superior Hiking Trail main trail, spurs, and camp spurs for completed trail throughout Cook, Lake, St. Louis and Carlton counties. These data were collected with...

  11. Bathymetry of Lake Superior

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Bathymetry of Lake Superior has been compiled as a component of a NOAA project to rescue Great Lakes lake floor geological and geophysical data and make it more...

  12. Superior Hiking Trail Facilities

    Data.gov (United States)

    Minnesota Department of Natural Resources — Superior Hiking Trail main trail, spurs, and camp spurs for completed trail throughout Cook, Lake, St. Louis and Carlton counties. These data were collected with...

  13. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting ServiceDefense Health Agency • Defense Human Resource Activity • Defense

  14. 77 FR 29443 - 60-Day Notice of Two Proposed Directorate of Defense Trade Controls Information Collections...

    Science.gov (United States)

    2012-05-17

    ... collection: The export, temporary import, temporary export and brokering of defense articles, defense... Export Control Act. Those of the public who manufacture or export defense articles, defense services, and... personal delivery. Dated: May 14, 2012. Robert S. Kovac, Managing Director of Defense Trade...

  15. Maintaining Space Superiority

    Science.gov (United States)

    2014-02-01

    owned by the Iridium Corpora- tion. That event sparked international concern as issues of on-orbit safety became a hot topic for international... Attacks on Space Systems," Space and De- fense 4, no. 1 (Winter 2010): 10, http:/ /www.usafa.edu/df/dfe/dfer/centers/ecsds/docs /Space_and_Defense_

  16. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  17. The Federal Civil Service Workforce: Assessing the Effects on Retention of Pay Freezes, Unpaid Furloughs, and Other Federal-Employee Compensation Changes in the Department of Defense

    Science.gov (United States)

    2014-01-01

    of the 2011–2013 pay freeze, the unpaid furloughs in 2013, a wave of retirements of the baby - boom generation, and recent proposals by lawmakers to...Department of Defense (DoD). These pay actions on top of a wave of baby -boomer retirements and various proposals by lawmakers to reduce federal compensation

  18. PERSISTENT LEFT SUPERIOR VENACAVA

    Directory of Open Access Journals (Sweden)

    Devinder Singh

    2014-05-01

    Full Text Available A Persistent Left Superior Venacava (PLSVC is the most common variation of the thoracic venous system and rare congenital vascular anomaly and is prevalent in 0.3% of the population. It may be associated with other cardiovascular abnormalities including atrial septal defect, bicuspid aortic valve, coarctation of aorta, coronary sinus ostial atresia, and cor triatriatum. Incidental rotation of a dilated coronary sinus on echocardiography should raise the suspicion of PLSVC. The diagnosis should be confirmed by saline contrast echocardiography. Condition is usually asymptomatic. Here we present a rare case of persistent left superior vena cava presented in OPD with dyspnoea & palpitations.

  19. 32 CFR 1602.17 - Military service.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Military service. 1602.17 Section 1602.17 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM DEFINITIONS § 1602.17 Military service. The term military service includes service in the Army, the Navy, the Air...

  20. Department of Defense Dictionary of Military and Associated Terms

    Science.gov (United States)

    2016-02-15

    distribution and deployment. f. level VI - personnel: detail expressed by name, Service , military occupational specialty and unique identification...of one or more weapons with all related equipment, materials, services , personnel, and means of delivery and deployment (if applicable) required for...2016 A-46 JP 1-02 DCRF defense chemical, biological, radiological, and nuclear response force DCS Defense Courier Service ; deputy chief

  1. Sexual Assault and Sexual Harassment in the U.S. Military. Volume 2. Estimates for Department of Defense Service Members from the 2014 RAND Military Workplace Study

    Science.gov (United States)

    2015-01-01

    the legal definitions of sexual assault and sexual harassment, whether they know their obligations for investigat- ing and reporting such events...National Guard duty LGBT lesbian, gay, bisexual, transgender MEO military equal opportunity NCOA National Change of Address NDRI RAND National Defense...unwanted experiences but that experience did not meet all of the UCMJ definitional criteria of sexual assault. Air Force rates of unwanted events are

  2. Air Superiority Fighter Characteristics.

    Science.gov (United States)

    1998-06-05

    many a dispute could have been deflated into a single paragraph if the disputants had just dared to define their terms.7 Aristotle ...meaningful. This section will expand on some key ideology concepts. The phrase "air superiority fighter" may bring to mind visions of fighter... biographies are useful in garnering airpower advocate theories as well as identifying key characteristics. Air campaign results, starting with World

  3. Inspection of the Defense Prisoner of War/Missing in Action Office

    Science.gov (United States)

    2016-05-05

    Valuation OFFICE OF THE INSPECTOR GENERAL INSPECTION OF THE DEFENSE PRISONER OF WAR/MISSING IN ACTION OFFICE Report No. 96-023 November...Information Systems Agency Defense Prisoner of War/Missing in Action Office Defense Supply Service Washington Equal Employment Opportunity Equal...Prisoner of War/Missing in Action Under Secretary of Defense (Policy) Washington Headquarters Services INSPECTOR GENERAL DEPARTMENT OF DEFENSE

  4. Geospatial Services Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: To process, store, and disseminate geospatial data to the Department of Defense and other Federal agencies.DESCRIPTION: The Geospatial Services Laboratory...

  5. Geospatial Services Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — FUNCTION: To process, store, and disseminate geospatial data to the Department of Defense and other Federal agencies. DESCRIPTION: The Geospatial Services Laboratory...

  6. Services Supply Chain in the Department of Defense: A Comparison of Acquisition Management Practices in the Army, Navy, and Air Force

    Science.gov (United States)

    2010-08-23

    k^s^i=mlpqdo^ar^qb=p`elli= models; and Schiele and McCue (2006) studied the acquisition of consulting services in the public sector. Although these...Aeronautics and Astronautics. Schiele , J. J., & McCue, C. P. (2006). Professional service acquisition in public sector procurement. International

  7. Contabilidad Financiera Superior

    OpenAIRE

    Ipiñazar Petralanda, Izaskun

    2013-01-01

    Duración (en horas): De 31 a 40 horas. Destinatario: Estudiante y Docente A través de este material se presentan las pautas necesarias para implementar un aprendizaje basado en problemas en la asignatura de Contabilidad Financiera Superior dentro de los temas “Constitución de S.A. y S.R.L.” (Tema 2), “Ampliaciones de Capital” (Tema 3) y “Reducciones de Capital” (Tema 4). En primer lugar se presentan las guías generales de la asignatura, y a continuación, las diferentes activida...

  8. Contabilidad Financiera Superior

    OpenAIRE

    Ipiñazar Petralanda, Izaskun

    2013-01-01

    Duración (en horas): De 31 a 40 horas. Destinatario: Estudiante y Docente A través de este material se presentan las pautas necesarias para implementar un aprendizaje basado en problemas en la asignatura de Contabilidad Financiera Superior dentro de los temas “Constitución de S.A. y S.R.L.” (Tema 2), “Ampliaciones de Capital” (Tema 3) y “Reducciones de Capital” (Tema 4). En primer lugar se presentan las guías generales de la asignatura, y a continuación, las diferentes activida...

  9. Statistics of superior records

    Science.gov (United States)

    Ben-Naim, E.; Krapivsky, P. L.

    2013-08-01

    We study statistics of records in a sequence of random variables. These identical and independently distributed variables are drawn from the parent distribution ρ. The running record equals the maximum of all elements in the sequence up to a given point. We define a superior sequence as one where all running records are above the average record expected for the parent distribution ρ. We find that the fraction of superior sequences SN decays algebraically with sequence length N, SN˜N-β in the limit N→∞. Interestingly, the decay exponent β is nontrivial, being the root of an integral equation. For example, when ρ is a uniform distribution with compact support, we find β=0.450265. In general, the tail of the parent distribution governs the exponent β. We also consider the dual problem of inferior sequences, where all records are below average, and find that the fraction of inferior sequences IN decays algebraically, albeit with a different decay exponent, IN˜N-α. We use the above statistical measures to analyze earthquake data.

  10. Frenillo labial superior doble

    Directory of Open Access Journals (Sweden)

    Carlos Albornoz López del Castillo

    Full Text Available El frenillo labial superior doble no sindrómico es una anomalía del desarrollo que no hemos encontrado reportada en la revisión bibliográfica realizada. Se presenta una niña de 11 años de edad que fue remitida al servicio de Cirugía Maxilofacial del Hospital "Eduardo Agramonte Piña", de Camagüey, por presentar un frenillo labial superior doble de baja inserción. Se describen los síntomas clínicos asociados a esta anomalía y el tratamiento quirúrgico utilizado para su solución: una frenectomía y plastia sobre la banda muscular frénica anormal que provocaba exceso de tejido en la mucosa labial. Consideramos muy interesante la descripción de este caso, por no haber encontrado reporte similar en la literatura revisada.

  11. Superior Valley photovoltaic power processing and system controller evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Bonn, R.; Ginn, J.; Zirzow, J.; Sittler, G.

    1995-11-01

    Sandia National Laboratories, sponsored by the US Department of Energy`s Office of Energy Management, conducts the photovoltaic balance-of-system program. Under this program, Sandia supports the Department of Defense Strategic Environmental Research Development Plan, SERDP, which is advancing the use of photovoltaics in operational DoD facilities. This report details the acceptance testing of the first of these photovoltaic hybrid systems: the Superior Valley photovoltaic-diesel hybrid system. This is the first of several photovoltaic installations for the Department of Defense. The system hardware tested at Sandia included an inverter, maximum power trackers, and a system controller.

  12. As entidades do Serviço Social Brasileiro na defesa da formação profissional e do projeto ético-político The Brazilian Social Service organizations in defense of the professional training and the ethical-political project

    Directory of Open Access Journals (Sweden)

    2011-12-01

    Full Text Available O objetivo deste texto é trazer elementos para o debate sobre a formação profissional no contexto da contrarreforma da educação superior no Brasil e suas implicações para o Projeto Ético-Político do Serviço Social. Será explicitado como se tem evidenciado a lógica quantitativa em detrimento da qualidade do ensino. Retomam-se os princípios formativos que orientam a formação profissional em Serviço Social, ressaltando as Diretrizes Gerais da Abepss (1996. Por fim, busca-se resgatar as lutas e estratégias de enfrentamento construídas democraticamente e incorporadas pelas entidades organizativas do Serviço Social brasileiro a fim de ampliar este debate e reafirmar a defesa do projeto profissional.The aim of this paper is to bring elements to the debate on professional training in the context of the counter-reform of higher education in Brazil and its implications for the ethical-political social work project. It will be explained as the quantitative logic has been made evident at the expense of the quality of education. We resume the principles that guide the professional training in social work, highlighting the Abepss General Guidelines (1996. Finally, we try to rescue the struggles and coping strategies democratically constructed and incorporated by organizing entities of the Brazilian Social Service to extend this debate and reassure the defense of the professional project.

  13. Directed Energy Missions for Planetary Defense

    OpenAIRE

    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  14. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  15. The Potential Effects of the Defense Business Board Military Compensation Task Group’s 2011 Recommendations on Active-Duty Service Member Retirement

    Science.gov (United States)

    2012-12-01

    period. For the High-3 version of the current plan, NPV is defined as the lump-sum equivalent of the total pension annuities paid from the time of...only 37.5% of the lump-sum equivalent of total annuities received under the current DB plan. Likewise, for an enlisted service member, this value...only 37.5% of the lump-sum equivalent of total annuities received under the current DB vi plan. Likewise, for an enlisted service member, this value

  16. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  17. Department of Defense Recovering Warrior Task Force

    Science.gov (United States)

    2014-09-02

    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from http://www.armytimes.com/article...Coordination briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from http://www.defense.gov/news/newsarticle.aspx?id=121796.  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  18. Sobredentadura total superior implantosoportada

    Directory of Open Access Journals (Sweden)

    Luis Orlando Rodríguez García

    2010-06-01

    Full Text Available Se presenta un caso de un paciente desdentado total superior, rehabilitado en la consulta de implantología de la Clínica "Pedro Ortiz" del municipio Habana del Este en Ciudad de La Habana, Cuba, en el año 2009, mediante prótesis sobre implantes osteointegrados, técnica que se ha incorporado a la práctica estomatológica en Cuba como alternativa al tratamiento convencional en los pacientes desdentados totales. Se siguió un protocolo que comprendió una fase quirúrgica, procedimiento con o sin realización de colgajo y carga precoz o inmediata. Se presenta un paciente masculino de 56 años de edad, que acudió a la consulta multidisciplinaria, preocupado, porque se le habían elaborado tres prótesis en los últimos dos años y ninguna reunía los requisitos de retención que él necesitaba para sentirse seguro y cómodo con las mismas. El resultado final fue la satisfacción total del paciente, con el mejoramiento de la calidad estética y funcional.

  19. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  20. 78 FR 22765 - Presidential Determination on Eligibility of the Federal Republic of Somalia To Receive Defense...

    Science.gov (United States)

    2013-04-16

    ... Federal Register. (Presidential Sig.) THE WHITE HOUSE, Washington, April 8, 2013 [FR Doc. 2013-09106 Filed... Eligibility of the Federal Republic of Somalia To Receive Defense Articles and Defense Services Under the... defense services to the Federal Republic of Somalia will strengthen the security of the United States...

  1. The Potential Linkage between Emergency Medical Services Systems and Health Systems Agencies to Civil Defense Related Health and Medical Care Plans and Operations.

    Science.gov (United States)

    1980-07-01

    Objective 10 B. Study Methodology 10 IV. E 7SS/HSA LINKAGE TO CIVIL DEFEN SE 13 V. HEALTH AND MEDICAL PLANNING FUNCIONS 31 A. Primarily Non-Health...Department Responsibilities 31 B. Primarily Health Department Responsibilities 41 VI. DISASTER MEDICAL PLANNING IN THE SAN FRANCISCO BAY AREA 62 VII...Agency B-i APPENDIX C - State Emergency Health Service Planning Functions: Potential Agency Input C-i APPENDIX D - San Francisco Bay Area Planning D

  2. Sexual Assault and Sexual Harassment in the U.S. Military: Volume 2. Estimates for Department of Defense Service Members from the 2014 RAND Military Workplace Study

    Science.gov (United States)

    2016-01-01

    restoring good order and discipline within the member’s unit. We believe it would be wise to assess service members’ sexual orientation in future studies...demographics, psychological state, command climate, attitudes and beliefs about sexual assault in the military and the nation, and other related issues. 2...for sexual assault that have been identified in prior research on civilian and military samples, with the exception of sexual orientation . We also

  3. Trust, Engagement, and Technology Transfer: Underpinnings for U.S.-Brazil Defense Cooperation (Strategic Forum, no. 279)

    Science.gov (United States)

    2012-08-01

    percent of do- mestic defense output. COMDEFESA teaches defense resources management at the National War College, the Escola Superior de Guerra , with the...National Defense Strategy,” 35, 17. 24 Fernando Bustamante, “La Transferencia de Tecnologica Militar desde Estados Unidos al Brasil,” Documento de

  4. Manufacturing Innovation and Technological Superiority

    Science.gov (United States)

    2016-09-01

    Defense AT&L: September-October 2016 2 From the Under Secretary of Defense for Acquisit ion, Technology, and Logist ics Manufacturing Innovation ...English advantages in mechanized textile manufacturing in the early 1800s drove the performance of the British economy, just as Carnegie’s steel...program to establish Manufacturing Innovation Institutes (MIIs) that would create incubators for advanced manufacturing technology in key

  5. Defense Science Board Task Force Report on Defense Strategies for Ensuring the Resilience of National Space Capabilities

    Science.gov (United States)

    2017-03-01

    Executive Summary is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the...Executive Summary Since 2000, when the Defense Science Board concluded space superiority was absolutely essential in achieving global awareness, information...Whelan Government Advisors Dr. Larry Gershwin – ODNI/NIM Science and Technology Executive Secretary Col Russell Teehan, USAF – AT&L/Space, Strategic

  6. Design of a fifth generation air superiority fighter

    Science.gov (United States)

    Atique, Md. Saifuddin Ahmed; Barman, Shuvrodeb; Nafi, Asif Shahriar; Bellah, Masum; Salam, Md. Abdus

    2016-07-01

    Air Superiority Fighter is considered to be an effective dogfighter which is stealthy & highly maneuverable to surprise enemy along with improve survivability against the missile fire. This new generation fighter aircraft requires fantastic aerodynamics design, low wing loading (W/S), high thrust to weight ratio (T/W) with super cruise ability. Conceptual design is the first step to design an aircraft. In this paper conceptual design of an Air Superiority Fighter Aircraft is proposed to carry 1 crew member (pilot) that can fly at maximum Mach No of 2.3 covering a range of 1500 km with maximum ceiling of 61,000 ft. Payload capacity of this proposed aircraft is 6000 lb that covers two advanced missiles & one advanced gun. The Air Superiority Fighter Aircraft was designed to undertake all the following missions like: combat air petrol, air to air combat, maritime attack, close air support, suppression, destruction of enemy air defense and reconnaissance.

  7. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  8. 伪造接入点技术的智能手机拒绝服务攻防策略%Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point

    Institute of Scientific and Technical Information of China (English)

    杨雄; 朱宇光

    2013-01-01

    With the popularization of smart phone,the denial of service attack regard to this platform has been an important research direc-tion in wireless security field. With the disadvantage on security mechanism of Android mobile phones,respectively introduce the strategy on denial of service attack and defense for the platform from two different perspectives. The denial of service with faked WiFi access point is introduced and dual channel authentication model against such attacks are proposed. The executed experiments indicate that it is effec-tive for setting up a faked WiFi access point can simply prompt attack of smartphone with denial of service,the dual channel authentica-tion model can prove the validation for WiFi access point.%随着智能手机的普及化,面向该平台的拒绝服务攻击已经成为了无线安全研究领域的一个重要研究方向。针对目前智能Android手机网络安全防护措施研究的不足,从攻击与防御两个不同角度阐述了针对该平台的拒绝服务攻击方案和防御策略。引入了伪造无线WiFi接入点技术的拒绝服务攻击方案,并且提出了应对该攻击方案的双通道验证防御模型。实验结果表明,虚假的WiFi接入点技术可轻易地对智能手机发起有效的拒绝服务攻击,同时双通道验证模型可高效验证无线接入点的网络连通性。

  9. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  10. 立足本地优势不断提升公共气象服务能力%Based on Local Superiority to Improve the Ability of Public Meteorological Service

    Institute of Scientific and Technical Information of China (English)

    李杨

    2012-01-01

    Based on the result was required by Inner Mongolia Meteorological Service Centre in public meteoro- logical service domain recently, the social demand about public meteorological service work which effected guiding role was studied. Meanwhile, some problems had been put out in development of public meteorological service at the present stage. We put forward that only stick to develop meteorological service, fostered new source of meteorological service growth and enhanced core competitiveness of meteorological enterprise. Development in Inner Mongolia Meteorological Service would be boosted faster and better.%文章根据近几年内蒙古气象服务中心在公共气象服务领域所取得的成绩,认真探究社会需求对公共气象服务工作所产生的引领作用,同时摆出现阶段发展中所存在的问题,提出只有坚持公共气象服务发展方向,不断培育气象服务新的增长点,才能提高气象事业的核心竞争力,推动内蒙古公共气象服务事业更快更好地发展。

  11. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  12. The Full Costs of Ballistic Missile Defense

    Science.gov (United States)

    2003-01-01

    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  13. Host Defense against Opportunist Microorganisms Following Trauma.

    Science.gov (United States)

    1988-06-30

    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  14. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  15. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  16. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  17. 76 FR 11411 - Defense Federal Acquisition Regulation Supplement; Multiyear Contracting (DFARS Case 2009-D026)

    Science.gov (United States)

    2011-03-02

    ... aircrew members or foreign language training); (4) Base services (e.g., ground maintenance, in-plane... Defense Acquisition Regulations System 48 CFR Part 217 RIN 0750-AG89 Defense Federal Acquisition Regulation Supplement; Multiyear Contracting (DFARS Case 2009-D026) AGENCY: Defense Acquisition...

  18. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  19. [The superior laryngeal nerve and the superior laryngeal artery].

    Science.gov (United States)

    Lang, J; Nachbaur, S; Fischer, K; Vogel, E

    1987-01-01

    Length, diameter and anastomoses of the nervus vagus and its ganglion inferius were measured 44 halved heads. On the average, 8.65 fiber bundles of the vagus nerve leave the retro-olivary area. In the area of the jugular foramen is the near superior ganglion of the 10th cranial nerve. In this area were found 1.48 (mean value) anastomoses with the 9th cranial nerve. 11.34 mm below the margo terminalis sigmoidea branches off the ramus internus of the accessory nerve which has a length of 9.75 mm. Further anastomoses with the 10th cranial nerve were found. The inferior ganglion of the 10th nerve had a length of 25.47 mm and a diameter of 3.46 mm. Five mm below the ganglion the 10th nerve had a width of 2.9 and a thickness of 1.5 mm. The mean length of the superior sympathetic ganglion was 26.6 mm, its width 7.2 and its thickness 3.4 mm. In nearly all specimens anastomoses of the superior sympathetic ganglion with the ansa cervicalis profunda and the inferior ganglion of the 10th cranial nerve were found. The superior laryngeal nerve branches off about 36 mm below the margo terminalis sigmoidea. The width of this nerve was 1.9 mm, its thickness 0.8 mm on the right and 1.0 mm on the left side. The division in the internal and external rami was found about 21 mm below its origin. Between the n. vagus and thyreohyoid membrane the ramus internus had a length of 64 mm, the length of external ramus between the vagal nerve and the inferior pharyngeal constrictor muscle was 89 mm. Its mean length below the thyreopharyngeal part was 10.7 mm, 8.6 branchlets to the cricothyroid muscle were counted. The superior laryngeal artery had its origin in 80% of cases in the superior thyroideal artery, in 6.8% this vessel was a branch of the external carotid artery. Its average outer diameter was 1.23 mm on the right side and 1.39 mm on the left. The length of this vessel between its origin and the thyreohyoid membrane was 34 mm. In 7% on the right side and in 13% on the left, the superior

  20. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  1. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  2. What are Millian Qualitative Superiorities?

    Directory of Open Access Journals (Sweden)

    Jonathan Riley

    2008-04-01

    Full Text Available In an article published in Prolegomena 2006, Christoph Schmidt-Petri has defended his interpretation and attacked mine of Mill’s idea that higher kinds of pleasure are superior in quality to lower kinds, regardless of quantity. Millian qualitative superiorities as I understand them are infinite superiorities. In this paper, I clarify my interpretation and show how Schmidt-Petri has misrepresented it and ignored the obvious textual support for it. As a result, he fails to understand how genuine Millian qualitative superiorities determine the novel structure of Mill’s pluralistic utilitarianism, in which a social code of justice that distributes equal rights and duties takes absolute priority over competing considerations. Schmidt-Petri’s own interpretation is a non-starter, because it does noteven recognize that Mill is talking about different kinds of pleasant feelings, such that the higher kinds are intrinsically more valuable than the lower. I conclude by outlining why my interpretation is free of any metaphysical commitment to the “essence” of pleasure.

  3. Isolated superior mesenteric artery dissection

    Directory of Open Access Journals (Sweden)

    Lalitha Palle

    2010-01-01

    Full Text Available Isolated superior mesenteric artery (SMA dissection without involvement of the aorta and the SMA origin is unusual. We present a case of an elderly gentleman who had chronic abdominal pain, worse after meals. CT angiography, performed on a 64-slice CT scanner, revealed SMA dissection with a thrombus. A large artery of Drummond was also seen. The patient was managed conservatively.

  4. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  5. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  6. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  7. A escrita no Ensino Superior

    Directory of Open Access Journals (Sweden)

    Maria Conceição Pillon Christofoli

    2013-01-01

    Full Text Available http://dx.doi.org/10.5902/198464445865 O presente artigo trata de apresentar resultados oriundos de pesquisa realizada no Ensino Superior, enfocando a escrita em contextos universitários. Depoimentos por parte dos acadêmicos evidenciam certa resistência ao ato de escrever, o que acaba muitas vezes distanciando o sujeito da produção de um texto. Assim sendo, mesmo que parciais, os resultados até então analisados dão conta de que: pressuposto 1 – há ruptura da ideia de coerência entre o que pensamos, o que conseguimos escrever, o que entende nosso interlocutor; pressuposto 2 – a autocorreção de textos como exercício de pesquisa é imprescindível para a qualificação da escrita; pressuposto 3 – os diários de aula representam rico instrumento para a qualificação da escrita no Ensino Superior; pressuposto 4 – há necessidade de que o aluno do Ensino Superior escreva variados tipos de escrita, ainda que a universidade cumpra com seu papel, enfatizando a escrita acadêmica; pressuposto 5 – o trabalho com a escrita no Ensino Superior deve enfatizar os componentes básicos da expressão escrita: o código escrito e a composição da escrita. Palavras-chave: Escrita; Ensino Superior; formação de professores.

  8. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  9. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  10. Pensamiento Superior y Desarrollo Territorial

    Directory of Open Access Journals (Sweden)

    Víctor Manuel Racancoj Alonzo

    2015-04-01

    Full Text Available Esta reflexión pretende explicar el papel, fundamental, que juega el pensamiento superior, en la formulación y la práctica de modelos de desarrollo territorial local; para que contribuyan de forma sustantiva, en la transformación de las condiciones socioeconómicas adversas que hoy viven comunidades indígenas y rurales de muchos países, como Guatemala, situación que puede resumirse en altos índices de pobreza y desnutrición. Pero, el pensamiento superior, debe ser competencia de la población con pertenencia a lo local, pues si y solo si esta condición existe, se dará validez y viabilidad al desarrollo territorial. Para alcanzar competencias de pensamiento superior, en los espacios locales, se tiene que superar obstáculos en el modelo de universidad, que hoy estamos familiarizados a ver y pensar; modelos que tienen las características de: herencia colonial, disfunción con la problemática económica, cultural, social y política de la sociedad y la negación de los saberes ancestrales.

  11. Superior sulcus tumors (Pancoast tumors).

    Science.gov (United States)

    Marulli, Giuseppe; Battistella, Lucia; Mammana, Marco; Calabrese, Francesca; Rea, Federico

    2016-06-01

    Superior Sulcus Tumors, frequently termed as Pancoast tumors, are a wide range of tumors invading the apical chest wall. Due to its localization in the apex of the lung, with the potential invasion of the lower part of the brachial plexus, first ribs, vertebrae, subclavian vessels or stellate ganglion, the superior sulcus tumors cause characteristic symptoms, like arm or shoulder pain or Horner's syndrome. The management of superior sulcus tumors has dramatically evolved over the past 50 years. Originally deemed universally fatal, in 1956, Shaw and Paulson introduced a new treatment paradigm with combined radiotherapy and surgery ensuring 5-year survival of approximately 30%. During the 1990s, following the need to improve systemic as well as local control, a trimodality approach including induction concurrent chemoradiotherapy followed by surgical resection was introduced, reaching 5-year survival rates up to 44% and becoming the standard of care. Many efforts have been persecuted, also, to obtain higher complete resection rates using appropriate surgical approaches and involving multidisciplinary team including spine surgeon or vascular surgeon. Other potential treatment options are under consideration like prophylactic cranial irradiation or the addition of other chemotherapy agents or biologic agents to the trimodality approach.

  12. 75 FR 58347 - Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors

    Science.gov (United States)

    2010-09-24

    ...; ] DEPARTMENT OF AGRICULTURE Forest Service Information Collection; Overcoming Barriers to Wildland Fire Defensible Space Behaviors AGENCY: Forest Service, USDA. ACTION: Notice; request for comment. SUMMARY: In... interested individuals and organizations on the new information collection, Overcoming Barriers to...

  13. 77 FR 4284 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-01-27

    ... relating to mission, policy, accreditation, faculty, student, facilities, curricula, educational methods, research, and administration of the National Intelligence University. The Director, Defense Intelligence... consecutive terms of service. This same term of service limitation also applies to any DoD...

  14. Ensino superior, assistência estudantil e mercado de trabalho: um estudo com egressos da UFMG Higher education, support services to students and the labor market: a study with graduates from UFMG

    Directory of Open Access Journals (Sweden)

    Michely de Lima Ferreira Vargas

    2011-03-01

    Full Text Available O presente artigo apresenta os principais resultados de estudo que examinou as conexões entre as desigualdades de acesso e permanência no ensino superior, a assistência estudantil e a inserção profissional de uma amostra de egressos da UFMG. A análise comparativa da situação socioeconômica dos egressos da amostra, composta tanto por profissionais que participaram dos programas de assistência estudantil oferecidos pela universidade, bem como por aqueles que não foram bolsistas, demonstrou que, de posse do diploma, no que diz respeito aos níveis de remuneração, os ex-bolsistas estão em igualdade de condições no mercado de trabalho com seus congêneres que não receberam esse apoio. No caso da amostra analisada neste trabalho, a remuneração dos bolsistas é afetada pelos mesmos fatores que influenciam a composição dos rendimentos dos não bolsistas, ou seja, carreira, titulação e setor de atuação. O exame dos dados apontou que a renda se relaciona fortemente com a carreira, assim como têm demonstrado estudos sobre perfil de egressos de graduação no Brasil. A análise efetuada evidenciou que ao auxiliar estudantes pobres a obter o diploma de graduação, a assistência estudantil colabora para que estes universitários tornem-se profissionais qualificados e ingressem no mercado de trabalho portando credenciais valorizadas, ampliando suas possibilidades de ascender socialmente.This article presents the main results of a study that examined the connections between inequalities in access and permanence in higher education, the student aid and employability for a sample of graduates from UFMG. The comparative analysis of the socio-economic status of the graduates, composed both by students who received aid as well as by those who did not, shows that, in the case of the sample in this study, the remuneration of graduates who received aid is in equal terms and affected by the same factors that influence the composition of the

  15. 32 CFR 21.200 - What is the Defense Grant and Agreement Regulatory System (DGARS)?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What is the Defense Grant and Agreement... Washington Headquarters Services Internet site http://www.dtic.mil/whs/directives. Paper copies may be obtained, at cost, from the National Technical Information Service, 5285 Port Royal Road, Springfield,...

  16. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  17. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  18. Entidades fiscalizadoras superiores y accountability

    OpenAIRE

    Estela Moreno, María

    2016-01-01

    OBJETIVOS DE LA TESIS: El objetivo general del trabajo es establecer el nivel de eficacia de las Entidades Fiscalizadoras Superiores (EFS) como agencia asignada y herramienta de accountability horizontal, a través de la valoración de su diseño institucional y de la calidad de sus productos finales, los informes de auditoría, estableciéndose los siguientes objetivos específicos: 1. Relevar las nociones de accountability, actualizando el Estado del Arte de la cuestión. 2. Analizar la ...

  19. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  20. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  1. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  2. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  3. Defense Security Cooperation Agency Vision 2020. Update 1

    Science.gov (United States)

    2015-10-01

    articles, military training, and other defense-related services, by grant, loan, cash sale, or lease , in furtherance of national policies and objectives...Presidential Policy Directive 23 on Security Sector Assistance. D S C A V i s i o n 2 0 2 0 Solutions for America’s Global Partners 7 DSCA...less labor-intensive for USG implementing agencies. Oct 2014 – Dec 2016 d. Explore and develop options for using LOAs to support leases of defense

  4. The sentence superiority effect revisited.

    Science.gov (United States)

    Snell, Joshua; Grainger, Jonathan

    2017-11-01

    A sentence superiority effect was investigated using post-cued word-in-sequence identification with the rapid parallel visual presentation (RPVP) of four horizontally aligned words. The four words were presented for 200ms followed by a post-mask and cue for partial report. They could form a grammatically correct sentence or were formed of the same words in a scrambled agrammatical sequence. Word identification was higher in the syntactically correct sequences, and crucially, this sentence superiority effect did not vary as a function of the target's position in the sequence. Cloze probability measures for words at the final, arguably most predictable position, revealed overall low values that did not interact with the effects of sentence context, suggesting that these effects were not driven by word predictability. The results point to a level of parallel processing across multiple words that enables rapid extraction of their syntactic categories. These generate a sentence-level representation that constrains the recognition process for individual words, thus facilitating parallel word processing when the sequence is grammatically sound. Copyright © 2017 Elsevier B.V. All rights reserved.

  5. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  6. 论发展和提升国防科技情报研究的高端服务能力%On the Development and Improvement of the High-end Service Ability of Defense S & T Information Research

    Institute of Scientific and Technical Information of China (English)

    张福元; 刘占岭

    2012-01-01

    Developing high-end service is the necessary choice for the pursuit of sustainable development of defense S T information research.Moreover,it's the inherent requirement for playing its functional role in the new situation.In order to promote the healthy development of defense S T information research more effectively,we should grasp the traits of the high-end requirement accurately,and create favorable conditions for high-end service.This paper discusses the urgency of high-end service and aims at improving the high-end service ability.Then,it analyzes the traits of the high-end requirement and the measures which should be taken to develop and improve the high-end service ability.%发展高端服务是国防科技情报研究工作谋求持续发展的必然选择,更是新形势下发挥其职能作用的内在要求。为更有效地促进国防科技情报研究工作的健康发展,应准确把握高端需求的特点,为发展国防科技情报研究高端服务创造有利的条件。文章论述了发展国防科技情报研究高端服务的迫切性,并着眼提升高端服务能力,分析国防科技情报研究高端需求的特点和发展,以及提升高端服务能力应采取的举措。

  7. 78 FR 21116 - Superior Supplier Incentive Program

    Science.gov (United States)

    2013-04-09

    ... Department of the Navy Superior Supplier Incentive Program AGENCY: Department of the Navy, DoD. ACTION... policy that will establish a Superior Supplier Incentive Program (SSIP). Under the SSIP, contractors that..., performance, quality, and business relations would be granted Superior Supplier Status (SSS). Contractors...

  8. superior en México

    Directory of Open Access Journals (Sweden)

    César Mureddu Torres

    2008-01-01

    Full Text Available El presente artículo desarrolla algunos de los retos que ha traído consigo el acceso a la información existente en la red de Internet y lo que ello supone. Se abordan principalmente las consecuencias de la presencia actual de una sociedad llamada del conocimiento, si se mantiene la confusión entre conocimiento e información. Por ello, la sola gestión de la información no puede ser tomada como definitoria respecto a la función de educación superior confiada a las universidades. Hacerlo sería cometer un error aún más grave que la confusión teórica entre los términos mencionados.

  9. Improving Tradecraft of Services Acquisition

    Science.gov (United States)

    2015-08-01

    Logistics Management Services , Equipment Related Services , Electronics and Communication Services , Medical Services , and Facilities Related Defense AT&L...Acquisition University (DAU) Service Acquisition Process for standardization. This seven step, team-focused approach relies on market research...detailed in BBP 3.0. Training and Tools BBP 1.0 and 2.0 rightly noted that services are required and overseen by DoD personnel that often are not

  10. 75 FR 13763 - General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217...

    Science.gov (United States)

    2010-03-23

    ... ADMINISTRATION DEPARTMENT OF DEFENSE NATIONAL AERONAUTICS AND SPACE ADMINISTRATION General Services Administration Acquisition Regulation; Submission for OMB Review; GSA Form 1217, Lessor's Annual Cost Statement AGENCY: Department of Defense (DOD), General Services Administration (GSA), and National Aeronautics...

  11. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  12. Serious Games: Defense Advanced Research Projects Agency: An Interview with Innovation Information Office Program Manager CAPT Russell Shilling, PhD.

    Science.gov (United States)

    2012-04-01

    Dr. Shilling received his Doctor of Philosophy in Experimental Psychology (Auditory Psychophysics/Neuroscience) from the University of North Carolina at Greensboro in 1992 and his Bachelor of Arts in Psychology at Wake Forest University in 1985. In 1993 he graduated with top honors from Aerospace Experimental Psychologist training-Naval Flight Surgeon Class 93002. In 1996, he served as an Assistant/Associate Professor at the U.S. Air Force Academy in the Department of Behavioral Sciences and Leadership. In 2000, he arrived at the Naval Postgraduate School as an Associate Professor in the Operations Research and Systems Engineering Departments and became Technical Director for Immersive Technologies in the Modeling, Virtual Environments, and Simulation Institute. His military decorations include the Defense Superior Service Medal, Meritorious Service Medal (three awards), the Navy Commendation Medal, and the Navy Achievement Medal. He is also the recipient of the American Hospital Association's 2009 Executive Award for Excellence.

  13. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  14. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  15. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  16. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  17. Heartland Engineers: A Century of Superior Service 1907-2007

    Science.gov (United States)

    2009-01-01

    KANSAS CITY DISTRICT ARMY CORPS OF ENGINEERS DISTINGUISHED CIVILIANS LOUIS G. FEIL SUPERVISORY CIVIL ENGINEER / CHIEF, ENGINEERING DIVISION 1939 to 1966...MARK TWAIN IND PARK: PA/INPR 133. MARSHALL SATELLITE POW CAMP: PA/INPR 134. MARTIN AARON 135. MATTIACE PETROLEUM, NY SUPERFUND SITE, HAZARDOUS WASTE

  18. Escuela Superior de Palos Verdes

    Directory of Open Access Journals (Sweden)

    Neutra, Richard J.

    1965-02-01

    Full Text Available Before initiating the building operations for the «Palos Verdes» School, the site was divided into two large horizontal surfaces, at different levels. The lower one served to accommodate the playing fields, a car park, the physical training building, and shop and ancillary buildings. On the higher of these two surfaces, and to the West of the access road, there is a car park and also the building and plot of ground devoted to agricultural technology, as well as the literary studies and general purpose buildings. As a complement to these, there is a series of blocks, arranged in parallel rows, which house the administrative offices, the art school, the craft's school, the general classrooms, and those devoted to higher education. The fascinating aspect of this school is the outstanding penetration of the architect's mind into the essential function of the project. Its most evident merit is the sense of comradeship and harmony that permeates the whole architectural manifold.Antes de construir el complejo escolar «Palos Verdes» se comenzó por crear, en el terreno, dos grandes mesetas a niveles diferentes. Sobre el inferior se organizaron: los campos de juegos, de deportes, un aparcamiento, el edificio para educación física y los destinados a tiendas y servicios. Sobre la meseta superior, al oeste de la vía de acceso, se dispuso un aparcamiento y el edificio y campo para adiestramiento agrícola; al este, otro aparcamiento, el edificio dedicado a materias literarias, y el destinado a usos múltiples. Completan las instalaciones de la escuela una serie de bloques paralelos: la administración, la escuela de arte, las clases de trabajos manuales, las aulas de enseñanzas generales, y las de los cursos superiores. Lo fascinante de este complejo escolar es la perfecta y magistral compenetración del arquitecto con el tema proyectado, y su mayor mérito, la sensación de cordialidad y armonía con el ambiente.

  19. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  20. Defense Base Realignment and Closure Account for the Defense Personnel Support Center, the Defense Clothing Factory, and the Naval Aviation Depot Pensacola

    Science.gov (United States)

    1996-11-25

    outplacement center. Additionally, adjusting accounting entries must be reviewed for accuracy once Defense Contract Management District North Central is...that the Office of Executive Director, Human Resources, issue guidance for outplacement services to future BRAC activities scheduled for closure...Management concurred and stated that the DLA Civilian Personnel Support Office is developing an agency outplacement guide. 15 Appendix C. Background of

  1. Reappraising Defense Organization: An Analysis Based on the Defense Organization Study of 1977-1980,

    Science.gov (United States)

    1983-01-01

    or all of the current structure and there- by presents the opportunity for some external entity to begin, like Moses, with a tabula rasa , the...fundamental role of the Department of Defense (DOD) has been to "provide for the common defence," as described in the US Constitution. This...be strengthened. Chapter 5 focuses on the military depart- ments, with particular emphasis on the role of the service secretar- ies. It recommends

  2. 78 FR 26665 - Excepted Service

    Science.gov (United States)

    2013-05-07

    .../2013 Services. Assistant Secretary Strategic Planning. for Public Affairs. Senior Speechwriter... Assistant Secretary Global Strategic of Defense (Global Affairs. Strategic Affairs). Office of the Special.... Assistant. Confidential SE130004 2/20/2013 Assistant. Small Business Administration..... Office of...

  3. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  4. Sobredentadura total superior implantosoportada Superior total overdenture on implants

    Directory of Open Access Journals (Sweden)

    Luis Orlando Rodríguez García

    2010-06-01

    Full Text Available Se presenta un caso de un paciente desdentado total superior, rehabilitado en la consulta de implantología de la Clínica "Pedro Ortiz" del municipio Habana del Este en Ciudad de La Habana, Cuba, en el año 2009, mediante prótesis sobre implantes osteointegrados, técnica que se ha incorporado a la práctica estomatológica en Cuba como alternativa al tratamiento convencional en los pacientes desdentados totales. Se siguió un protocolo que comprendió una fase quirúrgica, procedimiento con o sin realización de colgajo y carga precoz o inmediata. Se presenta un paciente masculino de 56 años de edad, que acudió a la consulta multidisciplinaria, preocupado, porque se le habían elaborado tres prótesis en los últimos dos años y ninguna reunía los requisitos de retención que él necesitaba para sentirse seguro y cómodo con las mismas. El resultado final fue la satisfacción total del paciente, con el mejoramiento de la calidad estética y funcional.This is the case of a total maxilla edentulous patient seen in consultation of the "Pedro Ortíz" Clinic Implant of Habana del Este municipality in 2009 and con rehabilitation by prosthesis over osteointegration implants added to stomatology practice in Cuba as an alternative to conventional treatment in patients totally edentulous. We follow a protocol including a surgery or surgical phase, technique without or with flap creation and early or immediate load. This is a male patient aged 56 came to our multidisciplinary consultation worried because he had three prostheses in last two years and any fulfilled the requirements of retention to feel safe and comfortable with prostheses. The final result was the total satisfaction of rehabilitated patient improving its aesthetic and functional quality.

  5. Ensino Superior em Administração e Percepção da Qualidade de Serviços: uma aplicação da escala SERVQUALEducation in Business Administration High and Services Quality Perception: a SERVQUAL scale applicationEducación Superior en Administración y Percepción de la Calidad de los Servicios: una aplicación de la escala SERVQUAL

    Directory of Open Access Journals (Sweden)

    LOURENÇO, Cléria Donizete da Silva

    2011-06-01

    Full Text Available RESUMOO estabelecimento de instrumentos de avaliação institucional, aptos a reconhecer a percepção discente, são de fundamental importância para a adequada prestação de serviços educacionais. Partindo desse princípio, o presente trabalho tem por objetivo verificar, por meio da escala SERVQUAL, a percepção de qualidade dos estudantes de Administração em uma IES particular do Sul de Minas Gerais. Para tanto, foi feita uma pesquisa de natureza descritiva. Os dados foram coletados por meio do questionário SERVQUAL adaptado à avaliação educacional. O universo de pesquisa correspondeu aos alunos do último período do curso de Administração. Estes foram selecionados devido à longevidade de seu contato com o curso e com a instituição. A análise de dados envolveu técnicas descritivas (distribuição de frequências e multivariadas (análise de conglomerados e discriminante. Em seus resultados o trabalho pôde identificar variáveis bem avaliadas e, também, estruturas, processos e condutas que devem ser aperfeiçoadas. O emprego de técnicas estatísticas permitiu a identificação de dois grupos (denominados de “mais exigentes” e “menos exigentes” e os atributos responsáveis pelos dissensos, que servirão de parâmetro para a priorização de processos de melhoria. Toda organização possui clientes com diferentes expectativas de qualidade. As instituições de ensino superior não fogem a essa regra. Assim, somente a identificação de atributos-chave para a percepção da qualidade e sua criteriosa análise é que podem dar início a processos efetivos de melhoria.ABSTRACTThe institutional evaluation instruments establishment, able to recognize the student perception, has its role of fundamental importance for the adequate educational services offer. From this principle, this paper aims to verify, through the SERVQUAL, the perceived quality of the administration students in a private school in the South of Minas

  6. Achieving a sustainable service advantage.

    Science.gov (United States)

    Coyne, K P

    1993-01-01

    Many managers believe that superior service should play little or no role in competitive strategy; they maintain that service innovations are inherently copiable. However, the author states that this view is too narrow. For a company to achieve a lasting service advantage, it must base a new service on a capability gap that competitors cannot or will not copy.

  7. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  8. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  9. FY2017 Defense Appropriations Fact Sheet: Selected Highlights of H.R. 5293 and S. 3000

    Science.gov (United States)

    2016-06-17

    FY2017 Defense Appropriations Fact Sheet: Selected Highlights of H.R. 5293 and S . 3000 Pat Towell Specialist in U.S. Defense Policy and Budget...Appropriations Fact Sheet: Selected Highlights of H.R. 5293 and S . 300 Congressional Research Service Summary This Fact Sheet summarizes selected...Appropriations Committee on May 26, 2016 ( S . 3000). Congressional action on the FY2017 defense appropriations act has been fundamentally shaped by the

  10. Defensive marketing: how a strong incumbent can protect its position.

    Science.gov (United States)

    Roberts, John H

    2005-11-01

    There has been a lot of research on marketing as an offensive tactic-how it can help companies successfully launch new products, enter new markets, or gain share with existing products in their current markets. But for nearly every new product launch, market entrant, or industry upstart grabbing market share, there is an incumbent that must defend its position. And there has been little research on how these defenders can use marketing to preemptively respond to new or anticipated threats. John H. Roberts outlines four basic types of defensive marketing strategies: positive, inertial, parity, and retarding. With the first two, you establish and communicate your points of superiority relative to the new entrant; with the second two, you establish and communicate strategic points of comparability with your rival. Before choosing a strategy, you need to assess the weapons you have available to protect your market position-your brand identity, the products and services that support that identity, and your means of communicating it. Then assess your customers' value to you and their vulnerability to being poached by rivals. The author explains how Australian telecommunications company Telstra, facing deregulation, used a combination of the four strategies (plus the author's customer response model) to fend off market newcomer Optus. Telstra was prepared, for instance, to reach deep into its pockets and engage in a price war. But the customer response model indicated that a parity strategy-in which Telstra would offer lower rates on some routes and at certain times of day, even though its prices, on average, were higher than its rival's-was more likely to prevent consumers from switching. Ultimately, Telstra was able to retain several points of market share it otherwise would have lost. The strategies described here, though specific to Telstra's situation, offer lessons for any company facing new and potentially damaging competition.

  11. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  12. The Research and Application of Security and Defense System in Regional Service Based on Internet%基于Internet的区域服务安全防御系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    肖犁

    2011-01-01

    Internet作为信息分享平台越来越受到人们的关注,并在人们的日常生活中占据了重要的一席之地,但是随之而来的安全问题也开始日益严重。如何在实现数据共享的同时保证隐私和信息的可靠性开始成为IT行业研究的对象。本文主要研究了区域网络的安全防御系统,并通过实例证明了安全防御系统的重要性。%Internet has gained more and more attention as an information shared platform,while has taken a great place in people’s daily life.Moreover,the ensuing security problems have begun to increasingly serious.How to achieve data sharing while ensuring privacy and the reliability of the information has become the studying object in IT occupation.This paper studies the regional network security defense system,and demonstrates the importance of security and defense systems by example.

  13. Directed Energy Missions for Planetary Defense

    CERN Document Server

    Lubin, Philip; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathon; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional prop...

  14. Directed energy missions for planetary defense

    Science.gov (United States)

    Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-09-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.

  15. The Department of Defense Acquisition Workforce: Background, Analysis, and Questions for Congress

    Science.gov (United States)

    2016-07-29

    Congressional Research Service Summary Congress and the executive branch have long been frustrated with waste, mismanagement, and fraud in defense...have long been frustrated with perceived waste, mismanagement, and fraud in defense acquisitions and have spent significant resources attempting to...the limited purpose of receiving training for the performance of acquisition-related functions and duties. (Italics added .) While considered part of

  16. Support Assistants for Fire Emergencies; Student Manual, Part A. Firefighting for Civil Defense Emergencies.

    Science.gov (United States)

    International Association of Fire Chiefs, New York, NY.

    A manual intended to help fire departments and Civil Defense organizations train people to support regular fire forces during a national emergency is presented. It contains 11 chapters: Introduction, Modern Weapons and Radioactive Fallout, Role of Fire Service in Civil Defense, Local Fire Department Organization, Role of Support Assistants in…

  17. Defense and cleaning system for Distributed Denial of Service (DDoS) attacks%大规模拒绝服务(DDoS)攻击的防御与清洗系统

    Institute of Scientific and Technical Information of China (English)

    李振兴; 王萌; 李光程; 陈炫慧; 卢文静

    2016-01-01

    Firstly, the selection, representation, analysis and model solution of DDoS attack feature are established. Then, proceeding from this, the DDoS attack defense method based on the variable threshold constraint of sensitive access parameters is also provided. Finally, the DDoS attack traffic cleaning technique based on the variable probability mark is studied.%首先建立DDoS攻击特征的选择、表示、分析以及模型求解。然后,在此基础上研究基于敏感访问参数可变阈值约束的DDoS攻击防御方法。最后,研究基于可变概率标记的DDoS攻击流量清洗技术。

  18. Paso superior en una ladera

    Directory of Open Access Journals (Sweden)

    Bender, O.

    1965-07-01

    Full Text Available The Redwood highway, through the Californian forest, runs on a viaduct, as it crosses a mountain slope of about 45° inclination. The firm ground is fairly deep, and as an additional constructional difficulty, it was necessary to respect the natural beauty of the countryside. A structure of portal frames were built, forming a number of short spans. These spans were bridged with metal girders, on which a 19 m wide deck was placed. The columns are hollow and have a transversal cross beam, to join each pair. There was difficulty in excavating the foundations for the columns, as it was necessary to dig through the soft top soil, and also prevent this soil from hurting the trunks of the forest trees. Another significant difficulty in the construction of this viaduct was the access to the working site, since there were no suitable platforms from which to operate the appropriate machinery. This made it necessary to do a lot of the work by manual operation. As one of the edges of the deck is very close to the mountain side, a supporting beam was erected on this side. It was made of concrete, on metal piles. The formwork for the deck structure was placed on the concrete stems of the supporting piles.La autopista denominada Redwood (California salva, con un paso superior, la ladera de un bosque cuya pendiente es del 1/1. El terreno firme se halla a bastante profundidad, añadiéndose, a los naturales problemas de la construcción, el imperativo de respetar la belleza agreste del paraje. La solución adoptada consiste en una estructura porticada, con varios tramos de pequeñas luces, salvados con vigas metálicas, sobre los que se coloca la losa del tablero, de 19 m de anchura total. Los soportes están constituidos por pórticos de dos montantes huecos (con bases de hormigón en masa por debajo del suelo, hasta el firme coronados por un cabezal. La perforación de pozos para el hormigonado de los montantes presentaba la dificultad de atravesar el terreno

  19. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    Information Assurance IATO - Interim Authority to Operate ICD - Initial Capability Document IEA - Information Enterprise Architecture IOC - Initial...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then... auditable accurate, timely, authoritative financial data to support the Department of Defense (DoD) goal of standardizing financial management practices

  20. 76 FR 22878 - Defense Transportation Regulation, Part IV

    Science.gov (United States)

    2011-04-25

    ... Command (USTRANSCOM), DoD. ACTION: Notice. SUMMARY: DOD has issued draft business rules for the electronic... electronic payments for NTS at all Military Services and Coast Guard installations is the goal of the Defense Personal Property Program (DP3). The initial rollout of the TPPS and the electronic payment process for...

  1. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  2. Defense Systems Management Review. Volume I, Number 4. Autumn 1977

    Science.gov (United States)

    1977-10-03

    LEAD SERVICE DETERMINATION AND JSOR GENERATION The Department of Defense has become increasingly involved with reducing prolifera- tion of...development of a joint requirement. • Required the generation of a joint serv- ice operational requirement ( JSOR ) within 60 working days. *Air Munitions...prepara- tion and coordination of the JSOR . • Authorized both service-advanced de- velopment efforts to continue through fiscal year 1974. The

  3. Getting Defense Acquisition Right

    Science.gov (United States)

    2017-01-01

    cases, those dollars have gone to higher-priority Service, portfolio or program/activity needs. The result is more capability for the warfighter at...Services be more effective, ensuring that our policies are well defined, and getting feedback on what works and what needs to be improved in our...project by a DoD official, but it would require industry to communicate directly with appropriate DoD personnel and to obtain feedback on the

  4. Foreign Internal Defense

    Science.gov (United States)

    2010-07-12

    basis for today’s FID doctrine. d. In recent times, the United States has provided the same type of NA in El Salvador, Colombia , Kuwait, the...transfers and related services have reached enormous dimensions and involve most of the world’s nations, either as a seller /provider or buyer...measures and consideration of the following: (1) Street or organized crime. (2) Foreign intelligence services. (3) Local populace animosity

  5. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  6. Pseudodisplacements of superior vena cava catheter in the persistent left superior vena cava

    Energy Technology Data Exchange (ETDEWEB)

    Jantsch, H.; Draxler, V.; Muhar, U.; Schlemmer, M.; Waneck, R.

    1983-01-01

    Pseudodisplacement of a left sided superior vena cava catheter in a persistent superior vena cava may be expected in adults in 0,37% and in a group of children with congenital heart disease in 2,5%. Embryology, anatomy and clinical implications is discussed on the basis of our own cases. The vena cava superior sinistra persitents is depending on a sufficient calibre a suitable vessel for a superior cava catheter.

  7. Information Superiority generated through proper application of Geoinformatics

    Science.gov (United States)

    Teichmann, F.

    2012-04-01

    Information Superiority generated through proper application of Geoinformatics Information management and especially geoscience information delivery is a very delicate task. If it is carried out successfully, geoscientific data will provide the main foundation of Information Superiority. However, improper implementation of geodata generation, assimilation, distribution or storage will not only waste valuable resources like manpower or money, but could also give rise to crucial deficiency in knowledge and might lead to potentially extremely harmful disasters or wrong decisions. Comprehensive Approach, Effect Based Operations and Network Enabled Capabilities are the current buzz terms in the security regime. However, they also apply to various interdisciplinary tasks like catastrophe relief missions, civil task operations or even in day to day business operations where geo-science data is used. Based on experience in the application of geoscience data for defence applications the following procedure or tool box for generating geodata should lead to the desired information superiority: 1. Understand and analyse the mission, the task and the environment for which the geodata is needed 2. Carry out a Information Exchange Requirement between the user or customer and the geodata provider 3. Implementation of current interoperability standards and a coherent metadata structure 4. Execute innovative data generation, data provision, data assimilation and data storage 5. Apply a cost-effective and reasonable data life cycle 6. Implement IT security by focusing of the three pillar concepts Integrity, Availability and Confidentiality of the critical data 7. Draft and execute a service level agreement or a memorandum of understanding between the involved parties 8. Execute a Continuous Improvement Cycle These ideas from the IT world should be transferred into the geoscience community and applied in a wide set of scenarios. A standardized approach of how to generate, provide

  8. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  9. Environmental assessment of defense environmental restoration program activities on St. Lawrence Island

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The magnitude and extent of environmental impacts associated with Defense environmental Restoration Program activities at Gambell and Northeast Cape varies. The...

  10. DDoS Attack and Defense: Review of Some Traditional and Current Techniques

    OpenAIRE

    Aamir, Muhammad; ZAIDI, Mustafa Ali

    2014-01-01

    Distributed Denial of Service (DDoS) attacks exhaust victim's bandwidth or services. Traditional architecture of Internet is vulnerable to DDoS attacks and an ongoing cycle of attack & defense is observed. In this paper, different types and techniques of DDoS attacks and their countermeasures are reviewed. The significance of this paper is the coverage of many aspects of countering DDoS attacks including new research on the topic. We survey different papers describing methods of defense again...

  11. Superiority in value and the repugnant conclusion

    DEFF Research Database (Denmark)

    Jensen, Karsten Klint

    2007-01-01

    James Griffin has considered a weak form of superiority in value a possible remedy to the Repugnant Conclusion. In this paper, I demonstrate that, in a context where value is additive, this weaker form collapses into a stronger form of superiority. And in a context where value is non-additive, weak...... superiority does not amount to a radical value difference at all. I then spell out the consequences of these results for different interpretations of Griffin's suggestion regarding population ethics. None of them comes out very successful, but perhaps they nevertheless retain some interest....

  12. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  13. Native American Affairs and the Department of Defense.

    Science.gov (United States)

    1996-01-01

    inside the Department of the Interior, and the National Forest Service inside the Department of Agriculture. The Department of Defense manages 25...Cow Creek Band of Umpqua Indians of Oregon Coyote Valley Band of Porno Indians of California Creek Nation of Oklahoma Crow Tribe of Montana...0TIC QU^lITO XH8M(0™.. t National Defense Research Institute tf «>’ä- »T« -<säi ’.»■^^’■Ä--’■ ■’ DISCLÄIMKI NOTICE THIS DOCUMENT IS BEST QUALITY

  14. Millian superiorities and the repugnant conclusion

    DEFF Research Database (Denmark)

    Jensen, Karsten Klint

    2008-01-01

    James Griffin has considered a form of superiority in value that is weaker than lexical priority as a possible remedy to the Repugnant Conclusion. In this article, I demonstrate that, in a context where value is additive, this weaker form collapses into the stronger form of superiority. And in a ......James Griffin has considered a form of superiority in value that is weaker than lexical priority as a possible remedy to the Repugnant Conclusion. In this article, I demonstrate that, in a context where value is additive, this weaker form collapses into the stronger form of superiority...... of these results for different interpretations of Griffin's suggestion regarding population ethics. None of them comes out very successful, but perhaps they nevertheless retain some interest....

  15. Measuring Financial Gains from Genetically Superior Trees

    Science.gov (United States)

    George Dutrow; Clark Row

    1976-01-01

    Planting genetically superior loblolly pines will probably yield high profits.Forest economists have made computer simulations that predict financial gains expected from a tree improvement program under actual field conditions.

  16. Superior mesenteric artery syndrome causing growth retardation

    Directory of Open Access Journals (Sweden)

    Halil İbrahim Taşcı

    2013-03-01

    Full Text Available Superior mesenteric artery syndrome is a rare and lifethreateningclinical condition caused by the compressionof the third portion of the duodenum between the aortaand the superior mesenteric artery’s proximal part. Thiscompression may lead to chronic intermittent, acute totalor partial obstruction. Sudden weight-loss and the relateddecrease in the fat tissue are considered to be the etiologicalreason of acute stenosis. Weight-loss accompaniedby nausea, vomiting, anorexia, epigastric pain, andbloating are the leading complaints. Barium radiographs,computerized tomography, conventional angiography,tomographic and magnetic resonance angiography areused in the diagnosis. There are medical and surgical approachesto treatment. We hereby present the case ofa patient with superior mesenteric artery syndrome withdelayed diagnosis.Key words: superior mesenteric artery syndrome, nausea-vomiting, anorexia

  17. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  18. Leiomyosarcoma of the superior vena cava.

    Science.gov (United States)

    de Chaumont, Arthus; Pierret, Charles; de Kerangal, Xavier; Le Moulec, Sylvestre; Laborde, François

    2014-08-01

    Leiomyosarcoma of the superior vena cava is a very rare tumor and only a few cases have been reported, with various techniques of vascular reconstruction. We describe a new case of leiomyosarcoma of the superior vena cava in a 61-year-old woman with extension to the brachiocephalic arterial trunk. Resection and vascular reconstruction were performed using, respectively, polytetrafluoroethylene and polyethylene terephtalate vascular grafts.

  19. Superior mesenteric artery compression syndrome - case report

    OpenAIRE

    Paulo Rocha França Neto; Rodrigo de Almeida Paiva; Antônio Lacerda Filho; Fábio Lopes de Queiroz; Teon Noronha

    2011-01-01

    Superior mesenteric artery syndrome is an entity generally caused by the loss of the intervening mesenteric fat pad, resulting in compression of the third portion of the duodenum by the superior mesenteric artery. This article reports the case of a patient with irremovable metastatic adenocarcinoma in the sigmoid colon, that evolved with intense vomiting. Intestinal transit was carried out, which showed important gastric dilation extended until the third portion of the duodenum, compatible wi...

  20. 32 CFR 552.61 - Products and services offered in solicitation.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Products and services offered in solicitation. 552.61 Section 552.61 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY... Military Reservations § 552.61 Products and services offered in solicitation. Products and...

  1. 32 CFR 1630.18 - Class 1-W: Conscientious objector ordered to perform alternative service.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Class 1-W: Conscientious objector ordered to perform alternative service. 1630.18 Section 1630.18 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM CLASSIFICATION RULES § 1630.18 Class 1-W: Conscientious...

  2. 32 CFR 1630.16 - Class 1-O: Conscientious objector to all military service.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Class 1-O: Conscientious objector to all military service. 1630.16 Section 1630.16 National Defense Other Regulations Relating to National Defense SELECTIVE SERVICE SYSTEM CLASSIFICATION RULES § 1630.16 Class 1-O: Conscientious objector to all...

  3. 32 CFR 516.14 - Service of process on DA or Secretary of Army.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Service of process on DA or Secretary of Army. 516.14 Section 516.14 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF... or Secretary of Army. The Chief, Litigation Division, shall accept service of process for...

  4. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  5. Analyzing Department of Defense's use of other transactions as a method for accessing non-traditional technology

    OpenAIRE

    Gilliland, John E.

    2001-01-01

    As U.S. Defense budgets and military research and development spending experienced significant decline between 1988 and 1998, the Defense Technology and Industrial Base essentially merged with the national industrial base. DOD reform occurred more slowly than changes in the private sector fueled by advances in technology. U.S. national security relies upon the ability of the military to maintain technological superiority. To attract advanced technology companies that normally do not participa...

  6. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  7. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  8. Superior oblique surgery: when and how?

    Directory of Open Access Journals (Sweden)

    Taylan Şekeroğlu H

    2013-08-01

    Full Text Available Hande Taylan Şekeroğlu,1 Ali Sefik Sanac,1 Umut Arslan,2 Emin Cumhur Sener11Department of Ophthalmology, 2Department of Biostatistics, Hacettepe University Faculty of Medicine, Ankara, TurkeyBackground: The purpose of this paper is to review different types of superior oblique muscle surgeries, to describe the main areas in clinical practice where superior oblique surgery is required or preferred, and to discuss the preferred types of superior oblique surgery with respect to their clinical outcomes.Methods: A consecutive nonrandomized retrospective series of patients who had undergone superior oblique muscle surgery as a single procedure were enrolled in the study. The diagnosis, clinical features, preoperative and postoperative vertical deviations in primary position, type of surgery, complications, and clinical outcomes were reviewed. The primary outcome measures were the type of strabismus and the type of superior oblique muscle surgery. The secondary outcome measure was the results of the surgeries.Results: The review identified 40 (20 male, 20 female patients with a median age of 6 (2–45 years. Nineteen patients (47.5% had Brown syndrome, eleven (27.5% had fourth nerve palsy, and ten (25.0% had horizontal deviations with A pattern. The most commonly performed surgery was superior oblique tenotomy in 29 (72.5% patients followed by superior oblique tuck in eleven (27.5% patients. The amount of vertical deviation in the fourth nerve palsy and Brown syndrome groups (P = 0.01 for both and the amount of A pattern in the A pattern group were significantly reduced postoperatively (P = 0.02.Conclusion: Surgery for the superior oblique muscle requires experience and appropriate preoperative evaluation in view of its challenging nature. The main indications are Brown syndrome, fourth nerve palsy, and A pattern deviations. Superior oblique surgery may be effective in terms of pattern collapse and correction of vertical deviations in primary

  9. Defense AT and L.

    Science.gov (United States)

    2014-06-01

    Agency (DLA). DLA manages an inventory of more than 5 million line items with annual sales in excess of $44 billion. The inventory is warehoused...to “Just in Time” supply chain management. But are we ready today to stop buying spares for our warehouse shelves and to sell off all of our...the use of a scalable data structure, XML tagging and indexing, Web services and federated output scripts . A Web-based process not only would

  10. Lean Six Sigma Project - Defense Logistics Agency/Honeywell Long-Term Contract Model Using One-Pass Pricing for Sole-Source Spare Parts

    Science.gov (United States)

    2011-02-18

    REPORT DATE 18 FEB 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Lean Six Sigma Project - Defense Logistics...SECRETARY OF DEFENSE FOR ACQUISITION, TECHNOLOGY, AND LOGISTICS DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Lean Six Sigma Project - Defense Logistics...service report for your information and use. The report is being published in final form. The Lean Six Sigma Project was a collaborative effort with

  11. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  12. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  13. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  14. Whisker-related afferents in superior colliculus.

    Science.gov (United States)

    Castro-Alamancos, Manuel A; Favero, Morgana

    2016-05-01

    Rodents use their whiskers to explore the environment, and the superior colliculus is part of the neural circuits that process this sensorimotor information. Cells in the intermediate layers of the superior colliculus integrate trigeminotectal afferents from trigeminal complex and corticotectal afferents from barrel cortex. Using histological methods in mice, we found that trigeminotectal and corticotectal synapses overlap somewhat as they innervate the lower and upper portions of the intermediate granular layer, respectively. Using electrophysiological recordings and optogenetics in anesthetized mice in vivo, we showed that, similar to rats, whisker deflections produce two successive responses that are driven by trigeminotectal and corticotectal afferents. We then employed in vivo and slice experiments to characterize the response properties of these afferents. In vivo, corticotectal responses triggered by electrical stimulation of the barrel cortex evoke activity in the superior colliculus that increases with stimulus intensity and depresses with increasing frequency. In slices from adult mice, optogenetic activation of channelrhodopsin-expressing trigeminotectal and corticotectal fibers revealed that cells in the intermediate layers receive more efficacious trigeminotectal, than corticotectal, synaptic inputs. Moreover, the efficacy of trigeminotectal inputs depresses more strongly with increasing frequency than that of corticotectal inputs. The intermediate layers of superior colliculus appear to be tuned to process strong but infrequent trigeminal inputs and weak but more persistent cortical inputs, which explains features of sensory responsiveness, such as the robust rapid sensory adaptation of whisker responses in the superior colliculus. Copyright © 2016 the American Physiological Society.

  15. Quadrennial Defense Review Report

    Science.gov (United States)

    2006-02-06

    Range during a fi repower demonstration. In its fi fth decade of service, B-52s continue to provide long-range strike capability to the joint...to cut costs by $268 million in A Talon 3B tracked robot waits for its next command after an improvised explosive device was detonated in Baghdad...Iraq. Th e increasing use of robotics has improved U.S. force protection signifi cantly in Operation Iraqi Freedom. Ph ot o by T ec hn ic al S

  16. Superior-subordinate relations as organizational processes

    DEFF Research Database (Denmark)

    Asmuss, Birte; Aggerholm, Helle Kryger; Oshima, Sae

    Since the emergence of the practice turn in social sciences (Golsorkhi et al. 2010), studies have shown a number of institutionally relevant aspects as achievements across time and by means of various resources (human and non-human) (Taylor & van Every 2000, Cooren et al. 2006). Such a process view...... on organizational practices relates closely to an increased focus on communication as being constitutive of the organization in general and the superior-subordinate relationship in specific. The current study aims to contribute to this line of research by investigating micro-practices involved in establishing...... superior-subordinate relations in a specific institutionalized setting: performance appraisal interviews (PAIs). While one main task of PAIs is to manage and integrate organizational and employee performance (Fletcher, 2001:473), PAIs are also organizational practices where superior-subordinate relations...

  17. Lake Superior Aquatic Invasive Species Complete Prevention Plan

    Science.gov (United States)

    The Lake Superior Aquatic Invasive Species Complete Prevention Plan is an expression of the best professional judgment of the members of the Lake Superior Task Force as to what is necessary to protect Lake Superior from new aquatic invasive species.

  18. Defense policymaking: the post-cold war roles and missions debate.

    OpenAIRE

    Hall, Michael A.; Stockton, Paul

    1993-01-01

    Approved for public release; distribution is unlimited This thesis examines the ability of the President, Congress and Armed Services to formulate and implement defense policy that eliminates duplication and inefficiencies within service roles and missions. The hypothesis examined is that the Joint Chiefs of Staff and the four military Services will be unable to formulate any significant changes in their own roles and missions because of a dichotomy between what the Services...

  19. Endovascular treatment of superior vena cava syndrome

    DEFF Research Database (Denmark)

    Duvnjak, Stevo; Andersen, Poul Erik

    2011-01-01

    Abstract AIM: The aim of this study was to report our experience with palliative stent treatment of superior vena cava syndrome. METHODS: Between January 2008 and December 2009, 30 patients (mean age 60.7 years) were treated with stents because of stenosed superior vena cava. All patients presented...... there was an immediate clinical improvement with considerable reduction in the edema of upper extremities and head. There was, however, continous dyspnea in five patients (17%) and two patients (7%) had persistent visible collateral venous circulations on the upper chest. There were no stent associated complications...

  20. Tri-Service Center for Oral Health Studies (TSCOHS)

    Data.gov (United States)

    Federal Laboratory Consortium — The Tri-Service Center for Oral Health Studies (TSCOHS), a service of the Postgraduate Dental College, is chartered by the Department of Defense TRICARE Management...

  1. Magnetic resonance imaging evaluation of meniscoid superior labrum: normal variant or superior labral tear*

    Science.gov (United States)

    Simão, Marcelo Novelino; Vinson, Emily N.; Spritzer, Charles E.

    2016-01-01

    Objective The objective of this study was to determine the incidence of a "meniscoid" superior labrum. Materials and Methods This was a retrospective analysis of 582 magnetic resonance imaging examinations of shoulders. Of those 582 examinations, 110 were excluded, for a variety of reasons, and the final analysis therefore included 472 cases. Consensus readings were performed by three musculoskeletal radiologists using specific criteria to diagnose meniscoid labra. Results A meniscoid superior labrum was identified in 48 (10.2%) of the 472 cases evaluated. Arthroscopic proof was available in 21 cases (43.8%). In 10 (47.6%) of those 21 cases, the operative report did not include the mention a superior labral tear, thus suggesting the presence of a meniscoid labrum. In only one of those cases were there specific comments about a mobile superior labrum (i.e., meniscoid labrum). In the remaining 11 (52.4%), surgical correlation demonstrated superior labral tears. Conclusion A meniscoid superior labrum is not an infrequent finding. Depending upon assumptions and the requirement of surgical proof, the prevalence of a meniscoid superior labrum in this study was between 2.1% (surgically proven) and 4.8% (projected). However, superior labral tears are just as common and are often confused with meniscoid labra. PMID:27777474

  2. 46 CFR 350.3 - Other original recognition of service.

    Science.gov (United States)

    2010-10-01

    ... Conflict Service. Korean Service bar and medal for merchant seamen who served in waters adjacent to Korea... added; (6) Merchant Marine Defense Bar and Medal, awarded to merchant seamen who served on merchant... during World War II; (11) Philippine Defense Ribbon, awarded to merchant seamen who served as members...

  3. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  4. Organizational structure and operation of defense/aerospace information centers in the United States of America

    Science.gov (United States)

    Sauter, H. E.; Lushina, L. N.

    1983-01-01

    U.S. Government aerospace and defense information centers are addressed. DTIC and NASA are described in terms of their history, operational authority, information services provided, user community, sources of information collected, efforts under way to improve services, and external agreements regarding the exchange of documents and/or data bases. Contents show how DTIC and NASA provide aerospace/defense information services in support of U.S. research and development efforts. In a general introduction, the importance of scientific and technical information and the need for information centers to acquire, handle, and disseminate it are stressed.

  5. Department of Defenses 2015 Retirement Plan Cost Analysis

    Science.gov (United States)

    2016-06-01

    incentive and recruitment bonuses. The base continuation pay will be equal to 12 2.5 times the SMs monthly basic pay (MCRMC, 2015). FERS employees do not...Department of Defense FERS Federal Employees Retirement System FY Fiscal Year FY16$ Fiscal Year 2016 Constant Dollars MCRMC Military...current retirement system rewards service members (SMs) who pursue a long term military career, it ignores the majority of SMs who fall short of the 20

  6. Department of Defense, General/Flag Officer, Worldwide Roster

    Science.gov (United States)

    1998-06-01

    USN 9707 970627 3 GENERAL/FLAG OFFICER WORLDWIDE ROSTER DATE DATE OF DUTY TITLE NAME RANK SERVICE ASSIGNED RANK DEP DIR J-8 CARTWRIGHT JAMES E BG* USMC...SIGNAL BRIGADE - SPARTANBURG,SC COMMANDER (RC) SIMPSON DARWIN H BG ARNG 9603 970303 263RD AIR DEFENSE ARTILLERY BRIGADE - ANDERSON,SC COMMANDER (RC...N ................. 27 CARSKADON BRUCE M ................. 28 CARTWRIGHT JAMES E ................ 04 CASCIANO JOHN P ................... 27 CASE

  7. Value Proposition of Department of Defense Domestic Technology Transfer

    Science.gov (United States)

    2010-01-15

    Systems Center, Pacific Aplus Mobile, Inc., Oregon City, OR CRADA On-Hold Demonstration of Low-Cost Expendable Bottom Crawling Vehicles Naval...Circuits Defense Microelectronics Activity Packet Digital Corporation, Fargo, ND CRADA On-Hold Preventing Severe Infections in Infants and Children...Health Sciences Bard Access Systems, Lake City, UT PLA Preventing Severe Infections in Infants and Children Uniformed Services University of the

  8. Defense Contracting: DOD’s Use of Competitive Procedures

    Science.gov (United States)

    2015-05-01

    brand name commercial item for authorized resale. FAR § 6.302-5, • “ International agreement” is used when competition is precluded by the terms of...Ranking Member Committee on Armed Services House of Representatives Defense Contracting: DOD’s Use of Competitive Procedures Competition is...regulations generally require that contracts be awarded competitively , but permit agencies to award contracts noncompetitively in certain

  9. Hollow Force, Hollow Metaphor: Assessing The Current Defense Drawdown

    Science.gov (United States)

    2016-04-04

    amassed historic levels of debt , partly due to financing two costly and lengthy wars in Iraq and Afghanistan, President Barrack Obama signed into law... debt to more acceptable levels. How the Department of Defense (DoD), specifically, each Service, would absorb these cuts triggered intense debate...production capacity and flexibility the nation needs during war. The Army’s leaders are keen to point out that this is not just protecting a parochial

  10. Defense Satellite Communications: DOD Needs Additional Information to Improve Procurements

    Science.gov (United States)

    2015-07-01

    SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 31 19a. NAME OF RESPONSIBLE PERSON a. REPORT...information available, DOD spent over $1 billion leasing commercial SATCOM. In prior work, GAO found that some major DOD users of commercial...Committee on Armed Services United States Senate The Department of Defense (DOD) leases commercial satellite communications (SATCOM) to support a variety

  11. Review and Implementation Status of Prior Defense Business Board Recommendations

    Science.gov (United States)

    2007-04-01

    Executive Service (SES) Corps • Performance-Based Management • Leadership Orientation Course • SES and Flag Officer Diversity • Outplacement ...localized initiatives to support BRAC outplacement /re-alignment for personnel – USD (P&R) will re-look at DBB recommendations • Recommendations – None for...now OUTPLACEMENT ASSISTANCE (in connection with Base Realignment and Closure (BRAC)) December 2006 Defense Business Board Quarterly Meeting 18

  12. Guide Our Feet: Teacher Education and Servant-Leadership in a Children's Defense Fund Freedom School

    Science.gov (United States)

    Davis, Joyce Hubbard

    2010-01-01

    This qualitative narrative study presents the Children's Defense Fund Freedom School as an exemplar of an educational program with a model of spiritual education, which supports the preparation of pre-service teachers by nurturing an ethos of service. The purpose of this study is to examine the potential for a summer experience of…

  13. 32 CFR Appendix C to Part 77 - DD Form 2581-1, Public and Community Service Organization Validation

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2581-1, Public and Community Service Organization Validation C Appendix C to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY..., App. C Appendix C to Part 77—DD Form 2581-1, Public and Community Service Organization...

  14. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  15. Defense display market assessment

    Science.gov (United States)

    Desjardins, Daniel D.; Hopper, Darrel G.

    1998-09-01

    This paper addresses the number, function and size of principal military displays and establishes a basis to determine the opportunities for technology insertion in the immediate future and into the next millennium. Principal military displays are defined as those occupying appreciable crewstation real-estate and/or those without which the platform could not carry out its intended mission. DoD 'office' applications are excluded from this study. The military displays market is specified by such parameters as active area and footprint size, and other characteristics such as luminance, gray scale, resolution, angle, color, video capability, and night vision imaging system (NVIS) compatibility. Funded, future acquisitions, planned and predicted crewstation modification kits, and form-fit upgrades are taken into account. This paper provides an overview of the DoD niche market, allowing both government and industry a necessary reference by which to meet DoD requirements for military displays in a timely and cost-effective manner. The aggregate DoD market for direct-view and large-area military displays is presently estimated to be in excess of 242,000. Miniature displays are those which must be magnified to be viewed, involve a significantly different manufacturing paradigm and are used in helmet mounted displays and thermal weapon sight applications. Some 114,000 miniature displays are presently included within Service weapon system acquisition plans. For vendor production planning purposes it is noted that foreign military sales could substantially increase these quantities. The vanishing vendor syndrome (VVS) for older display technologies continues to be a growing, pervasive problem throughout DoD, which consequently must leverage the more modern display technologies being developed for civil- commercial markets.

  16. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  17. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  18. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  19. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  20. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  1. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  2. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  3. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  4. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  5. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  6. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  7. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  8. Defensive chemicals of tawny crazy ants, Nylanderia fulva and their toxicity to red imported fire ants (Hymenoptera: Formicidae)

    Science.gov (United States)

    Nylanderia fulva (Mayr) has been reported as being able to displace Solenopsis invicta Buren, one of the most aggressive invasive ants in the world. Like S. invicta, N. fulva use chemical secretions in their defense/offense, which may contribute to their observed superior competition ability. In t...

  9. DOD Purchase of Renewable Energy Credits Under the National Defense Authorization Act of 2012

    Science.gov (United States)

    2012-11-27

    The Energy Policy Act (EPAct) of 2005 established renewable energy goals for federal government agencies. The National Defense Authorization Act for...Fiscal Year 2012 directs the Secretary of Defense to establish a policy to maximize savings for the bulk purchase of replacement renewable energy certificates...in connection with the development of facility energy projects using renewable energy sources. This requires that each service purchase

  10. Department of Defense Research, Development, Test, and Evaluation (RDT and E): Appropriations Structure

    Science.gov (United States)

    2016-12-13

    Department of Defense Research , Development , Test, and Evaluation (RDT&E): Appropriations Structure John F. Sargent Jr. Specialist in...Congressional Research Service Summary The Department of Defense (DOD) conducts research , development , testing, and evaluation (RDT&E) in support...is for applied research ; 6.3 is for advanced technology development ; 6.4 is for advanced component development and prototypes; 6.5 is for systems

  11. Program Manager: Journal of the Defense Systems Management College. Volume 19. Number 3

    Science.gov (United States)

    1990-06-01

    years. Fayol , Henri . General and Industrial Seatl, Washin"tn. He isa 1989groduate The current effort-the Defense Management. Toronto, Canada: Sir of...Institute, noted and Acquisition Costs," (Abellera); General Charles Henry , USA; and there are many congressional "Exchange Rates and Product Cost," Major...has been a Defense Systems Management College tions. Each Service has professional deterioration since 1986. The crucial were Mr. Henry Alberts, Dr

  12. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  13. Superior-subordinate relations as organizational processes

    DEFF Research Database (Denmark)

    Asmuss, Birte; Aggerholm, Helle Kryger; Oshima, Sae

    Since the emergence of the practice turn in social sciences (Golsorkhi et al. 2010), studies have shown a number of institutionally relevant aspects as achievements across time and by means of various resources (human and non-human) (Taylor & van Every 2000, Cooren et al. 2006). Such a process view...... superior-subordinate relations in a specific institutionalized setting: performance appraisal interviews (PAIs). While one main task of PAIs is to manage and integrate organizational and employee performance (Fletcher, 2001:473), PAIs are also organizational practices where superior-subordinate relations...... are shaped, (re)confirmed and re-evaluated. This paper pursues the better understanding of the latter aspect by looking at one substantial and recurrent activity in PAIs: the evaluation of employee performance. One resource for doing the evaluation work is making assessments (e.g. Goodwin & Goodwin, 1987...

  14. Exploring the word superiority effect using TVA

    DEFF Research Database (Denmark)

    Starrfelt, Randi

    Words are made of letters, and yet sometimes it is easier to identify a word than a single letter. This word superiority effect (WSE) has been observed when written stimuli are presented very briefly or degraded by visual noise. It is unclear, however, if this is due to a lower threshold...... for perception of words, or a higher speed of processing for words than letters. We have investigated the WSE using methods based on a Theory of Visual Attention. In an experiment using single stimuli (words or letters) presented centrally, we show that the classical WSE is specifically reflected in perceptual...... processing speed: words are simply processed faster than single letters. It is also clear from this experiment, that the word superiority effect can be observed at a large range of exposure durations, from the perceptual threshold to ceiling performance. Intriguingly, when multiple stimuli are presented...

  15. Resolution of superior oblique myokymia with memantine.

    Science.gov (United States)

    Jain, Saurabh; Farooq, Shegufta J; Gottlob, Irene

    2008-02-01

    We describe a novel treatment of superior oblique myokymia. A 40-year-old woman was treated with gabapentin for this disorder with partial success and reported significant side effects including loss of libido and weight gain. After a drug holiday, memantine therapy was initiated resulting in a substantial improvement in her symptoms with far fewer side effects and stability on long-term maintenance therapy.

  16. Locked Superior Dislocation of the Acromioclavicular Joint

    Directory of Open Access Journals (Sweden)

    Salma Eltoum Elamin

    2013-01-01

    Full Text Available Acromioclavicular (AC joint injuries account for approximately 3–5% of shoulder girdle injuries (Rockwood et al., 1998. Depending on severity of injury and direction of displacement these are classified using Rockwood classification system for AC joint dislocation. We present an unusual case presenting with locked superior dislocation of the AC joint highlighting the presentation and subsequent successful surgical management of such case. To our knowledge this has not been reported previously in literature.

  17. Reperfusion hemorrhage following superior mesenteric artery stenting.

    LENUS (Irish Health Repository)

    Moore, Michael

    2012-02-03

    Percutaneous transluminal angioplasty and stent placement is now an established treatment option for chronic mesenteric ischemia and is associated with low mortality and morbidity rates. We present a case of reperfusion hemorrhage complicating endovascular repair of superior mesenteric artery stenosis. Although a recognized complication following repair of carotid stenosis, hemorrhage has not previously been reported following mesenteric endovascular reperfusion. We describe both spontaneous cessation of bleeding and treatment with coil embolization.

  18. [Mitral surgery by superior biatrial septotomy].

    Science.gov (United States)

    Saade, A; Delepine, G; Lemaitre, C; Baehrel, B

    1995-01-01

    The superior biatrial septotomy approach consists of two semicircular right atrial and septal incisions joined at the superior end of the interatrial septum and extended across the dome of the left atrium, allowing exposure of the mitral valve by reflecting the ventricular side using stay sutures. From 1991 to 1993, 81 patients underwent mitral valve surgery by this technic. Mitral valve operation was combined with other cardiac procedures in 30 patients (37%) and was performed as a second operation in 21 patients (25.9%). Duration of cardiopulmonary bypass and aortic occlusion was not significantly different from that of patients operated via a conventional left atrial approach. The five hospital deaths (6.2%) were not related to this operative approach. Only 2 patients (3.3%) with preoperative in sinus rythm were discharged in atrial fibrillation after operation. In one patient (1.6%), atrioventricular block appeared at late follow-up. There were no cases of bleeding, atrioventricular nodal dysfunction or intra-atrial shunting related to the approach. This approach provides excellent exposure of the mitral valve even in unfavorable situations such as a small left atrium, dense adhesions from previous procedures or a previously implanted aortic prosthesis, without damage to various cardiac structures due to excessive traction. No retractor or vena cava repair are required. These data support a wide application of the superior biatrial septotomy approach in mitral valve surgery.

  19. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  20. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  1. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  2. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  3. Superior mesenteric artery compression syndrome - case report

    Directory of Open Access Journals (Sweden)

    Paulo Rocha França Neto

    2011-12-01

    Full Text Available Superior mesenteric artery syndrome is an entity generally caused by the loss of the intervening mesenteric fat pad, resulting in compression of the third portion of the duodenum by the superior mesenteric artery. This article reports the case of a patient with irremovable metastatic adenocarcinoma in the sigmoid colon, that evolved with intense vomiting. Intestinal transit was carried out, which showed important gastric dilation extended until the third portion of the duodenum, compatible with superior mesenteric artery syndrome. Considering the patient's nutritional condition, the medical team opted for the conservative treatment. Four months after the surgery and conservative measures, the patient did not present vomiting after eating, maintaining previous weight. Superior mesenteric artery syndrome is uncommon and can have unspecific symptoms. Thus, high suspicion is required for the appropriate clinical adjustment. A barium examination is required to make the diagnosis. The treatment can initially require gastric decompression and hydration, besides reversal of weight loss through adequate nutrition. Surgery should be adopted only in case of clinical treatment failure.A síndrome da artéria mesentérica superior é uma entidade clínica causada geralmente pela perda do tecido adiposo mesentérico, resultando na compressão da terceira porção do duodeno pela artéria mesentérica superior. Esse artigo relata o caso clínico de uma paciente portadora de adenocarcinoma de cólon sigmoide metastático irressecável, que evoluiu com vômitos incoercíveis. Realizou-se, então, trânsito intestinal que evidenciou dilatação gástrica importante, que se prolongava até a terceira porção duodenal, quadro radiológico compatível com pinçamento da artéria mesentérica superior. Diante da condição nutricional da paciente, foi optado por iniciar medidas conservadoras (porções alimentares pequenas e mais frequentes, além de dec

  4. Impact of the Defense Critical Technologies Plan on Weapon Systems Test and Evaluation

    Science.gov (United States)

    1990-12-01

    middle of the 1980’s several factors led to the realization that DoD’s T&E capabilities were approaching a crisis situation. These factors included...techologies most critica to saing the long-term quai.- tative superiority of United States wampon syvtme. The number of such technologie identified in any...United States, The Defense Technology Base, Introduction and Overview, U.S. Government Printing Office, March 1988. Pastine, John, D. Dr., "A Crisis

  5. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    evidenced in our other case studies. However, with the rapid production and deployment of the vehicles in 2007–2008, the operators began to experience...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...The program sponsors of the Patriot also desired to take advantage of technological innovation and information superiority to enhance overall

  6. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  7. Cross-sectional survey on defensive practices and defensive behaviours among Israeli psychiatrists.

    Science.gov (United States)

    Reuveni, I; Pelov, I; Reuveni, H; Bonne, O; Canetti, L

    2017-03-20

    Psychiatry is a low-risk specialisation; however, there is a steady increase in malpractice claims against psychiatrists. Defensive psychiatry (DP) refers to any action undertaken by a psychiatrist to avoid malpractice liability that is not for the sole benefit of the patient's mental health and well-being. The objectives of this study were to assess the scope of DP practised by psychiatrists and to understand whether awareness of DP correlated with defensive behaviours. A questionnaire was administered to 213 Israeli psychiatry residents and certified psychiatrists during May and June 2015 regarding demographic data and experience with malpractice claims, medicolegal literature and litigation. Four clinical scenarios represented defensive behaviours and reactions (feelings and actions) to malpractice claims. Forty-four (20.6%) certified psychiatrists and four (1.9%) residents were directly involved in malpractice claims, while 132 (62.1%) participants admitted to practising DP. Residents acknowledged the practice of DP more than did senior psychiatrists (p=0.038).Awareness of DP correlated with unnecessary hospitalisation of suicidal patients, increased unnecessary follow-up visits and prescribing smaller drug dosages than required for pregnant women and elderly patients. This study provides evidence that DP is well established in the routine clinical daily practice of psychiatrists. Further studies are needed to reveal whether DP effectively protects psychiatrists from malpractice suits or, rather, if it impedes providing quality psychiatric care and represents an economic burden that leads to more harm for the patient. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  8. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  9. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  10. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  11. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  12. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  13. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  14. Exploring the word superiority effect using TVA

    DEFF Research Database (Denmark)

    Starrfelt, Randi

    Words are made of letters, and yet sometimes it is easier to identify a word than a single letter. This word superiority effect (WSE) has been observed when written stimuli are presented very briefly or degraded by visual noise. It is unclear, however, if this is due to a lower threshold for perc...... simultaneously we find a different pattern: In a whole report experiment with six stimuli (letters or words), letters are perceived more easily than words, and this is reflected both in perceptual processing speed and short term memory capacity....

  15. de educación media superior

    Directory of Open Access Journals (Sweden)

    Enrique Cerón Ferrer

    2007-01-01

    Full Text Available El trabajo presenta los resultados obtenidos en relación al conocimiento y manejo que sobre matemáticas tienen los estudiantes de educación media superior, de los Centros de Estudios Tecnológicos y de Servicios del Distrito Federal, de diferentes carreras que se imparten en estos centros escolares, durante el año 2005. El instrumento de análisis es un cuestionario que contestaron los alumnos, la metodología utilizada es de tipo longitudinal y comparativa.

  16. 77 FR 63805 - Federal Acquisition Regulation; Information Collection; Service Contracting

    Science.gov (United States)

    2012-10-17

    ... Regulation; Information Collection; Service Contracting AGENCY: Department of Defense (DOD), General Services.... Select the link ``Submit a Comment'' that corresponds with ``Information Collection 9000-0152, Service..., company name (if any), and ``Information Collection 9000-0152, Service Contracting'' on your...

  17. 32 CFR 728.54 - U.S. Public Health Service (USPHS), other than members of the uniformed services.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false U.S. Public Health Service (USPHS), other than... FACILITIES Beneficiaries of Other Federal Agencies § 728.54 U.S. Public Health Service (USPHS), other than... 43 (Contract Health Service Purchase Order for Hospital Services Rendered) or HRSA form 64...

  18. SUPERIOR MESENTERIC ARTERY SYNDROME: CASE REPORT

    African Journals Online (AJOL)

    2003-06-06

    Jun 6, 2003 ... uneventful post operative recovery and was discharged on the third day ... complaints in whom endoscopic and conventional X ray findings are ... The Online version is distributed by the non-profit service; Bioline International,.

  19. Influence of employees' service-oriented behavior on service quality

    Directory of Open Access Journals (Sweden)

    Vučković Jelisaveta

    2015-01-01

    Full Text Available In order to constantly improve the quality of service program, organizations in tourism industry, have to pay special attention to managing employees' behavior, especially those in the first line of service provision and their direct superiors. Encouraging the employees towards service-oriented behavior is greatly determined by the adequate and consistent implementation of human resources management instruments. The subject of this research is an empirical examination of relations between employees' behavior in the service providing process and service quality. This research was conducted during 2012, in a five-star hotel 'Izvor', situated in Arandjelovac.

  20. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  1. On effectiveness of network sensor-based defense framework

    Science.gov (United States)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  2. Pancreaticoduodenectomy with early superior mesenteric artery dissection

    Institute of Scientific and Technical Information of China (English)

    Yu-Fei Xu; Zuo-Jin Liu; Jian-Ping Gong

    2010-01-01

    BACKGROUND: Pancreatic adenocarcinoma remains the fourth leading cause of cancer-related death and is one of the most aggressive human tumors. At present, surgical resection is the only potentially curative treatment. Early neck division is inadequate when invasion of the superior mesenteric artery (SMA) is suspected or in cases of replaced or accessory right hepatic artery. Malignant periampullary tumors often invade retroperitoneal peripancreatic tissues and a positive resection margin is associated with a poor long-term survival. DATA SOURCES: English-language medical databases, PubMed, ELSEVIER and SPRINGERLINK, were searched for articles on"posterior approach pancreaticoduodenectomy","superior mesenteric artery ifrst approach", "retroperitoneal tissue","hanging maneuver", and related topics. RESULTS:The modiifcation allowed the surgeon to early identify the nonresectability of a replaced right hepatic artery if present, enabling complete dissection of the right side of the SMA and portal vein as well as complete excision of the retroportal pancreatic lamina. CONCLUSION: Pancreaticoduodenectomy with early retro-pancreatic dissection is a useful and safe technical variant, which is indicated for the improvement of the safety and curative effect of the procedure.

  3. Radiation treatment of superior sulcus lung carcinoma

    Energy Technology Data Exchange (ETDEWEB)

    Millar, J.; Ball, D.; Worotniuk, V.; Smith, J.; Crennan, E.; Bishop, M. [Peter MacCallum Cancer Inst., East Melbourne, VIC (Australia)

    1996-02-01

    The survival of patients with superior sulcus lung carcinoma and the effects of treatment were reviewed. From a prospective database of 4123 consecutive new patients with lung carcinoma, 131 (3.2%) cases of superior sulcus lung carcinoma were identified. Seventy-four patients were planned to receive radiation with palliative intent, 53 radical radiotherapy and one was observed only. The remaining three patients, with small-cell carcinoma, were treated with chemotherapy with or without radiotherapy. Of the 53 radically treated patients, nine were treated with pre-operative radiation prior to intended radical resection. Analysis was carried out on the effect on survival of performance status, nodal involvement, weight loss, vertebral body or rib involvement, treatment intent and radical combined modality treatment compared with radical radiation alone. The estimated median survival for the whole group was 7.6 months; for those treated radically it was 18.3 months, while for the palliatively treated patients it was 3.7 months. Radically treated patients with no initial nodal involvement had an estimated median survival of 22 months, while radically treated patients with nodal involvement had an estimated median survival of 8.4 months (P = 0.003). There were no statistically significant differences in survival between radically treated patients grouped according to initial weight loss, performance status, or vertebral body and rib involvement. Patients treated with pre-operative radiation did not survive significantly longer than patients treated with radiation alone, although the numbers are small. 33 refs., 2 tabs., 4 figs.

  4. Studies on zooplankton of Lago Paione Superiore

    Directory of Open Access Journals (Sweden)

    Patrizia COMOLI

    1999-08-01

    Full Text Available We report here the results of a three year study on the zooplankton of Lago Paione Superiore, an acid sensitive lake above the tree line in the Italian Alps. The research was carried out within MOLAR, an EC-founded Project on “Measuring and Modeling the dynamic response of remote mountain lakes ecosystems to environmental change”. This study comes after a series of investigations on the effects of acidification, in which we documented the changes occurred with decreasing water pHs, by comparing the recent situation with that in the literature of the 40s, and reconstructed the beginning of anthropogenic disturbance through an analysis of the past cladocera assemblages archived in the lake sediments. A characteristic pattern in seasonal periodicity is a transition from a community dominated by small zooplankton (August to a community where the large particle-feeder Daphnia longispina dominates. This is a typical pattern observed in fishless, copepod-cladocera lakes. Regardless from which food is able to exploit, Daphnia population of Lago Paione Superiore is composed by well-fed organisms, visually rich in lipids, able to produce more than one generation/ year of parthenogenetic females at density levels which are rather high in an oligotrophic high mountain lake.

  5. 78 FR 4881 - Excepted Service

    Science.gov (United States)

    2013-01-23

    ... Digital Media. DEPARTMENT OF HEALTH AND HUMAN Office of the Communications DH130007 11/9/2012 SERVICES..., Confidential SE130001 11/6/2012 COMMISSION. Strategy and Assistant. Financial Innovation. DEPARTMENT OF STATE... Secretary of Defense (Public Affairs). SMALL BUSINESS ADMINISTRATION. Office of Capital Special Advisor...

  6. 76 FR 78316 - Excepted Service

    Science.gov (United States)

    2011-12-16

    ... Secretary of Defense (Global Strategic Affairs). Strategic Affairs). DEPARTMENT OF EDUCATION Office of... MANAGEMENT Excepted Service AGENCY: U.S. Office of Personnel Management (OPM). ACTION: Notice. SUMMARY: This... Organization name Position title Authorization number Effective date DEPARTMENT OF AGRICULTURE Risk Management...

  7. Location and Routing of the Defense Courier Service Aerial Network

    Science.gov (United States)

    1991-03-01

    The Vehicle Routing Problem ................ 8 Vehicle Routing Problem Modifications ...... .0 Multiple Depot Problems...several specific formulations are applicable to the DCS aerial network. Those addressed in this review include: 1) the Vehicle Routing Problem (VRP); 2...methodologies show great promise for adaptation to the DCS network. The Vehicle Routing Problem The Travelling Salesman Problem seeks the shortest route which

  8. 76 FR 20590 - International Traffic in Arms Regulations: Defense Services

    Science.gov (United States)

    2011-04-13

    ... public domain data,'' including proprietary data or ``technology'' ``subject to the Export Administration... radio inside of the preexisting opening is the only assistance that is necessary). ``Integration'' means... instruction of foreign persons in the United States or abroad by any means including classroom...

  9. Defense Logistics Agency Disposition Services Afghanistan Disposal Process Needed Improvement

    Science.gov (United States)

    2013-11-08

    quantity, demilitarization ( DEMIL ) code, and national stock number. The inspection of property decides the course for further processing. The...generating activity is expected to obtain the correct DEMIL code from the Inventory Control Point and enter that code on the Disposal Turn-In Document1... DEMIL code, supply condition code, and unit price. Figure 1. Property Staged at DLA DS Bagram Introduction DODIG-2014-007 │ 3 Disposition Guidance

  10. Planning for a Department of Defense Mail Service Pharmacy System

    Science.gov (United States)

    1991-12-01

    USERS UNCLASSIFIED 22a NAME OF RESPONSrBE INDIVIDUAL 22b TELEPHONE (include Area Code) 22( OFFICE SYMBOL Dr. Keebom Kant (408) 646-3106 AS/Kk DD Form...number of prescriptions to be filled by a MSP system shows an Increase of 6.8% over FY 1991 demand. 30 The de-and fo: ind- vidu phaarm a- etica ! Z...c

  11. Cochlear implant outcomes in patients with superior canal dehiscence

    NARCIS (Netherlands)

    Puram, Sidharth V.; Roberts, Daniel S.; Niesten, Marlien E F; Dilger, Amanda E.; Lee, Daniel J.

    2015-01-01

    Objective: To determine whether adult cochlear implant (CI) users with superior canal dehiscence syndrome (SCDS) or asymptomatic superior semicircular canal dehiscence (SCD) have different surgical, vestibular, and audiologic outcomes when compared to CI users with normal temporal bone anatomy. Meth

  12. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  13. The Superior Transvelar Approach to the Fourth Ventricle and Brainstem

    OpenAIRE

    Ezer, Haim; Banerjee, Anirban Deep; Bollam, Papireddy; Guthikonda, Bharat; Nanda, Anil

    2012-01-01

    Objective The superior transvelar approach is used to access pathologies located in the fourth ventricle and brainstem. The surgical path is below the venous structures, through the superior medullary velum. Following splitting the tentorial edge, near the tentorial apex, the superior medullary velum is split in the cerebello-mesencephalic fissure. Using the supracerebellar infratentorial, transtentorial or parietal interhemispheric routes, the superior medullary velum is approached. Splittin...

  14. A study of the Communications Services Industrial Fund.

    OpenAIRE

    1985-01-01

    Approved for public release; distribution is unlimited The Communications Services Industrial Fund (CSIF) is an integral tool available to the Defense Communications Agency in directing and controlling the operations of the Defense Communications System. This thesis is an analysis of how effective the current structure of the fund has been in allowing the Defense Communications Agency to meet its objectives. A detailed description of the history, purpose and procedures...

  15. 14 CFR 385.7 - Exercise of authority by superiors.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Exercise of authority by superiors. 385.7... Exercise of authority by superiors. Any assignment of authority to a staff member other than the Chief... Department's principle of management responsibility, the superior may choose to exercise the assigned power...

  16. NVLAP activities at Department of Defense calibration laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Schaeffer, D.M. [Defense Nuclear Agency, Alexandria, VA (United States)

    1993-12-31

    There are 367 active radiological instrument calibration laboratories within the U.S. Department of Defense (DoD). Each of the four services in DoD manages, operates, and certifies the technical proficiency and competency of those laboratories under their cognizance. Each service has designated secondary calibration laboratories to trace all calibration source standards to the National Institute of Standards and Technology. Individual service radiological calibration programs and capabilities, present and future, are described, as well as the measurement quality assurance (MQA) processes for their traceability. National Voluntary Laboratory Accreditation Program (NVLAP) programs for dosimetry systems are briefly summarized. Planned NVLAP accreditation of secondary laboratories is discussed in the context of current technical challenges and future efforts.

  17. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  18. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  19. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  20. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  1. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  2. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  3. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  4. Superiority: China Mobile in the competition

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    The market share between China Mobile and China Unicom has stabilized since 2002.It is found that China Mobile has the superiority in the competition, for example, the scissors movement between its revenue and cost indicates that it has a strong profit generating ability and there is enough room for it to reduce the price.The ratio between its price (marginal income) and marginal cost indicates that there is a very distant limit for it to reduce the price.Its demand is obviously flexible with the price, but it does not use the price weapon abundantly.The reason for the stabilization of the market is that China Mobile withdrew from the competition.

  5. MRI manifestations of enlarged superior ophthalmic vein

    Institute of Scientific and Technical Information of China (English)

    WEI Rui-li; MA Xiao-ye; CAI Ji-ping; ZHU Huang

    2002-01-01

    Objective:To assess MRI in the evaluation of enlarged superior ophthalmic vein (SOV). Methods: MRI manifestations and etiology of forty-six patients with enlarged SOV were analyzed. Results: SOV enlargement was noted to occur in carotid-cavernous fistula, ophthalmic Graves'disease, Tolosa-Hunt syndrome, inflammation at the apex of the orbit, orbital pseudotumor and thrombosis of cavernous sinus. The dilated vein appeared as signal void tubular shadows on both T1 and T2 weighted images. The diameter of the enlarged vein was 3.5-6.0 mm. Extraocular muscle enlargement, orbital pathologies, enlarged carotid cavernous sinus etc were also revealed by MRI. Conclusion: The dilated SOV may be well demonstrated by MRI. The etiological diagnosis of enlarged SOV can be made in combination with the associated findings.

  6. Lightning activity during the 1999 Superior derecho

    Science.gov (United States)

    Price, Colin G.; Murphy, Brian P.

    2002-12-01

    On 4 July 1999, a severe convective windstorm, known as a derecho, caused extensive damage to forested regions along the United States/Canada border, west of Lake Superior. There were 665,000 acres of forest destroyed in the Boundary Waters Canoe Area Wilderness (BWCAW) in Minnesota and Quetico Provincial Park in Canada, with approximately 12.5 million trees blown down. This storm resulted in additional severe weather before and after the occurrence of the derecho, with continuous cloud-to-ground (CG) lightning occurring for more than 34 hours during its path across North America. At the time of the derecho the percentage of positive cloud-to-ground (+CG) lightning measured by the Canadian Lightning Detection Network (CLDN) was greater than 70% for more than three hours, with peak values reaching 97% positive CG lightning. Such high ratios of +CG are rare, and may be useful indicators of severe weather.

  7. Analgesia em modelo animal superior para ortopedia

    OpenAIRE

    Oliveira MT, Maria Teresa; Potes, José Alberto; Queiroga, Cristina; Castro, José António; Pereira, Alfredo; Reis, Joana

    2015-01-01

    O teste de novos biomateriais para aplicações clínicas em ortopedia, ou noutras áreas da medicina, em modelos animais vivos e sencientes, em prol do benefício humano, deve ser objecto de planeamento cuidado e ponderado, dado o conflito ético que se coloca. Compete-nos a nós, enquanto investigadores, garantir que as condições de vida, saúde e bem-estar são asseguradas. O uso de ovinos como modelo superior pré-clínico, para investigação em Ortopedia, tem-se evidenciado devido às suas caracterís...

  8. Superior vena cava syndrome in hemodialysis patient

    Directory of Open Access Journals (Sweden)

    Azeb Molhem

    2011-01-01

    Full Text Available Obstruction of blood flow in the superior vena cava (SVC results in symptoms and signs of SVC syndrome. SVC obstruction can be caused either by invasion or external compression of the SVC by contagious pathologic processes involving the right lung, lymph nodes, and other mediastinal structures, or by thrombosis of blood within the SVC. Occasionally, both mechanisms co-exist. We hereby report a case of a 28-year-old male, Saudi patient who was diagnosed with end-stage renal disease and was maintained on regular hemodiaysis via right jugular vein dual lumen catheter for ten months. Three years later, the patient presented with signs and symptoms suggestive of SVC obstruction that was successfully managed with SVC stenting.

  9. [Surgical treatment of superior thoracic outlet syndrome].

    Science.gov (United States)

    Gaibov, A D; Kakhorov, A Z; Sadriev, O N; Yunusov, Kh A

    2015-01-01

    The authors present immediate and long-term results of treatment of 117 patients with superior thoracic outlet syndrome (STOS). There were different reasons for compression of neu- rovascular fascicle in outlet of the thorax. The costaclavicular syndrome was a reason in 48 patients, additional cervical ribs had 36 patients. Skalenus syndrome was noted in 26 cases, rudimentary cervical ribs or hypertrophy of cervical vertebrae C7 had 7 patients. Raynaud's syndrome took place in 19 cases. The required volume of diagnostic procedures and surgical treatment of STOS were determined according to the cause of the syndrome. Differentiated approach to the different forms of STOS was used in relation to dominant symptoms of the disease and reasons for compression of neurovascular fascicle. This allowed getting positive results in majority of patients (90,4%) in long- term period.

  10. ANATOMIC RESEARCH OF SUPERIOR CLUNIAL NERVE TRAUMA

    Institute of Scientific and Technical Information of China (English)

    1999-01-01

    In order to find the mechanism of superior clunial nerve (SCN) trauma, we dissected and revealed SCN from 12 corpses (24 sides). Combining 100 sides of SCN trauma, we inspected the course of SCN, the relation between SCN and it's neighbour tissues with the situation of SCN when being subjected to force. We found that the following special anatomic characteristics and mechanical elements such as the course of SCN, it's turning angles, the bony fibrous tube at the iliac crest, the posterior layer of the lumbodorsal fascia and SCN neighbour adipose tissue, are the causes of external force inducing SCN trauma. The anatomic revealment is the guidance of SCN trauma treatment with edged needle.

  11. Superiorization: An optimization heuristic for medical physics

    CERN Document Server

    Herman, G T; Davidi, R; Censor, Y

    2012-01-01

    Purpose: To describe and mathematically validate the superiorization methodology, which is a recently-developed heuristic approach to optimization, and to discuss its applicability to medical physics problem formulations that specify the desired solution (of physically given or otherwise obtained constraints) by an optimization criterion. Methods: The underlying idea is that many iterative algorithms for finding such a solution are perturbation resilient in the sense that, even if certain kinds of changes are made at the end of each iterative step, the algorithm still produces a constraints-compatible solution. This property is exploited by using permitted changes to steer the algorithm to a solution that is not only constraints-compatible, but is also desirable according to a specified optimization criterion. The approach is very general, it is applicable to many iterative procedures and optimization criteria used in medical physics. Results: The main practical contribution is a procedure for automatically p...

  12. Superior calcium homeostasis of extraocular muscles.

    Science.gov (United States)

    Zeiger, Ulrike; Mitchell, Claire H; Khurana, Tejvir S

    2010-11-01

    Extraocular muscles (EOMs) are a unique group of skeletal muscles with unusual physiological properties such as being able to undergo rapid twitch contractions over extended periods and escape damage in the presence of excess intracellular calcium (Ca(2+)) in Duchenne's muscular dystrophy (DMD). Enhanced Ca(2+) buffering has been proposed as a contributory mechanism to explain these properties; however, the mechanisms are not well understood. We investigated mechanisms modulating Ca(2+) levels in EOM and tibialis anterior (TA) limb muscles. Using Fura-2 based ratiometric Ca(2+) imaging of primary myotubes we found that EOM myotubes reduced elevated Ca(2+) ˜2-fold faster than TA myotubes, demonstrating more efficient Ca(2+) buffering. Quantitative PCR (qPCR) and western blotting revealed higher expression of key components of the Ca(2+) regulation system in EOM, such as the cardiac/slow isoforms sarcoplasmic Ca(2+)-ATPase 2 (Serca2) and calsequestrin 2 (Casq2). Interestingly EOM expressed monomeric rather than multimeric forms of phospholamban (Pln), which was phosphorylated at threonine 17 (Thr17) but not at the serine 16 (Ser16) residue. EOM Pln remained monomeric and unphosphorylated at Ser16 despite protein kinase A (PKA) treatment, suggesting differential signalling and modulation cascades involving Pln-mediated Ca(2+) regulation in EOM. Increased expression of Ca(2+)/SR mRNA, proteins, differential post-translational modification of Pln and superior Ca(2+) buffering is consistent with the improved ability of EOM to handle elevated intracellular Ca(2+) levels. These characteristics provide mechanistic insight for the potential role of superior Ca(2+) buffering in the unusual physiology of EOM and their sparing in DMD.

  13. The management of superior sulcus tumors

    Energy Technology Data Exchange (ETDEWEB)

    Komaki, Ritsuko; Cox, J.D.; Putnam, J.B. Jr [Texas Univ., Houston, TX (United States). Anderson Cancer Center] (and others)

    2001-09-01

    Superior sulcus tumors are a rare type of lung cancer arising in the apex of the lung above the sulcus and cause specific symptoms and signs depending on the location and whether the tumor extends into the surrounding structures. Because of the closeness of critical structures to the tumor (e.g., the subclavian artery for anterior lesions, the brachial plexus for lesions in the middle location, and the sympathetic stellate ganglion causing Horner's syndrome [Pancoast's tumor], the vertebral bodies, nerve foramen, and spinal cord for posterior lesions), superior sulcus tumors were often considered marginally respectable or unresectable. Therefore, for many years, preoperative radiation therapy was considered routine treatment for those tumors. However, with the evolution in our understanding of these tumors and modern imaging techniques such as computerized tomography (CT) and magnetic resonant imaging (MRI) and surgical techniques, there is now considerable debate about the roles and timing of surgical resection, radiation therapy, and chemotherapy in the treatment of patients with these tumors. If mediastinoscopy reveals microscopic mediastinal lymph node involvement, the patient can be treated with preoperative concurrent chemoradiotherapy followed by surgery. If there was a gross mediastinal lymph node involvement (N2) on CT, N3 or T4 lesions, the patient can be treated with concurrent chemoradiotherapy with a curative intent; the outcome of such treatment appears to be better than that of sequential chemotherapy followed by radiation therapy. Whenever possible, without compromising the patient's quality of life, surgery should be considered to improve outcome. (author)

  14. STEREO Superior Solar Conjunction Mission Phase

    Science.gov (United States)

    Ossing, Daniel A.; Wilson, Daniel; Balon, Kevin; Hunt, Jack; Dudley, Owen; Chiu, George; Coulter, Timothy; Reese, Angel; Cox, Matthew; Srinivasan, Dipak; hide

    2017-01-01

    With its long duration and high gain antenna (HGA) feed thermal constraint; the NASA Solar-TErestrial RElations Observatory (STEREO) solar conjunction mission phase is quite unique to deep space operations. Originally designed for a two year heliocentric orbit mission to primarily study coronal mass ejection propagation, after 8 years of continuous science data collection, the twin STEREO observatories entered the solar conjunction mission phase, for which they were not designed. Nine months before entering conjunction, an unforeseen thermal constraint threatened to stop daily communications and science data collection for 15months. With a 3.5 month long communication blackout from the superior solar conjunction, without ground commands, each observatory will reset every 3 days, resulting in 35 system resets at an Earth range of 2 AU. As the observatories will be conjoined for the first time in 8 years, a unique opportunity for calibrating the same instruments on identical spacecraft will occur. As each observatory has lost redundancy, and with only a limited fidelity hardware simulator, how can the new observatory configuration be adequately and safely tested on each spacecraft? Without ground commands, how would a 3-axis stabilized spacecraft safely manage the ever accumulating system momentum without using propellant for thrusters? Could science data still be collected for the duration of the solar conjunction mission phase? Would the observatories survive? In its second extended mission, operational resources were limited at best. This paper discusses the solutions to the STEREO superior solar conjunction operational challenges, science data impact, testing, mission operations, results, and lessons learned while implementing.

  15. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  16. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  17. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  18. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  19. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  20. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  1. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  2. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  3. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  4. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  5. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  6. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  7. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  8. Por que os homens buscam menos os serviços de saúde do que as mulheres? As explicações de homens com baixa escolaridade e homens com ensino superior Why do men use health services less than women? Explanations by men with low versus higher education

    Directory of Open Access Journals (Sweden)

    Romeu Gomes

    2007-03-01

    Full Text Available O estudo tem como objetivo analisar as explicações presentes em discursos masculinos para a pouca procura dos homens por serviços de saúde. O método do estudo baseia-se numa abordagem de pesquisa qualitativa. A representação do cuidar como tarefa feminina, as questões relacionadas ao trabalho, a dificuldade de acesso aos serviços e a falta de unidades especificamente voltadas para a saúde do homem são os principais motivos expressos pelos sujeitos para a pouca procura pelos serviços de saúde. Conclui-se, dentre outros aspectos, que o imaginário social que vê o homem como ser invulnerável acaba contribuindo para que ele menos se cuide e mais se exponha a situações de risco.The objective of this study was to analyze explanations in male discourse for men's relatively limited use of health services, using a qualitative methodology. Representation of caring as a female task, work-related issues, difficult access to services, and lack of services specifically targeting men's health were the main reasons for their limited use of health services. By way of conclusion, the social imaginary by which men are viewed as invulnerable leads them to take less care of their own health and expose themselves to greater risk.

  9. Report of Findings: Lake Superior Classified Barrel Disposal Site. Defense Environmental Restoration Program for Formerly Used Defense Sites. Project No. E05MN025501

    Science.gov (United States)

    1991-08-01

    Affairs Office 6Y wp . ’ Sto O NATURAL RESOURCES Anthony & fadi January 18, 19TT S.dewy pox 4%0 MAOISON, WISCONSIN 53701 IN REPLY REFER TO: 1600 Colonel...the drums, mVA 4 were settino ot deaignated places on the production line. At so time during the )andlim.. or treaporLin of the scrap did 2 see anyone

  10. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  11. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  12. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  13. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  14. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  15. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    American/Jordanian investor consortium, hotel to be managed by Rotana (Abu Dhabi luxury hotel chain). Three-hundred room luxury hotel with seven...estate portfolio is one of the largest and most diverse in the world, with properties such as airports, training ranges, rail links, restaurants ...accommodations comparable to any highly regarded private sector limited-service hotel . Standardize Services and Platforms The Air Force is

  16. 77 FR 11568 - Notice of Intent To Repatriate Cultural Items: U.S. Department of Defense, Army Corps of...

    Science.gov (United States)

    2012-02-27

    ... and Cultural History, Eugene, OR AGENCY: National Park Service, Interior. ACTION: Notice. SUMMARY: The... Cultural History (UO-MNCH), Eugene, OR, that meet the definition of unassociated funerary objects under 25... National Park Service Notice of Intent To Repatriate Cultural Items: U.S. Department of Defense, Army...

  17. 77 FR 74870 - Notice of Inventory Completion: U.S. Department of Defense, Army, Fort Sill Museum, Fort Sill, OK...

    Science.gov (United States)

    2012-12-18

    ..., geology, and historical accounts. The people of the Wichita, Comanche, Kiowa, Apache, Cheyenne, and... National Park Service Notice of Inventory Completion: U.S. Department of Defense, Army, Fort Sill Museum, Fort Sill, OK, and Museum of the Great Plains, Lawton, OK AGENCY: National Park Service,...

  18. Lake Superior Coastal Wetland Fish Assemblages and ...

    Science.gov (United States)

    The role of the coastal margin and the watershed context in defining the ecology of even very large lakes is increasingly being recognized and examined. Coastal wetlands are both important contributors to the biodiversity and productivity of large lakes and important mediators of the lake-basin connection. We explored wetland-watershed connections and their relationship to wetland function and condition using data collected from 37 Lake Superior wetlands spanning a substantial geographic and geomorphic gradient. While none of these wetlands are particularly disturbed, there were nevertheless clear relationships between watershed landuse and wetland habitat and biota, and these varied consistently across wetland type categories that reflected the strength of connection to the watershed. For example, water clarity and vegetation structure complexity declined with decreasing percent natural land cover, and these effects were strongest in riverine wetlands (having generally large watersheds and tributary-dominated hydrology) and weakest in lagoon wetlands (having generally small watersheds and lake-dominate hydrology). Fish abundance and species richness both increased with decreasing percent natural land cover while species diversity decreased, and again the effect was strongest in riverine wetlands. Lagoonal wetlands, which lack any substantial tributary, consistently harbored the fewest species of fish and a composition different from the more watershed-lin

  19. 78 FR 28756 - Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes...

    Science.gov (United States)

    2013-05-16

    ... 0750-AH87 Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes... System (EPLS) databases into the System for Award Management (SAM) database. DATES: Effective Date: May... effort to improve the management and promotion of electronic Government services and processes. The Act...

  20. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  1. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  2. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  3. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours

    2012-07-01

    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  4. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  5. Defense Security Enterprise Architecture (DSEA) Product Reference Guide. Revision 1.0

    Science.gov (United States)

    2016-06-01

    benefits of cross-department vetting. In the use case. a U.S. military service member...users can add external data sources to their view in common web service formats (KML, KMZ, WMS , and GeoRSS). Other capabilities within OneView include...USNORTHCOM and active participation from DSEA on use case development • Examining the benefits of information sharing between the defense

  6. Defense Acquisition Research Journal. Volume 19, Number 1, Issue 61, January 2012

    Science.gov (United States)

    2012-01-01

    82ARJ, January 2012, Vol. 19 No. 1 : 075 — 098 Regulations (ITAR) through the United States Munitions List ( USML ) under the auspices of the Arms Export...Control Act of 1976. Through the USML , the Department of State primarily seeks to prevent sensi- tive technology, services, articles, and...Controls (DDTC), ITAR uses the USML to determine if an article or service is deemed defense-related through the following criteria (Department of State

  7. FY2012 National Defense Authorization Act: Selected Military Personnel Policy Issues

    Science.gov (United States)

    2012-01-05

    services, post-separation medical and dental coverage, career counseling, financial planning, employment and re-employment rights , and veterans...available at http://thinkprogress.org/ lgbt /2011/05/11/177408/navy-marriage-rescind/. FY2012 National Defense Authorization Act: Selected Military...raised that the possibility or actuality of military deployments may encourage courts to deny custodial rights of a service member to a former spouse

  8. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  9. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  10. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  11. 32 CFR 700.822 - Delivery of personnel to civil authorities and service of subpoena or other process.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Delivery of personnel to civil authorities and service of subpoena or other process. 700.822 Section 700.822 National Defense Department of Defense... REGULATIONS AND OFFICIAL RECORDS The Commanding Officer Commanding Officers in General § 700.822 Delivery...

  12. 32 CFR 734.3 - Service of process.

    Science.gov (United States)

    2010-07-01

    ... receipt of such legal process, it will be forwarded directly to: Defense Finance and Accounting Service... process may be served on the Commanding Officer, Navy Resale System Office, Attention: Industrial...

  13. Optimal defense strategy: storage vs. new production.

    Science.gov (United States)

    Shudo, Emi; Iwasa, Yoh

    2002-12-07

    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  14. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  15. Seasonal abundance of waterbirds at Adak Naval Reservation, Alaska 1992 to 1995: Department of Defense Legacy project numbers 400 and 1658

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — As part of the Department of Defense Legacy Resource Management Program, a study of waterbirds and marine mammals was conducted on the Adak Naval Reservation, Adak...

  16. Testimony of David Yardas, water resources analyst Environmental Defense Fund on the contemporary needs and management of the Newlands Reclamation Project

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — This is the testimony of David Yardas, water resource analyst for the Environmental Defense Fund, concerning the contemporary needs and management of federal...

  17. Determining the Frequency of Defensive Medicine Among General Practitioners in Southeast Iran

    Directory of Open Access Journals (Sweden)

    Mahmood Moosazadeh

    2014-04-01

    Full Text Available Background Defensive medicine prompts physicians not to admit high-risk patients who need intensive care. This phenomenon not only decreases the quality of healthcare services, but also wastes scarce health resources. Defensive medicine occurs in negative and positive forms. Hence, the present study aimed to determine frequency of positive and negative defensive medicine behaviors and their underlying factors among general practitioners in Southeast Iran. Methods The present cross-sectional study was performed among general practitioners in Southeast Iran. 423 subjects participated in the study on a census basis and a questionnaire was used for data collection. Data analysis was carried out using descriptive and analytical statistics through SPSS 20. Results The majority of participants were male (58.2%. The mean age of physicians was 40 ± 8.5. The frequency of positive and negative defensive medicine among general practitioners in Southeast Iran was 99.8% and 79.2% respectively. A significant relationship was observed between working experience, being informed of law suits against their colleagues, and committing defensive medicine behavior (P< 0.001. Conclusion The present study indicated high frequency of defensive medicine behavior in the Southeast Iran. So, it calls policy-makers special attention to improve the status quo.

  18. 32 CFR 881.3 - Individual Service Review Board.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Individual Service Review Board. 881.3 Section... Individual Service Review Board. (a) The Commander, Headquarters Air Force Personnel Center (HQ AFPC/CC) establishes the Individual Service Review Board as necessary. (b) The Board consists of military members...

  19. Carbon phosphide monolayers with superior carrier mobility

    Science.gov (United States)

    Wang, Gaoxue; Pandey, Ravindra; Karna, Shashi P.

    2016-04-01

    Two dimensional (2D) materials with a finite band gap and high carrier mobility are sought after materials from both fundamental and technological perspectives. In this paper, we present the results based on the particle swarm optimization method and density functional theory which predict three geometrically different phases of the carbon phosphide (CP) monolayer consisting of sp2 hybridized C atoms and sp3 hybridized P atoms in hexagonal networks. Two of the phases, referred to as α-CP and β-CP with puckered or buckled surfaces are semiconducting with highly anisotropic electronic and mechanical properties. More remarkably, they have the lightest electrons and holes among the known 2D semiconductors, yielding superior carrier mobility. The γ-CP has a distorted hexagonal network and exhibits a semi-metallic behavior with Dirac cones. These theoretical findings suggest that the binary CP monolayer is a yet unexplored 2D material holding great promise for applications in high-performance electronics and optoelectronics.Two dimensional (2D) materials with a finite band gap and high carrier mobility are sought after materials from both fundamental and technological perspectives. In this paper, we present the results based on the particle swarm optimization method and density functional theory which predict three geometrically different phases of the carbon phosphide (CP) monolayer consisting of sp2 hybridized C atoms and sp3 hybridized P atoms in hexagonal networks. Two of the phases, referred to as α-CP and β-CP with puckered or buckled surfaces are semiconducting with highly anisotropic electronic and mechanical properties. More remarkably, they have the lightest electrons and holes among the known 2D semiconductors, yielding superior carrier mobility. The γ-CP has a distorted hexagonal network and exhibits a semi-metallic behavior with Dirac cones. These theoretical findings suggest that the binary CP monolayer is a yet unexplored 2D material holding great

  20. Absent right superior caval vein in situs solitus

    DEFF Research Database (Denmark)

    Lytzen, Rebekka; Sundberg, Karin; Vejlstrup, Niels

    2015-01-01

    no postnatal complications. All children were found to have healthy hearts at follow-up. CONCLUSIONS: In all cases, the findings proved to be a benign condition with no clinical manifestations or complications. Although isolated absent right superior caval vein does not seem to affect the outcome, associated......Introduction In up to 0.07% of the general population, the right anterior cardinal vein obliterates and the left remains open, creating an absent right superior caval vein and a persistent left superior caval vein. Absent right superior caval vein is associated with additional congenital heart...... disease in about half the patients. We wished to study the consequences of absent right superior caval vein as an incidental finding on prenatal ultrasonic malformation screening. Material and methods This is a retrospective case series study of all foetuses diagnosed with absent right superior caval vein...

  1. The Business Value of Superior Energy Performance

    Energy Technology Data Exchange (ETDEWEB)

    McKane, Aimee; Scheihing, Paul; Evans, Tracy; Glatt, Sandy; Meffert, William

    2015-08-04

    Industrial facilities participating in the U.S. Department of Energy’s (US DOE) Superior Energy Performance (SEP) program are finding that it provides them with significant business value. This value starts with the implementation of ISO 50001-Energy management system standard, which provides an internationally-relevant framework for integration of energy management into an organization’s business processes. The resulting structure emphasizes effective use of available data and supports continual improvement of energy performance. International relevance is particularly important for companies with a global presence or trading interests, providing them with access to supporting ISO standards and a growing body of certified companies representing the collective knowledge of communities of practice. This paper examines the business value of SEP, a voluntary program that builds on ISO 50001, inviting industry to demonstrate an even greater commitment through third-party verification of energy performance improvement to a specified level of achievement. Information from 28 facilities that have already achieved SEP certification will illustrate key findings concerning both the value and the challenges from SEP/ISO 50001 implementation. These include the facilities’ experience with implementation, internal and external value of third-party verification of energy performance improvement; attractive payback periods and the importance of SEP tools and guidance. US DOE is working to bring the program to scale, including the Enterprise-Wide Accelerator (SEP for multiple facilities in a company), the Ratepayer-Funded Program Accelerator (supporting tools for utilities and program administrators to include SEP in their program offerings), and expansion of the program to other sectors and industry supply chains.

  2. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  3. Coronary artery bypass and superior vena cava syndrome.

    OpenAIRE

    Thomas, T V; Masrani, K; Thomas, J.L.

    1999-01-01

    Superior vena cava syndrome is the obstruction of the superior vena cava or its main tributaries by benign or malignant lesions. The syndrome causes edema and engorgement of the vessels on the face, neck, and arms, nonproductive cough, and dyspnea. We discuss the case of a 48-year-old obese diabetic woman who was admitted with unstable angina. She had previously been diagnosed with superior vena cava syndrome. Urgent coronary artery bypass grafting was necessary Although thousands of coronary...

  4. Superiorization of incremental optimization algorithms for statistical tomographic image reconstruction

    Science.gov (United States)

    Helou, E. S.; Zibetti, M. V. W.; Miqueles, E. X.

    2017-04-01

    We propose the superiorization of incremental algorithms for tomographic image reconstruction. The resulting methods follow a better path in its way to finding the optimal solution for the maximum likelihood problem in the sense that they are closer to the Pareto optimal curve than the non-superiorized techniques. A new scaled gradient iteration is proposed and three superiorization schemes are evaluated. Theoretical analysis of the methods as well as computational experiments with both synthetic and real data are provided.

  5. 77 FR 48856 - Safety Zone; Superior Bay, Duluth, MN

    Science.gov (United States)

    2012-08-15

    ... spectators during the Superior Man Triathlon. DATES: This rule is effective from 6 a.m. to 8:30 a.m. on... Triathlon, which are discussed further below. Under 5 U.S.C. 553(d)(3), the Coast Guard finds that good... inaugural Superior Man Triathlon will occur along the Bay of Lake Superior. The 1.2 mile swim leg of...

  6. 36 CFR 293.16 - Special provisions governing the Boundary Waters Canoe Area Wilderness, Superior National Forest...

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Special provisions governing the Boundary Waters Canoe Area Wilderness, Superior National Forest, Minnesota. 293.16 Section 293.16 Parks, Forests, and Public Property FOREST SERVICE, DEPARTMENT OF AGRICULTURE WILDERNESS-PRIMITIVE AREAS...

  7. Superior Mesenteric Artery Syndrome: An Infrequent Complication of Scoliosis Surgery

    Directory of Open Access Journals (Sweden)

    Metin Keskin

    2014-01-01

    Full Text Available Superior mesenteric artery syndrome is a rare condition that causes a proximal small intestinal obstruction due to contraction of the angle between the superior mesenteric artery and the aorta. Scoliosis surgery is one of the 15 reasons for superior mesenteric artery syndrome, which can present with acute or chronic manifestations. Although conservative treatment is usually possible, surgical treatment is required in certain cases that cannot be treated using conservative methods. In this paper, we describe a patient who developed superior mesenteric artery syndrome after scoliosis surgery and was treated with duodenojejunostomy due to failure and complications of conservative treatment.

  8. Superior Vena Cava Thrombosis in a Case of Lung Adenocarcinoma

    Directory of Open Access Journals (Sweden)

    Santanu Ghosh

    2013-01-01

    Full Text Available Superior vena cava syndrome is a common presentation of bronchogenic carcinoma. The mechanism of obstruction is by compression of superior vena cava by the bronchogenic tumor itself or enlarged mediastinal lymph nodes. However obstruction due to intravascular thrombosis is extremely uncommon. Here, we report a rare case of a 65-year-old male smoker who presented with superior vena cava syndrome and bilateral pleural and pericardial effusion with thrombotic occlusion of the superior vena cava in adenocarcinoma of the lung. He was given chemotherapy with carboplatin and gemcitabine with anticoagulant therapy.

  9. Escuela superior de Hacienda Pública en Speyer, Alemania

    Directory of Open Access Journals (Sweden)

    Ruf, Sep

    1963-12-01

    Full Text Available The total building program connected with this School comprises the following: 1. The Higher School itself, which has an auditorium, lecture halls, main lecture hall, rooms for scientific work done by professors and their assistants, and the usual administrative offices. 2. Living quarters for the professors and students, living rooms, a club and a flat for the porter. 3. A bar and the kitchen. 4. Garage, servicing station and a bicycle shed. The Higher School is built on a single level, around a central patio-style garden, with a pond in the middle. The library, lecture halls, and working rooms are arranged to face this inner open space. The main lecture hall rises in tiers, to facilitate the view of the speaker, and its roof emerges considerably above the level of the rest of the building, as a dominant feature. The living accommodation is housed in a four storey building. The ground floor contains the club, living rooms, and the professors and porter's flats. The upper three floors are taken up with the students rooms. These are single and double rooms. This project is simply proportioned, and the volumes and planes are very clearly differentiated, to achieve a space pattern of very clearcut outline.El conjunto de instalaciones construidas comprende: — La Escuela Superior propiamente dicha, dotada de los correspondientes auditorio, clase, aula magna, salas para trabajos científicos de profesores y asistentes y la zona de administración. — Viviendas para profesores y cursillistas, salas de estar, club y vivienda del conserje. — Bar con cocina. Garaje con estación de servicio y un local para bicicletas. La Escuela Superior se desarrolla en una sola planta, en la cual, alrededor del patio-jardín—con un estanque—, se hallan la biblioteca, clase, auditorios y salas de trabajo. El aula magna tiene acceso al nivel de suelo, y presenta una disposición escalonada que facilita la visibilidad. Como elemento dominante, este cuerpo se eleva

  10. [Catheter in the superior vena cava for hemodialysis as a last resort in superior hemithorax].

    Science.gov (United States)

    Restrepo Valencia, C A; Buritica Barragán, C M; Arango, A

    2010-01-01

    We report four patients with chronic kidney disease undergoing haemodialysis therapy, which had exhausted conventional venous access (internal jugular, subclavian) and non-conventional access (axillary, innominate) in the upper hemithorax for haemodialysis. This was primarily due to thrombosis of these veins caused by previous catheterisation. These patients did not qualify for peritoneal dialysis. Using the technique recommended by Archundia et al., 4 indwelling catheters were implanted directly in the superior vena cava in each of the patients with subsequent subcutaneous tunneling. The catheters operated correctly and are currently permeable after being used for an average of 19 months.

  11. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  12. Strategies for Dealing with the Defense Budget

    Science.gov (United States)

    1983-08-17

    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  13. Fatal pericardial tamponade after superior vena cava stenting.

    NARCIS (Netherlands)

    Ploegmakers, M.J.M.; Rutten, M.J.C.M.

    2009-01-01

    We discuss a fatal complication of percutaneous superior vena cava (SVC) self-expandable stent placement in a patient with superior vena cava syndrome (SVCS). The SVCS was caused by a malignant mediastinal mass with total occlusion of the SVC. Twenty-four hours after the procedure, the patient died

  14. 33 CFR 117.495 - Superior Oil Canal.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Superior Oil Canal. 117.495 Section 117.495 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY BRIDGES DRAWBRIDGE OPERATION REGULATIONS Specific Requirements Louisiana § 117.495 Superior Oil Canal. The draw of the S82 bridge, mile 6.3, in Cameron...

  15. [Superior vena cava syndrome--surgical solution--case report].

    Science.gov (United States)

    Galie, N; Vasile, R; Savu, C; Petreanu, C; Grigorie, V; Tabacu, E

    2010-01-01

    The patient of 52-year-old smoker was admitted in emergency with headaches, dyspnea, oedema and cyanosis of the cephalic extremity and of the superior members. This signs and symptoms suggest a superior vena cava sindrom. Thoracic CT scan shows the thrombosis of the superior vena cava and a tumor localized in the Bariety's Lodge of about 30/40 mm witch is around the right lateral wall of the traheea.This tumor is also tangent to the superior the superior vena cava. The patient was operated by total median sternotomy. By this approach we performed a complete excision of the mediastinal tumor mass. After that we effected a longitudinal cavotomy, we took out the endoluminal clot and we sutured the superior vena cava. The histological diagnosis of the mediastinal tumor was adenocarcinoma tubular-papillary moderately differentiated. The evolution post operative period was favorable the superior vena cava sindrom was a complet remission. The thoracic CT scan control after 9 months later didn't show a local relapse and blood flow was normally throw the superior vena cava.

  16. Fatal pericardial tamponade after superior vena cava stenting.

    NARCIS (Netherlands)

    Ploegmakers, M.J.M.; Rutten, M.J.C.M.

    2009-01-01

    We discuss a fatal complication of percutaneous superior vena cava (SVC) self-expandable stent placement in a patient with superior vena cava syndrome (SVCS). The SVCS was caused by a malignant mediastinal mass with total occlusion of the SVC. Twenty-four hours after the procedure, the patient died

  17. Mechanical Service; Service Mechanique

    Energy Technology Data Exchange (ETDEWEB)

    Alliaume, T.; Benoit, A.; Bonin, H.; Ducimetiere, D.; Essertaize, D.; Gelin, G.; Guillot, G.; Lemoine, C.; Mabo, J.C.; Mounier, F.; Tissot, S.; Verdier, G. [Inst. de Physique Nucleaire, Lyon-1 Univ., 69 - Villeurbanne (France)

    1998-12-31

    The service studies the mechanical part of the experiment or detectors used by the physics groups in collaboration with the physicists, engineers and the technicians of the experiment assistance group as well as with other technical groups. The mechanical service was implied in the following projects: CMS, VIRGO (the IGISOL ion guide chamber), PIAFE, NA50 (reaction chamber, metallic cluster source), ORION, SICANE, EDELWEISS II 2 figs.

  18. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  19. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  20. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  1. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  2. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  3. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force

    Science.gov (United States)

    2007-06-01

    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  4. The superior transvelar approach to the fourth ventricle and brainstem.

    Science.gov (United States)

    Ezer, Haim; Banerjee, Anirban Deep; Bollam, Papireddy; Guthikonda, Bharat; Nanda, Anil

    2012-06-01

    Objective The superior transvelar approach is used to access pathologies located in the fourth ventricle and brainstem. The surgical path is below the venous structures, through the superior medullary velum. Following splitting the tentorial edge, near the tentorial apex, the superior medullary velum is split in the cerebello-mesencephalic fissure. Using the supracerebellar infratentorial, transtentorial or parietal interhemispheric routes, the superior medullary velum is approached. Splitting this velum provides a detailed view of the fourth ventricle and its floor. Materials and Methods A total of 10 formalin-fixed specimens were dissected in a stepwise manner to simulate the superior transvelar approach to the fourth ventricle. The exposure gained the distance from the craniotomy site and the ease of access was assessed for each of the routes. We also present an illustrative case, operated by the senior author (AN). Results The superior transvelar approach provides access to the entire length of the fourth ventricle floor, from the aqueduct to the obex, when using the parietal interhemispheric route. In addition, this approach provides access to the entire width of the floor of the fourth ventricle; however, this requires retracting the superior cerebellar peduncle. Using the supracerebellar infratentorial route gives a limited exposure of the superior part of the fourth ventricle. The occipital interhemispheric route is a compromise between these two. Conclusion The superior transvelar approach to the fourth ventricle provides a route for approaching the fourth ventricle from above. This approach does not require opening the posterior fossa in the traditional way, and provides a reasonable alternative for accessing the superior fourth ventricle.

  5. Defense Downsizing and Blacks in the Military

    Science.gov (United States)

    1993-06-01

    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  6. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  7. Carp erythrodermatitis: host defense-pathogen interaction.

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  8. The Future of Theater Missile Defense

    Science.gov (United States)

    1994-06-01

    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  9. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses.

    Science.gov (United States)

    Boyd, Robert S

    2012-10-01

    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  10. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  11. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  12. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  13. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  14. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  15. Síndrome de Deiscência de Canal Semicircular Superior Superior Canal Dehiscence Syndrome

    Directory of Open Access Journals (Sweden)

    Suzane da Cunha Ferreira

    2006-06-01

    Full Text Available A Síndrome de Deiscência de Canal Semicircular Superior (SDCSS, primeiramente descrita em 1998 por Minor et al., caracteriza-se por vertigem associada à presença de nistagmo, relacionados à exposição a estímulos sonoros intensos ou a modificações de pressão dentro da orelha média ou intracraniana. Disacusia, em sua maioria de padrão condutivo à audiometria tonal, também pode estar presente. Nesta revisão da literatura objetivou-se abordar a SDCSS, com seus principais sinais e sintomas, achados diagnósticos e tratamento, assim como enfatizar a importância de sua inclusão dentre as causas de vertigem, visto tratar-se de acometimento ainda pouco conhecido até mesmo entre especialistas. O diagnóstico correto, além de possibilitar seu tratamento, impede que abordagens diagnósticas e terapêuticas inapropriadas sejam realizadas.The Superior Canal Dehiscence Syndrome (SCDS was first reported by Minor at. Al. (1998, and has been characterized by vertigo and vertical-torsional eye movements related to loud sounds or stimuli that change middle ear or intracranial pressure. Hearing loss, for the most part with conductive patterns on audiometry, may be present in this syndrome. We performed a literature survey in order to to present symptoms, signs, diagnostic and therapeutic approaches to the SCDS, also aiming at stressing the great importance of including this syndrome among the tractable cause of vertigo. We should emphasize that this is a recent issue, still unknown by some specialists. The Correct SCDS diagnosis, besides enabling patient treatment, precludes misdiagnosis and inadequate therapeutic approaches.

  16. 现代企业情报工作的内容及方法%The Content & Method of Information Services of Modem Enterprises

    Institute of Scientific and Technical Information of China (English)

    尹怀琼

    2002-01-01

    The article discusses the content and method of information services of modem enterprises, including competitive intelligence, defensive competitive intelligence and the formulation of competitive strategies.

  17. METHODOLOGY FOR EVALUATING AND IMPROVING THE EFFECTIVENESS OF THE STATE DEFENSE CAPABILITIES

    Directory of Open Access Journals (Sweden)

    Vikulov S. F.

    2015-04-01

    Full Text Available In the article we have developed a methodology to assess the effectiveness of various types of military and economic activities, the effectiveness of which determines the value of the defense capabilities of the state; we have also revealed the economic substance of defense capabilities and combat readiness of troops, justified approaches to determining the significance of ongoing military-oriented activities, identified main activities of the specific conditions of defense industries which leave their marks on the cost-effectiveness in the production of material resources for the Russian military service. The analysis of the flow direction of monetary environment of estimated units indicates that the current practice of planning and cost accounting is not fully adapted for military-economic analysis of measures to ensure the establishment of the defense capabilities of the state, and this makes it difficult to study and make recommendations to improve the efficiency of the use of military and economic resources. The authors propose a unified system of methodological support planning, estimating the size of consumed resources (regardless of funding source and attainable defense results. Methodical resolution of this problem is based on the use of program-target approach to modeling the processes of the defense-industrial complex and the structural elements of the military organization. The article substantiates that the evaluation of the effectiveness of the use of defense capabilities should be carried out not only by the criterion of "cost - effect", but with all the manifestations of the time factor. In the most general form of the criterion of effectiveness should be provided by the triad "cost - effect - time." An important result of this study is also in the development of the integral index of evaluating the effectiveness of the use of military and economic

  18. Service Gateway

    Institute of Scientific and Technical Information of China (English)

    WANG Guozhong; HOU Gang; HUANG Zeqing

    2003-01-01

    This article focuses on the service gateway which implements the Open Service gateway Initiative (OSGI), it manages voice, data, Internet, and multimedia communications to and from the home, office and other locations. This service gateway can also function as an application server for a range of high value services such as energy management and control, safety and security services, health care monitoring services, device control and maintenance, electronic commerce services and more.

  19. 32 CFR 1630.11 - Class 1-A-0: Conscientious objector available for noncombatant military service only.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Class 1-A-0: Conscientious objector available for noncombatant military service only. 1630.11 Section 1630.11 National Defense Other Regulations...: Conscientious objector available for noncombatant military service only. In accord with part 1636 of...

  20. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  1. Acquired Brown Syndrome Treated With Traction of Superior Oblique Tendon.

    Science.gov (United States)

    Shin, Kwang Hoon; Paik, Hae Jung; Chi, Mijung

    2016-03-01

    Brown syndrome is a rare strabismic disease characterized by a limited elevation in adduction of the eye. The lengthening/weakening of superior oblique muscle is the main way of surgical intervention for this disease. A 7-year-old boy was diagnosed as having acquired Brown syndrome in his right eye after injury in his face. We experienced successful release of this Brown syndrome through mere pulling outward of superior oblique tendon during surgical exploration. We briefly discuss why this manipulation of superior oblique tendon that we performed was successful.

  2. Right superior vena cava draining into the left atrium

    Energy Technology Data Exchange (ETDEWEB)

    Calcagni, Giulio; Sidi, Daniel; Bonnet, Damien [University Rene Descartes-Paris 5, Department of Paediatric Cardiology, Hopital Necker-Enfants Malades, Paris (France); Batisse, Alain [Institut de Puericulture et de Perinatalogie, Paris (France); Vouhe, Pascal [University Rene Descartes-Paris 5, Department of Paediatric Cardiac Surgery, Hopital Necker-Enfants Malades, Paris (France); Ou, Phalla [University Rene Descartes-Paris 5, Department of Paediatric Cardiology, Hopital Necker-Enfants Malades, Paris (France); University Rene Descartes-Paris 5, Department of Pediatric Radiology, Hopital Necker-Enfants Malades, Paris (France)

    2008-08-15

    The right superior vena cava draining into the left atrium is a rare malformation causing cyanosis and clubbing in patients in whom no other signs of congenital heart defect are present. Diagnosis may be difficult as cyanosis may be mild and the anomaly is not always easily detectable by echocardiography. For this reason we report a 13-month-old male in whom we confirmed the clinical and echocardiographic suspicion of anomalous drainage of the right superior vena cava using multidetector CT. This allowed successful surgical reconnection of the right superior vena cava to the right atrium. (orig.)

  3. Noise management to achieve superiority in quantum information systems

    Science.gov (United States)

    Nemoto, Kae; Devitt, Simon; Munro, William J.

    2017-06-01

    Quantum information systems are expected to exhibit superiority compared with their classical counterparts. This superiority arises from the quantum coherences present in these quantum systems, which are obviously absent in classical ones. To exploit such quantum coherences, it is essential to control the phase information in the quantum state. The phase is analogue in nature, rather than binary. This makes quantum information technology fundamentally different from our classical digital information technology. In this paper, we analyse error sources and illustrate how these errors must be managed for the system to achieve the required fidelity and a quantum superiority. This article is part of the themed issue 'Quantum technology for the 21st century'.

  4. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  5. US Home Defense Forces Study

    Science.gov (United States)

    1981-03-01

    authorities. Maine The Home Guard, with all the powers of constables, police officers, and watchmen , except for the serving of civil processes,was to serve...reenforce the efforts of local police, firemen, and watchmen . In 1918, these units, already recognized by the governor as State Militia Reserves, were...offI- oers and watchmen eoept service of civil prooo5ss.oI. A Q -stab~oIsbd by Ciaptor 26 of t-e Coaponsation not rrabter than Aots of 1917. Utato

  6. Defense System Software Management Plan

    Science.gov (United States)

    1976-03-01

    quality assurance discipline " Lack of quantitative data base for feedback of "lessons learned" 2. Actions to be Taken a. Service policies will be...and identify where they could be improved. Feedback from the field will be incorporated in updated versions of the guidelines and a cor cinued...c~0 .00 0 u 0 Efl ) 0 0 H 11-4 " . 00 oo Wro o,_ U ) z I QI- (n 0 0~ wH 000 1-5 MANAGEMENT PRACTICE AND PROCEDURE The action vehicle envf.sioned for

  7. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims

    Science.gov (United States)

    2013-01-01

    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  8. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Science.gov (United States)

    2010-10-25

    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  9. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  10. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  11. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  12. Gap analysis: transition of health care from Department of Defense to Department of Veterans Affairs.

    Science.gov (United States)

    Randall, Marjorie J

    2012-01-01

    This study examined the effectiveness of Public Law 110-181, "National Defense Authorization Act of Fiscal Year 2008, Title XVI-Wounded Warriors Matter," as it relates to health care for returning Operation Enduring Freedom and Operation Iraqi Freedom (OEF/OIF) combat veterans. Specifically, it examined the gap between the time an OEF/OIF combat service member left active service and subsequently obtained health care within the Veteran Affairs (VA) Healthcare System, and which factors influenced or impeded the veteran from obtaining health care sooner. Data were collected from 376 OEF/OIF combat veterans who sought health care at the Nashville or Murfreesboro VA Medical Centers. A questionnaire was designed exclusively for this study. The average time gap for an OEF/OIF combat veteran to transition from Department of Defense to VA health care was 3.83 months (SD 7.17). Twenty-six percent of respondents reported there were factors that impeded them from coming to the VA sooner. Factors included lack of knowledge about VA benefits, transportation/distance, perceptions of losing military career, seeking help as sign of weakness, and VA reputation. The study provided some evidence to support that Department of Defense and VA are meeting mandates for providing seamless transition of health care set forth by "Public Law 110-181, National Defense Authorization Act of Fiscal Year 2008."

  13. 2010 Great Lakes Restoration Initiative Bathymetric Lidar: Lake Superior

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The data contained in this file contain hydrographic and topographic data collected by the Fugro LADS Mk II system along the Lake Superior coast of Minnessota,...

  14. 28 CFR 2.60 - Superior program achievement.

    Science.gov (United States)

    2010-07-01

    ... OF PRISONERS, YOUTH OFFENDERS, AND JUVENILE DELINQUENTS United States Code Prisoners and Parolees § 2... or a case with both superior program achievement and minor disciplinary infraction(s)). Advancements...

  15. Coronary artery bypass and superior vena cava syndrome.

    Science.gov (United States)

    Thomas, T V; Masrani, K; Thomas, J L

    1999-01-01

    Superior vena cava syndrome is the obstruction of the superior vena cava or its main tributaries by benign or malignant lesions. The syndrome causes edema and engorgement of the vessels on the face, neck, and arms, nonproductive cough, and dyspnea. We discuss the case of a 48-year-old obese diabetic woman who was admitted with unstable angina. She had previously been diagnosed with superior vena cava syndrome. Urgent coronary artery bypass grafting was necessary Although thousands of coronary artery bypasses are performed every year, there are not many reports on patients with superior vena cava syndrome who successfully undergo cardiopulmonary bypass and coronary artery grafting with an internal mammary artery as the conduit. The results of the case and alternative recommended methods are discussed.

  16. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  17. Consolidated Afloat Networks and Enterprise Services (CANES)

    Science.gov (United States)

    2016-03-01

    Intelligence , Surveillance and Reconnaissance, Information Operations, Logistics and Business domains require the CANES infrastructure to operate...2016 Major Automated Information System Annual Report Consolidated Afloat Networks and Enterprise Services (CANES) Defense Acquisition Management...Programs 3 Program Information 4 Responsible Office 4 References 4 Program Description 5 Business Case 6 Program Status 7

  18. Superior memorizers employ different neural networks for encoding and recall.

    Science.gov (United States)

    Mallow, Johannes; Bernarding, Johannes; Luchtmann, Michael; Bethmann, Anja; Brechmann, André

    2015-01-01

    Superior memorizers often employ the method of loci (MoL) to memorize large amounts of information. The MoL, known since ancient times, relies on a complex process where information to be memorized is bound to landmarks along mental routes in a previously memorized environment. However, functional magnetic resonance imaging data on groups of trained superior memorizer are rare. Based on the memorizing strategy reported by superior memorizers, we developed a scheme of the processes successively employed during memorizing and recalling digits and relate these to brain activation that is specific for the encoding and recall period. In the examined superior memorizers several regions, suggested to be involved in mental navigation and digit-to-word processing, were specifically activated during encoding: bilateral early visual cortex, retrosplenial cortex, left parahippocampus, left visual cortex, and left superior parietal cortex. Although the scheme suggests that some steps during encoding and recall seem to be analog, none of the encoding areas were specifically activated during the recall. Instead, we found strong activation in left anterior superior temporal gyrus, which we relate to recalling the sequential order of the digits, and right motor cortex that may be related to reciting the digits.

  19. Superior Memorizers Employ Different Neural Networks for Encoding and Recall

    Directory of Open Access Journals (Sweden)

    Johannes eMallow

    2015-09-01

    Full Text Available Superior memorizers often employ the method of loci (MoL to memorize large amounts of information. The method of loci, known since ancient times, relies on a complex process where information to be memorized is bound to landmarks along mental routes in a previously memorized environment. However, fMRI data on groups of trained superior memorizer are rare. Based on the memorizing strategy reported by superior memorizers we developed a scheme of the processes successively employed during memorizing and recalling digits and relate these to brain activation that is specific for the encoding and recall period. In the examined superior memorizers several regions, suggested to be involved in mental navigation and digit-to-word processing, were specifically activated during encoding: bilateral early visual cortex, retrosplenial cortex, left parahippocampus, left visual cortex, and left superior parietal cortex. Although the scheme suggests that some steps during encoding and recall seem to be analog, none of the encoding areas were specifically activated during the recall. Instead, we found strong activation in left anterior superior temporal gyrus, which we relate to recalling the sequential order of the digits, and right motor cortex that may be related to reciting the digits.

  20. Differential diagnosis of cervical radiculopathy and superior pulmonary sulcus tumor

    Institute of Scientific and Technical Information of China (English)

    GU Rui; KANG Ming-yang; GAO Zhong-li; ZHAO Jian-wu; WANG Jin-cheng

    2012-01-01

    Background The result would be disastrous if the superior pulmonary sulcus tumor (Pancoast tumor) was misdiagnosed as degenerative cervical spine diseases.The aim of this study was to investigate the differential diagnosis methods of cervical radiculopathy and superior pulmonary sulcus tumor.Methods Clinical manifestations,physical,and radiological findings of 10 patients,whose main complaints were radiating shoulder and arm pain and later were diagnosed with superior pulmonary sulcus tumor,were reviewed and compared with those of cervical radiculopathy.Results Superior pulmonary sulcus tumor patients have shorter mean history and fewer complaints of neck pain or limitation of neck movement.Physical examination showed almost normal cervical spine range of motion.Spurling's neck compression test was negative in all patients.Anteroposterior cervical radiographs showed the lack of pulmonary air at the top of the affected lung in all cases and first rib encroachment in one case.The diagnosis of superior pulmonary sulcus tumor can be further confirmed by CT and MRI.Conclusions By the method of combination of history,physical examination,and radiological findings,superior pulmonary sulcus tumor can be efficiently differentiated from cervical radiculopathy.Normal motion range of the cervical spine,negative Spurling's neck compression test,and the lack of pulmonary air at the top of the affected lung in anteroposterior cervical radiographs should be considerad as indications for further chest radiograph examinations.

  1. FAX SERVICE

    CERN Multimedia

    Telephone Service

    2002-01-01

    As from 1st of July 2002, responsibility for running the Fax Service will be transfered to the Printer Service. Future requests for machines, toner and breakdown should be sent to Printer.Support@cern.ch - tel 78888. Telephone Service

  2. Veia cava superior esquerda anômala com ausência de veia cava superior direita: achados de imagem Persistent left superior vena cava with absent right superior vena cava: image findings

    Directory of Open Access Journals (Sweden)

    Cyrillo Rodrigues de Araújo Júnior

    2003-10-01

    Full Text Available A persistência da veia cava superior esquerda com ausência da veia cava superior direita é uma anomalia rara, com menos de 150 casos descritos na literatura. A não-obliteração e regressão da veia cardinal anterior esquerda durante o desenvolvimento embriológico promove uma variação sistêmica de retorno venoso ao coração, com persistência da veia cava superior esquerda. Sua incidência varia de 0,3% em pacientes sem alterações cardíacas congênitas concomitantes a 4,3% naqueles com cardiopatias. Na maioria das vezes coexiste a veia cava superior direita, porém se houver regressão e degeneração da veia cardinal anterior direita, implicará a sua ausência e a drenagem venosa para o coração será feita pela veia cava superior esquerda ao átrio direito, através do seio coronariano. Mostramos um caso de um paciente submetido a radiografia de tórax e tomografia computadorizada para avaliação de doença pulmonar obstrutiva crônica, tendo como achado a persistência da veia cava superior esquerda com ausência da direita, sem qualquer cardiopatia associada e com a drenagem cardíaca sendo feita, através do seio coronariano, para o átrio direito.Persistent left superior vena cava with absent right superior vena cava is a rare anomaly, with less than 150 cases reported in the literature. Congenitally persistent left superior vena cava is the most common variant of systemic venous return to the heart, resulting embryologically from failure of the left anterior cardinal vein to become obliterated. Its incidence varies from 0.3% in patients with otherwise normal heart to 4.3% in patients with congenital heart disease. In the majority of the patients, a right superior vena cava is present as well, but rarely the right anterior cardinal vein degenerates resulting in the absence of the normal right superior vena cava. The blood from the right side is carried by the persistent left superior vena cava to the right atrium through the

  3. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  4. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  5. Towards Deployable DDoS Defense for Web Applications

    CERN Document Server

    Mittal, Prateek; Hu, Yih-Chun; Caesar, Matthew

    2011-01-01

    Distributed Denial of Service (DDoS) attacks form one of the most serious threats that plague the Internet today. However, despite over a decade of research, and the existence of several proposals to address this problem, there has been little progress to date on actual adoption. In this work, we argue that adoption would be simplified by lowering the cost of deployment. Towards this goal, we present Mirage, an approach to DDoS defense that lowers the cost of adoption. Mirage achieves comparable performance to other DDoS mitigation schemes while providing benefits when deployed only in the server's local network and its upstream ISP, where local business objectives may incentivize deployment. In particular, Mirage does not require source end hosts to install any software to access Mirage protected websites. Unlike previous proposals, Mirage only requires functionality from routers that is already deployed in today's routers, though this functionality may need to be scaled depending on the point of deployment....

  6. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  7. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  8. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  9. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  10. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  11. Medical Services: Ophthalmic Services

    Science.gov (United States)

    2007-11-02

    Atlan- tic Treaty Organization (NATO) nations and of other officially rec- ognized foreign military personnel at military installations within the...representatives of religious groups, celebrities, and enter- tainers; representatives of the United Service Organization( USO ), other social agencies, and...from DOD, or from one of the military depart- ments, to visit military commands overseas. b. Dependents of USO oversea area executives, club directors

  12. Service Modularity

    DEFF Research Database (Denmark)

    Avlonitis, Viktor; Hsuan, Juliana

    2015-01-01

    The purpose of this research is to investigate the studies on service modularity with a goal of informing service science and advancing contemporary service systems research. Modularity, a general systems property, can add theoretical underpinnings to the conceptual development of service science...... in general and service systems in particular. Our research is guided by the following question: how can modularity theory inform service system design? We present a review of the modularity literature and associated concepts. We then introduce the contemporary service science and service system discourse...

  13. 48 CFR 237.102-72 - Contracts for management services.

    Science.gov (United States)

    2010-10-01

    ... Contracts-General 237.102-72 Contracts for management services. In accordance with Section 802 of the... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Contracts for management services. 237.102-72 Section 237.102-72 Federal Acquisition Regulations System DEFENSE ACQUISITION...

  14. 48 CFR 231.205-6 - Compensation for personal services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Compensation for personal services. 231.205-6 Section 231.205-6 Federal Acquisition Regulations System DEFENSE ACQUISITION... PROCEDURES Contracts With Commercial Organizations 231.205-6 Compensation for personal services. (f)(1)...

  15. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    Science.gov (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  16. Early Birds in Korea: Exporting Defense AT and L Has Far Reaching Impact

    Science.gov (United States)

    2015-11-01

    but it is a daunting challenge to assess and find effective ways to make the fundamental changes needed while staying true to a strong bureaucratic...MND, military Services and the DAPA, particularly on foreign military sales (FMS) and defense cooperation in armaments programs. JUSMAG-K has...Army led the nascent EBS club as a freshly promoted lieutenant colonel and now is in charge of Korea’s important tank projects. Acting as a servant

  17. Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

    Science.gov (United States)

    2011-04-19

    many ships will be available; and how the alphabet- soup of U.S. and international commanders will work together in a crisis. [Admiral Mark...meeting outside of missile defense,” Campbell said during a Nov. 3 interview with Aviation Week. These include providing weapons and manpower for...would seem a natural mission for the Army to fund and field the land-based SM-3 mission as the lead service. Campbell notes that the Army has 10

  18. Indonesian Defense Strategy: An Appraisal of Requirements, Resources, Capabilities, and Directions.

    Science.gov (United States)

    1984-05-07

    open publicoation until It has boen cleared by the appropriate military service or government agency. INDCNESIAN DEFENSE STRATEGY AN APPRAISAL OF...political roles. as a result of the "coup", and Territorial Warfare recog years) to "unfreeze" them. The poor transportation /communicat oncerned with the...Combat Engineer Battalions 4 Special Warfare Groups (KOPPASANDA) - Army Aviation Command - Marine Transport Command - Supply, Maintenance and

  19. Arms Control and Missile Defense: Explaining Success and Failure in U.S.-Russian Cooperation

    Science.gov (United States)

    2013-09-01

    33 Amy F. Woolf , “The New START Treaty: Central Limits and Key Provisions,” Congressional Research Service...2013. http://en.wikipedia.org/wiki/Partial_Test_Ban_Treaty. Woolf , Amy F. The New START Treaty: Central Limits and Key Provisions CRS Report R41219...DISTRIBUTION LIST 1. Defense Technical Information Center Ft. Belvoir, Virginia 2. Dudley Knox Library Naval Postgraduate School Monterey, California

  20. Defense Acquisition Reform: Where Do We Go From Here? A Compendium of Views by Leading Experts

    Science.gov (United States)

    2014-10-02

    Division at the Air Force Armament Laboratory, Eglin Air Force Base, Florida . He graduated from Spring Hill College in 1955 with a bachelor’s...undercarriage (against mines) came from South Africa. Then, the Israel-owed armor company (Plasan) set up its plant in Vermont (to address the U.S. labor...numerous awards, including the Department of Defense Medal for Distinguished Public Service (Bronze Palm ), Chairman of the Joint Chiefs of Staff Joint

  1. Current Trends in Social Media and the Department of Defense’s Social Media Policy

    Science.gov (United States)

    2014-09-23

    mobile phones. With the growing popularity of smartphones ,1 mobile app use has doubled from 2012 to 2013, and messaging apps have increased by 203...platforms of today are not the platforms of tomorrow. Specifically, the growth of smartphone use and the presence and use of social media apps is...your REFERENCES 26 Defense Finance and Accounting Service. (2013). DFAS ‘Info2Go’ app available in the Apple App Store and the Android market

  2. Defense Acquisitions; Strategic Airlift Gap Has Been Addressed, but Tactical Airlift Plans Are Evolving as Key Issues Have Not Been Resolved

    Science.gov (United States)

    2009-11-01

    United States Government Accountability Office Washington, DC 20548 November 12, 2009 The Honorable Neil Abercrombie Chairman The...Honorable Roscoe Bartlett Ranking Member Subcommittee on Air and Land Forces Committee on Armed Services House of Representatives The Department of...Defense Budget Request for Fiscal Year 2010: Hearing Before the H. Armed Services Comm., 111th Cong. (2009) (statements of Rep. Bartlett , Ranking Member

  3. 75 FR 65028 - Notice of Intent To Repatriate Cultural Items: U.S. Department of Defense, Army Corps of...

    Science.gov (United States)

    2010-10-21

    ... University of Oregon Museum of Natural and Cultural History, have determined that, pursuant to 25 U.S.C. 3001... University of Oregon Museum of Natural and Cultural History, have also determined that, pursuant to 25 U.S.C... National Park Service Notice of Intent To Repatriate Cultural Items: U.S. Department of Defense, Army...

  4. Food Defense Best Practices Reported by Public School Food Authorities in Seven Northern U.S. States

    Science.gov (United States)

    Klitzke, Carol J.; Strohbehn, Catherine H.

    2015-01-01

    Purpose/Objectives: This study reported food defense planning, training and best practices implemented in public schools in Montana, Wyoming, South Dakota, North Dakota, Iowa, Minnesota, and Wisconsin. Methods: An internet-administered survey was sent to 1,501 school food authorities or food service directors (FSDs) in public schools. Survey items…

  5. Program Manager: Journal of the Defense Systems Management College. Volume 17, Number 4, July-August 1988

    Science.gov (United States)

    1988-08-01

    Senator Phil Gramm, ranking minority member, to advise the Senate Armed Services Committee Defense Industry and , . Technology Subcommittee on "...those... Crosby cisions concerning changes and others have translated to the process. general theories into prac- tical applications that are changing the corporate

  6. Food Defense Best Practices Reported by Public School Food Authorities in Seven Northern U.S. States

    Science.gov (United States)

    Klitzke, Carol J.; Strohbehn, Catherine H.

    2015-01-01

    Purpose/Objectives: This study reported food defense planning, training and best practices implemented in public schools in Montana, Wyoming, South Dakota, North Dakota, Iowa, Minnesota, and Wisconsin. Methods: An internet-administered survey was sent to 1,501 school food authorities or food service directors (FSDs) in public schools. Survey items…

  7. Implementation of the Defense Business Operations Fund (DBOF) Policies and Unit Costing in the Air Force Institute of Technology (AFIT)

    Science.gov (United States)

    1993-09-01

    a bussines . The "fee for service" program may enable part of the DOD perform better, but other parts of DOD cannot use the program effectively. You...research or class development. What makes AFRT different from MIT, Harvard , or Yale? 3.1. 1 agree. 0 4. In the era of defense drawdown, the DOD may

  8. Ecosystem services

    Science.gov (United States)

    Trista Patterson

    2014-01-01

    Since its inception, the ecosystem service approach has stimulated interest from numerous planning, management, and partnership perspectives. To date, however, research that quantifies ecosystem services in the study area (in the form of explicit ecosystem service studies) has been limited. This chapter reviews and synthesizes the concept of ecosystem services,...

  9. Superior Canal Dehiscence Syndrome: Lessons from the First 20 Years

    Directory of Open Access Journals (Sweden)

    Bryan K. Ward

    2017-04-01

    Full Text Available Superior semicircular canal dehiscence syndrome was first reported by Lloyd Minor and colleagues in 1998. Patients with a dehiscence in the bone overlying the superior semicircular canal experience symptoms of pressure or sound-induced vertigo, bone conduction hyperacusis, and pulsatile tinnitus. The initial series of patients were diagnosed based on common symptoms, a physical examination finding of eye movements in the plane of the superior semicircular canal when ear canal pressure or loud tones were applied to the ear, and high-resolution computed tomography imaging demonstrating a dehiscence in the bone over the superior semicircular canal. Research productivity directed at understanding better methods for diagnosing and treating this condition has substantially increased over the last two decades. We now have a sound understanding of the pathophysiology of third mobile window syndromes, higher resolution imaging protocols, and several sensitive and specific diagnostic tests. Furthermore, we have a treatment (surgical occlusion of the superior semicircular canal that has demonstrated efficacy. This review will highlight some of the fundamental insights gained in SCDS, propose diagnostic criteria, and discuss future research directions.

  10. La educación superior como eje del desarrollo

    Directory of Open Access Journals (Sweden)

    Benjamín Afanador Vargas

    2003-11-01

    Full Text Available Este documento analiza cómo ha sido la interacción entre la política educativa y las estrategiasde desarrollo en Colombia, a lo largo del siglo XX. Se presenta una revisión del estadoactual de la educación en Colombia, tanto a nivel de educación básica y media, como de laeducación superior. Para ello se toman tres criterios básicos que son la cobertura, la calidady la equidad en el acceso a la educación. Para el caso de la educación superior, se comparala oferta de cupos con la demanda existente, se clasifican los distintos segmentos en que sedivide la educación superior y se hace una breve reseña sobre el recurso humano con que secuenta en la educación superior colombiana. Así mismo, se expone una conceptualización delos retos que enfrenta la educación superior, sobretodo para lograr una cohesión de la sociedad,evitando que algunos de sus integrantes sean excluidos y permitiendo que todos losestamentos de la sociedad puedan compartir los mismos ideales y los consideren asequibles.Finalmente, se presentan unas conclusiones que se derivan del estudio y se proponen algunasrecomendaciones de política .

  11. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  12. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  13. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  14. Enhancing Air Base Defense Through Joint Doctrine

    Science.gov (United States)

    2009-01-01

    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  15. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  16. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this doctrine...to forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  17. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  18. Defense Advanced Research Projects Agency Strategic Plan

    Science.gov (United States)

    2007-02-01

    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  19. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  20. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  1. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  2. Rigorous Cyberspace Defense Expert Training Moves Forward

    Science.gov (United States)

    2012-09-01

    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  3. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  4. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  5. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  6. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  7. The equal effectiveness of different defensive strategies

    Science.gov (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming

    2015-01-01

    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  8. PCT MAO’s Enhanced Performance by Specially Designed Sealers for Superior Service & Environments

    Science.gov (United States)

    2014-11-01

    Micro-arc oxidation (lower energy) • Organo-ceramic sealing • Organic Sealing in Vacuum • Aluminized Steel 2 The PCT Layer Dense Oxide...Functional Layer Intermediate Bonding Layer Substrate 3 PCT Aluminized Steel For MAO Aluminized Steel Facts • Aluminized steel became commercially...reflectivity and corrosion protection. • Traditional Aluminized Steel (ASTM-A463) is hot-dip coated on both sides with an aluminum/silicon alloy coating

  9. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  10. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata

    2016-01-01

    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  11. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  12. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore

    2016-01-01

    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  13. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  14. Temporal Bone Fracture Causing Superior Semicircular Canal Dehiscence

    Directory of Open Access Journals (Sweden)

    Kevin A. Peng

    2014-01-01

    Full Text Available Importance. Superior semicircular canal dehiscence (SCD is a third window lesion of the inner ear causing symptoms of vertigo, autophony, tinnitus, and hearing loss. A “two-hit” hypothesis has traditionally been proposed, whereby thinly developed bone overlying the superior canal is disrupted by a sudden change in intracranial pressure. Although the symptoms of SCD may be precipitated by head injury, no previous reports have described a temporal bone fracture directly causing SCD. Observations. Two patients sustained temporal bone fractures after closed head trauma, and developed unilateral otologic symptoms consistent with SCD. In each instance, computed tomography imaging revealed fractures extending through the bony roof of the superior semicircular canal. Conclusions and Relevance. Temporal bone fractures, which are largely treated nonoperatively, have not previously been reported to cause SCD. As it is a potentially treatable entity, SCD resulting from temporal bone fracture must be recognized as a possibility and diagnosed promptly if present.

  15. Partial anomalous pulmonary venous connection to the superior vena cava.

    Science.gov (United States)

    Aramendi, José I; Rey, Estibaliz; Hamzeh, Gadah; Crespo, Alejandro; Luis, Maite; Voces, Roberto

    2011-04-01

    We describe the surgical technique of reimplantation of the right superior pulmonary vein into the left atrium in 2 patients with partial anomalous pulmonary venous connection to the superior vena cava without atrial septal defect. A right axillary minithoracotomy is done through the fourth intercostal space. The pulmonary vein is detached from its origin in the superior vena cava. This is sutured with 6-0 reabsorbable polydioxanone suture (Ethicon, Somerville, NJ). A lateral clamp is applied to the left atrium, and the pulmonary vein is reimplanted. The patient is extubated in the operating room. Neither cardiopulmonary bypass nor blood transfusion was required. It is simple, safe, and reproducible. Copyright © 2011 The Society of Thoracic Surgeons. Published by Elsevier Inc. All rights reserved.

  16. Isolated abscess in superior rectus muscle in a child

    Directory of Open Access Journals (Sweden)

    Sushank Ashok Bhalerao

    2015-01-01

    Full Text Available Pyomyositis is a primary bacterial infection of striated muscles nearly always caused by Staphylococcus aureus. Development of the intramuscular abscess involving the extra-ocular muscles (EOMs remains an extremely rare process. We herein present a case of isolated EOM pyomyositis involving superior rectus muscle in a 2-year male child who was referred with complaints of swelling in left eye (LE and inability to open LE since last 1-month. Orbital computed tomography (CT scan showed a well-defined, hypo-dense, peripheral rim-enhancing lesion in relation to left superior rectus muscle suggestive of left superior rectus abscess. The abscess was drained through skin approach. We concluded that pyomyositis of EOM should be considered in any patient presenting with acute onset of orbital inflammation and characteristic CT or magnetic resonance imaging features. Management consists of incision and drainage coupled with antibiotic therapy.

  17. Anthropogenic climate change has altered primary productivity in Lake Superior

    Science.gov (United States)

    O'Beirne, M. D.; Werne, J. P.; Hecky, R. E.; Johnson, T. C.; Katsev, S.; Reavie, E. D.

    2017-06-01

    Anthropogenic climate change has the potential to alter many facets of Earth's freshwater resources, especially lacustrine ecosystems. The effects of anthropogenic changes in Lake Superior, which is Earth's largest freshwater lake by area, are not well documented (spatially or temporally) and predicted future states in response to climate change vary. Here we show that Lake Superior experienced a slow, steady increase in production throughout the Holocene using (paleo)productivity proxies in lacustrine sediments to reconstruct past changes in primary production. Furthermore, data from the last century indicate a rapid increase in primary production, which we attribute to increasing surface water temperatures and longer seasonal stratification related to longer ice-free periods in Lake Superior due to anthropogenic climate warming. These observations demonstrate that anthropogenic effects have become a prominent influence on one of Earth's largest, most pristine lacustrine ecosystems.

  18. Noise management to achieve superiority in quantum information systems.

    Science.gov (United States)

    Nemoto, Kae; Devitt, Simon; Munro, William J

    2017-08-06

    Quantum information systems are expected to exhibit superiority compared with their classical counterparts. This superiority arises from the quantum coherences present in these quantum systems, which are obviously absent in classical ones. To exploit such quantum coherences, it is essential to control the phase information in the quantum state. The phase is analogue in nature, rather than binary. This makes quantum information technology fundamentally different from our classical digital information technology. In this paper, we analyse error sources and illustrate how these errors must be managed for the system to achieve the required fidelity and a quantum superiority.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).

  19. INFORMATION ASSURANCE - INTELLIGENCE - INFORMATION SUPERIORITY RELATIONSHIP WITHIN NATO OPERATIONS

    Directory of Open Access Journals (Sweden)

    Gheorghe BOARU, Ioan-Mihai ILIEŞ

    2011-01-01

    Full Text Available There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations. The intelligence cycle has a discrete architecture and provides on-time and relevant intelligence products to the joint force commanders and to other authorized users in a specifi c joint area of operations. The intelligence cycle must follow the evolution of the operation. A permanent intelligence estimate will be performed during the military decision making process and operations execution. Information superiority is one of the most powerful intelligence cycle achievements. and decisively infuences the success of NATO joint operations. Information superiority must be preserved and enhanced through information assurance. Information assurance is an information operation that must be planned by the military in charge of operation security or by non-military experts, executed by all personnel during the entire intelligence cycle life time and employed during the planning and execution of NATO joint operations.

  20. Status of the shortjaw cisco (Coregonus zenithicus) in Lake Superior

    Science.gov (United States)

    Hoff, Michael H.; Todd, Thomas N.

    2004-01-01

    The shortjaw cisco (Coregonus zenithicus) was historically found in Lakes Huron, Michigan, and Superior, but has been extirpated in Lakes Huron and Michigan apparently as the result of commercial overharvest. During 1999-2001, we conducted an assessment of shortjaw cisco abundance in five areas, spanning the U.S. waters of Lake Superior, and compared our results with the abundance measured at those areas in 1921-1922. The shortjaw cisco was found at four of the five areas sampled, but abundances were so low that they were not significantly different from zero. In the four areas where shortjaw ciscoes were found, abundance declined significantly by 99% from the 1920s to the present. To increase populations of this once economically and ecologically important species in Lake Superior, an interagency rehabilitation effort is needed. Population monitoring is recommended to assess population trends and to evaluate success of rehabilitation efforts.