WorldWideScience

Sample records for defenses electronic resource

  1. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  2. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  3. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  4. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  5. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    pronounced at intermediate environmental conditions. Optimizing single traits generally leads to a more pronounced response of the defense traits, which implies that studying single traits leads to an overestimation of their response to predation. Behavioral defense and morphological defense compensate......Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  6. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  7. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  8. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  9. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  10. Resource defense and monopolization in a marked population of ruby-throated hummingbirds (Archilochus colubris).

    Science.gov (United States)

    Rousseu, François; Charette, Yanick; Bélisle, Marc

    2014-03-01

    Resource defense behavior is often explained by the spatial and temporal distribution of resources. However, factors such as competition, habitat complexity, and individual space use may also affect the capacity of individuals to defend and monopolize resources. Yet, studies frequently focus on one or two factors, overlooking the complexity found in natural settings. Here, we addressed defense and monopolization of nectar feeders in a population of free-ranging ruby-throated hummingbirds marked with passive integrated transponder (PIT tags). Our study system consisted of a 44 ha systematic grid of 45 feeders equipped with PIT tag detectors recording every visit made at feeders. We modeled the number of visits by competitors (NVC) at feeders in response to space use by a focal individual potentially defending a feeder, number of competitors, nectar sucrose concentration, and habitat visibility. Individuals who were more concentrated at certain feeders on a given day and who were more stable in their use of the grid throughout the season gained higher exclusivity in the use of those feeders on that day, especially for males competing against males. The level of spatial concentration at feeders and its negative effect on NVC was, however, highly variable among individuals, suggesting a continuum in resource defense strategies. Although the apparent capacity to defend feeders was not affected by competition or nectar sucrose concentration, the level of monopolization decreased with increasing number of competitors and higher nectar quality. Defense was enhanced by visibility near feeders, but only in forested habitats. The reverse effect of visibility in open habitats was more difficult to interpret as it was probably confounded by perch availability, from which a bird can defend its feeder. Our study is among the first to quantify the joint use of food resource by overlapping individuals unconstrained in their use of space. Our results show the importance of

  11. DOD Future Energy Resources. Proceedings of Workshops Held at the National Defense University

    National Research Council Canada - National Science Library

    2003-01-01

    .... In response to concerns about U.S. and global depletion of cheap petroleum resources and the particular impact of this on future DOD energy resource needs, a series of workshops were held during 2002 and 2003 at National Defense University...

  12. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  13. Electronic Resource Management and Design

    Science.gov (United States)

    Abrams, Kimberly R.

    2015-01-01

    We have now reached a tipping point at which electronic resources comprise more than half of academic library budgets. Because of the increasing work associated with the ever-increasing number of e-resources, there is a trend to distribute work throughout the library even in the presence of an electronic resources department. In 2013, the author…

  14. 41 CFR 101-26.603 - Electronic items available from the Defense Logistics Agency.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Electronic items available from the Defense Logistics Agency. 101-26.603 Section 101-26.603 Public Contracts and Property... items available from the Defense Logistics Agency. Executive agencies shall satisfy their requirements...

  15. Electronic Resource Management Systems

    Directory of Open Access Journals (Sweden)

    Mark Ellingsen

    2004-10-01

    Full Text Available Computer applications which deal with electronic resource management (ERM are quite a recent development. They have grown out of the need to manage the burgeoning number of electronic resources particularly electronic journals. Typically, in the early years of e-journal acquisition, library staff provided an easy means of accessing these journals by providing an alphabetical list on a web page. Some went as far as categorising the e-journals by subject and then grouping the journals either on a single web page or by using multiple pages. It didn't take long before it was recognised that it would be more efficient to dynamically generate the pages from a database rather than to continually edit the pages manually. Of course, once the descriptive metadata for an electronic journal was held within a database the next logical step was to provide administrative forms whereby that metadata could be manipulated. This in turn led to demands for incorporating more information and more functionality into the developing application.

  16. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-11-05

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration is to consolidate all electronic resources into a single and centralized location. This would allow for better information sharing among library staff.

  17. Male resource defense mating system in primates? An experimental test in wild capuchin monkeys.

    Directory of Open Access Journals (Sweden)

    Barbara Tiddi

    Full Text Available Ecological models of mating systems provide a theoretical framework to predict the effect of the defendability of both breeding resources and mating partners on mating patterns. In resource-based mating systems, male control over breeding resources is tightly linked to female mating preference. To date, few field studies have experimentally investigated the relationship between male resource control and female mating preference in mammals due to difficulties in manipulating ecological factors (e.g., food contestability. We tested the within-group male resource defense hypothesis experimentally in a wild population of black capuchin monkeys (Sapajus nigritus in Iguazú National Park, Argentina. Sapajus spp. represent an ideal study model as, in contrast to most primates, they have been previously argued to be characterized by female mate choice and a resource-based mating system in which within-group resource monopolization by high-ranking males drives female mating preference for those males. Here, we examined whether females (N = 12 showed a weaker preference for alpha males during mating seasons in which food distribution was experimentally manipulated to be less defendable relative to those in which it was highly defendable. Results did not support the within-group male resource defense hypothesis, as female sexual preferences for alpha males did not vary based on food defendability. We discuss possible reasons for our results, including the possibility of other direct and indirect benefits females receive in exercising mate choice, the potential lack of tolerance over food directed towards females by alpha males, and phylogenetic constraints.

  18. PRINCIPLES OF CONTENT FORMATION EDUCATIONAL ELECTRONIC RESOURCE

    Directory of Open Access Journals (Sweden)

    О Ю Заславская

    2017-12-01

    Full Text Available The article considers modern possibilities of information and communication technologies for the design of electronic educational resources. The conceptual basis of the open educational multimedia system is based on the modular architecture of the electronic educational resource. The content of the electronic training module can be implemented in several versions of the modules: obtaining information, practical exercises, control. The regularities in the teaching process in modern pedagogical theory are considered: general and specific, and the principles for the formation of the content of instruction at different levels are defined, based on the formulated regularities. On the basis of the analysis, the principles of the formation of the electronic educational resource are determined, taking into account the general and didactic patterns of teaching.As principles of the formation of educational material for obtaining information for the electronic educational resource, the article considers: the principle of methodological orientation, the principle of general scientific orientation, the principle of systemic nature, the principle of fundamentalization, the principle of accounting intersubject communications, the principle of minimization. The principles of the formation of the electronic training module of practical studies in the article include: the principle of systematic and dose based consistency, the principle of rational use of study time, the principle of accessibility. The principles of the formation of the module for monitoring the electronic educational resource can be: the principle of the operationalization of goals, the principle of unified identification diagnosis.

  19. Implementing CORAL: An Electronic Resource Management System

    Science.gov (United States)

    Whitfield, Sharon

    2011-01-01

    A 2010 electronic resource management survey conducted by Maria Collins of North Carolina State University and Jill E. Grogg of University of Alabama Libraries found that the top six electronic resources management priorities included workflow management, communications management, license management, statistics management, administrative…

  20. Managing electronic resources a LITA guide

    CERN Document Server

    Weir, Ryan O

    2012-01-01

    Informative, useful, current, Managing Electronic Resources: A LITA Guide shows how to successfully manage time, resources, and relationships with vendors and staff to ensure personal, professional, and institutional success.

  1. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  2. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    Science.gov (United States)

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  3. Gender Analysis Of Electronic Information Resource Use: The Case ...

    African Journals Online (AJOL)

    Based on the findings the study concluded that access and use of electronic information resources creates a “social digital divide” along gender lines. The study ... Finally, the library needs to change its marketing strategies on the availability of electronic information resources to increase awareness of these resources.

  4. Users satisfaction with electronic information resources and services ...

    African Journals Online (AJOL)

    This study investigated users satisfaction on the use of electronic information resources and services in MTN Net libraries in ABU & UNIBEN. Two objectives and one null hypotheses were formulated and tested with respect to the users' satisfaction on electronic information resources and services in MTN Net libraries in ...

  5. 41 CFR 101-26.605 - Items other than petroleum products and electronic items available from the Defense Logistics...

    Science.gov (United States)

    2010-07-01

    ... petroleum products and electronic items available from the Defense Logistics Agency. 101-26.605 Section 101... available from the Defense Logistics Agency. Agencies required to use GSA supply sources should also use... Logistics Agency, the catalog will contain only those items in Federal supply classification classes which...

  6. Organizational matters of competition in electronic educational resources

    Directory of Open Access Journals (Sweden)

    Ирина Карловна Войтович

    2015-12-01

    Full Text Available The article examines the experience of the Udmurt State University in conducting competitions of educational publications and electronic resources. The purpose of such competitions is to provide methodological support to educational process. The main focus is on competition of electronic educational resources. The technology of such contests is discussed through detailed analysis of the main stages of the contest. It is noted that the main task of the preparatory stage of the competition is related to the development of regulations on competition and the definition of criteria for selection of the submitted works. The paper also proposes a system of evaluation criteria of electronic educational resources developed by members of the contest organizing committee and jury members. The article emphasizes the importance of not only the preparatory stages of the competition, but also measures for its completion, aimed at training teachers create quality e-learning resources.

  7. CHALLENGES OF ELECTRONIC INFORMATION RESOURCES IN ...

    African Journals Online (AJOL)

    This paper discusses the role of policy for proper and efficient library services in the electronic era. It points out some of the possible dangers of embarking in electronic resources without a proper focus at hand. Thus, it calls for today's librarians and policy makers to brainstorm and come up with working policies suitable to ...

  8. Megawatt-class free electron laser concept for shipboard self-defense

    International Nuclear Information System (INIS)

    Todd, Alan M.M.; Colson, William B.; Neil, George

    1997-01-01

    An efficient MW-class free electron laser (FEL) directed energy weapon (DEW) system holds promise for satisfying shipboard self-defense (SSD) requirements on future generations of Navy vessels because of the potential for high-power operation and the accessibility to all IR wavelengths. In order to meet shipboard packaging and prime power constraints, the power efficiency and high real-estate gradient achievable in an FEL driven by a superconducting RF accelerator is attractive. Configuration options and the key development issues for such a system are described

  9. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  10. Use of Electronic Resources in a Private University in Nigeria ...

    African Journals Online (AJOL)

    The study examined awareness and constraints in the use of electronic resources by lecturers and students of Ajayi Crowther University, Oyo, Nigeria. It aimed at justifying the resources expended in the provision of electronic resources in terms of awareness, patronage and factors that may be affecting awareness and use ...

  11. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-05-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system as potential replacements namely: Proquest 360 Resource Manager, Ex Libris Alma and Open Source CORAL ERMS. After comparing and trialling the systems, it was decided to go for Proquest 360 Resource Manager.

  12. use of electronic resources by graduate students of the department

    African Journals Online (AJOL)

    respondent's access electronic resources from the internet via Cybercafé .There is a high ... KEY WORDS: Use, Electronic Resources, Graduate Students, Cybercafé. INTRODUCTION ... Faculty of Education, University of Uyo, Uyo. Olu Olat ...

  13. Electronic resource management practical perspectives in a new technical services model

    CERN Document Server

    Elguindi, Anne

    2012-01-01

    A significant shift is taking place in libraries, with the purchase of e-resources accounting for the bulk of materials spending. Electronic Resource Management makes the case that technical services workflows need to make a corresponding shift toward e-centric models and highlights the increasing variety of e-formats that are forcing new developments in the field.Six chapters cover key topics, including: technical services models, both past and emerging; staffing and workflow in electronic resource management; implementation and transformation of electronic resource management systems; the ro

  14. Utilization of electronic information resources by academic staff at ...

    African Journals Online (AJOL)

    The study investigated the utilization of Electronic Information resources by the academic staff of Makerere University in Uganda. It examined the academic staff awareness of the resources available, the types of resources provided by the Makerere University Library, the factors affecting resource utilization. The study was ...

  15. Electronic Resources Management Project Presentation 2012

    KAUST Repository

    Ramli, Rindra M.

    2012-01-01

    This presentation describes the electronic resources management project undertaken by the KAUST library. The objectives of this project is to migrate information from MS Sharepoint to Millennium ERM module. One of the advantages of this migration

  16. Practical guide to electronic resources in the humanities

    CERN Document Server

    Dubnjakovic, Ana

    2010-01-01

    From full-text article databases to digitized collections of primary source materials, newly emerging electronic resources have radically impacted how research in the humanities is conducted and discovered. This book, covering high-quality, up-to-date electronic resources for the humanities, is an easy-to-use annotated guide for the librarian, student, and scholar alike. It covers online databases, indexes, archives, and many other critical tools in key humanities disciplines including philosophy, religion, languages and literature, and performing and visual arts. Succinct overviews of key eme

  17. Utilisation of Electronic Information Resources By Lecturers in ...

    African Journals Online (AJOL)

    This study assesses the use of information resources, specifically, electronic databases by lecturers/teachers in Universities and Colleges of Education in South Western Nigeria. Information resources are central to teachers' education. It provides lecturers/teachers access to information that enhances research and ...

  18. Discipline, availability of electronic resources and the use of Finnish National Electronic Library - FinELib

    Directory of Open Access Journals (Sweden)

    Sanna Torma

    2004-01-01

    Full Text Available This study elaborated relations between digital library use by university faculty, users' discipline and the availability of key resources in the Finnish National Electronic Library (FinELib, Finnish national digital library, by using nationwide representative survey data. The results show that the perceived availability of key electronic resources by researchers in FinELib was a stronger predictor of the frequency and purpose of use of its services than users' discipline. Regardless of discipline a good perceived provision of central resources led to a more frequent use of FinELib. The satisfaction with the services did not vary with the discipline, but with the perceived availability of resources.

  19. The Role of the Acquisitions Librarian in Electronic Resources Management

    Science.gov (United States)

    Pomerantz, Sarah B.

    2010-01-01

    With the ongoing shift to electronic formats for library resources, acquisitions librarians, like the rest of the profession, must adapt to the rapidly changing landscape of electronic resources by keeping up with trends and mastering new skills related to digital publishing, technology, and licensing. The author sought to know what roles…

  20. Analysis of Pedagogic Potential of Electronic Educational Resources with Elements of Autodidactics

    Directory of Open Access Journals (Sweden)

    Igor A.

    2018-03-01

    Full Text Available Introduction: in recent years didactic properties of electronic educational resources undergo considerable changes, nevertheless, the question of studying of such complete phenomenon as “an electronic educational resource with autodidactics elements” remains open, despite sufficient scientific base of researches of the terms making this concept. Article purpose – determination of essence of electronic educational resources with autodidactics elements. Materials and Methods: the main method of research was the theoretical analysis of the pedagogical and psychological literature on the problem under study. We used the theoretical (analysis, synthesis, comparison and generalization methods, the method of interpretation, pedagogical modeling, and empirical methods (observation, testing, conversation, interview, analysis of students’ performance, pedagogical experiment, peer review. Results: we detected the advantages of electronic educational resources in comparison with traditional ones. The concept of autodidactics as applied to the subject of research is considered. Properties of electronic educational resources with a linear and nonlinear principle of construction are studied.The influence of the principle of construction on the development of the learners’ qualities is shown. We formulated an integral definition of electronic educational resources with elements of autodidactics, namely, the variability, adaptivity and cyclicity of training. A model of the teaching-learning process with electronic educational resources is developed. Discussion and Conclusions: further development of a problem will allow to define whether electronic educational resources with autodidactics elements pedagogical potential for realization of educational and self-educational activity of teachers have, to modify technological procedures taking into account age features of students, their specialties and features of the organization of process of training of

  1. Preservation and conservation of electronic information resources of ...

    African Journals Online (AJOL)

    The major holdings of the broadcast libraries of the Nigerian Television Authority (NTA) are electronic information resources; therefore, providing safe places for general management of these resources have aroused interest in the industry in Nigeria for sometimes. The need to study the preservation and conservation of ...

  2. Building an electronic resource collection a practical guide

    CERN Document Server

    Lee, Stuart D

    2004-01-01

    This practical book guides information professionals step-by-step through building and managing an electronic resource collection. It outlines the range of electronic products currently available in abstracting and indexing, bibliographic, and other services and then describes how to effectively select, evaluate and purchase them.

  3. Analysis of Human Resources Management Strategy in China Electronic Commerce Enterprises

    Science.gov (United States)

    Shao, Fang

    The paper discussed electronic-commerce's influence on enterprise human resources management, proposed and proved the human resources management strategy which electronic commerce enterprise should adopt from recruitment strategy to training strategy, keeping talent strategy and other ways.

  4. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  5. Using XML Technologies to Organize Electronic Reference Resources

    OpenAIRE

    Huser, Vojtech; Del Fiol, Guilherme; Rocha, Roberto A.

    2005-01-01

    Provision of access to reference electronic resources to clinicians is becoming increasingly important. We have created a framework for librarians to manage access to these resources at an enterprise level, rather than at the individual hospital libraries. We describe initial project requirements, implementation details, and some preliminary results.

  6. Electronic Resources and Mission Creep: Reorganizing the Library for the Twenty-First Century

    Science.gov (United States)

    Stachokas, George

    2009-01-01

    The position of electronic resources librarian was created to serve as a specialist in the negotiation of license agreements for electronic resources, but mission creep has added more functions to the routine work of electronic resources such as cataloging, gathering information for collection development, and technical support. As electronic…

  7. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  8. Electronic Resources Management System: Recommendation Report 2017

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    This recommendation report provides an overview of the selection process for the new Electronic Resources Management System. The library has decided to move away from Innovative Interfaces Millennium ERM module. The library reviewed 3 system

  9. The Internet School of Medicine: use of electronic resources by medical trainees and the reliability of those resources.

    Science.gov (United States)

    Egle, Jonathan P; Smeenge, David M; Kassem, Kamal M; Mittal, Vijay K

    2015-01-01

    Electronic sources of medical information are plentiful, and numerous studies have demonstrated the use of the Internet by patients and the variable reliability of these sources. Studies have investigated neither the use of web-based resources by residents, nor the reliability of the information available on these websites. A web-based survey was distributed to surgical residents in Michigan and third- and fourth-year medical students at an American allopathic and osteopathic medical school and a Caribbean allopathic school regarding their preferred sources of medical information in various situations. A set of 254 queries simulating those faced by medical trainees on rounds, on a written examination, or during patient care was developed. The top 5 electronic resources cited by the trainees were evaluated for their ability to answer these questions accurately, using standard textbooks as the point of reference. The respondents reported a wide variety of overall preferred resources. Most of the 73 responding medical trainees favored textbooks or board review books for prolonged studying, but electronic resources are frequently used for quick studying, clinical decision-making questions, and medication queries. The most commonly used electronic resources were UpToDate, Google, Medscape, Wikipedia, and Epocrates. UpToDate and Epocrates had the highest percentage of correct answers (47%) and Wikipedia had the lowest (26%). Epocrates also had the highest percentage of wrong answers (30%), whereas Google had the lowest percentage (18%). All resources had a significant number of questions that they were unable to answer. Though hardcopy books have not been completely replaced by electronic resources, more than half of medical students and nearly half of residents prefer web-based sources of information. For quick questions and studying, both groups prefer Internet sources. However, the most commonly used electronic resources fail to answer clinical queries more than half

  10. ANALYTICAL REVIEW OF ELECTRONIC RESOURCES FOR THE STUDY OF LATIN

    Directory of Open Access Journals (Sweden)

    Olena Yu. Balalaieva

    2014-04-01

    Full Text Available The article investigates the current state of development of e-learning content in the Latin language. It is noted that the introduction of ICT in the educational space has expanded the possibility of studying Latin, opened access to digital libraries resources, made it possible to use scientific and educational potential and teaching Latin best practices of world's leading universities. A review of foreign and Ukrainian information resources and electronic editions for the study of Latin is given. Much attention was paid to the didactic potential of local and online multimedia courses of Latin, electronic textbooks, workbooks of interactive tests and exercises, various dictionaries and software translators, databases and digital libraries. Based on analysis of the world market of educational services and products the main trends in the development of information resources and electronic books are examined. It was found that multimedia courses with interactive exercises or workbooks with interactive tests, online dictionaries and translators are the most widely represented and demanded. The noticeable lagging of Ukrainian education and computer linguistics in quantitative and qualitative measures in this industry is established. The obvious drawback of existing Ukrainian resources and electronic editions for the study of Latin is their noninteractive nature. The prospects of e-learning content in Latin in Ukraine are outlined.

  11. Elektronik Bilgi Kaynaklarının Seçimi / Selection of Electronic Information Resources

    Directory of Open Access Journals (Sweden)

    Pınar Al

    2003-04-01

    Full Text Available For many years, library users have used only from the printed media in order to get the information that they have needed. Today with the widespread use of the Web and the addition of electronic information resources to library collections, the use of information in the electronic environment as well as in printed media is started to be used. In time, such types of information resources as, electronic journals, electronic books, electronic encyclopedias, electronic dictionaries and electronic theses have been added to library collections. In this study, selection criteria that can be used for electronic information resources are discussed and suggestions are provided for libraries that try to select electronic information resources for their collections.

  12. Access to electronic resources by visually impaired people

    Directory of Open Access Journals (Sweden)

    Jenny Craven

    2003-01-01

    Full Text Available Research into access to electronic resources by visually impaired people undertaken by the Centre for Research in Library and Information Management has not only explored the accessibility of websites and levels of awareness in providing websites that adhere to design for all principles, but has sought to enhance understanding of information seeking behaviour of blind and visually impaired people when using digital resources.

  13. Library training to promote electronic resource usage

    DEFF Research Database (Denmark)

    Frandsen, Tove Faber; Tibyampansha, Dativa; Ibrahim, Glory

    2017-01-01

    Purpose: Increasing the usage of electronic resources is an issue of concern for many libraries all over the world. Several studies stress the importance of information literacy and instruction in order to increase the usage. Design/methodology/approach: The present article presents the results...

  14. Why and How to Measure the Use of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Jean Bernon

    2008-11-01

    Full Text Available A complete overview of library activity implies a complete and reliable measurement of the use of both electronic resources and printed materials. This measurement is based on three sets of definitions: document types, use types and user types. There is a common model of definitions for printed materials, but a lot of questions and technical issues remain for electronic resources. In 2006 a French national working group studied these questions. It relied on the COUNTER standard, but found it insufficient and pointed out the need for local tools such as web markers and deep analysis of proxy logs. Within the French national consortium COUPERIN, a new working group is testing ERMS, SUSHI standards, Shibboleth authentication, along with COUNTER standards, to improve the counting of the electronic resources use. At this stage this counting is insufficient and its improvement will be a European challenge for the future.

  15. Euler European Libraries and Electronic Resources in Mathematical Sciences

    CERN Document Server

    The Euler Project. Karlsruhe

    The European Libraries and Electronic Resources (EULER) Project in Mathematical Sciences provides the EulerService site for searching out "mathematical resources such as books, pre-prints, web-pages, abstracts, proceedings, serials, technical reports preprints) and NetLab (for Internet resources), this outstanding engine is capable of simple, full, and refined searches. It also offers a browse option, which responds to entries in the author, keyword, and title fields. Further information about the Project is provided at the EULER homepage.

  16. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  17. Effects of Electronic Information Resources Skills Training for Lecturers on Pedagogical Practices and Research Productivity

    Science.gov (United States)

    Bhukuvhani, Crispen; Chiparausha, Blessing; Zuvalinyenga, Dorcas

    2012-01-01

    Lecturers use various electronic resources at different frequencies. The university library's information literacy skills workshops and seminars are the main sources of knowledge of accessing electronic resources. The use of electronic resources can be said to have positively affected lecturers' pedagogical practices and their work in general. The…

  18. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  19. Electronic Commerce Resource Centers. An Industry--University Partnership.

    Science.gov (United States)

    Gulledge, Thomas R.; Sommer, Rainer; Tarimcilar, M. Murat

    1999-01-01

    Electronic Commerce Resource Centers focus on transferring emerging technologies to small businesses through university/industry partnerships. Successful implementation hinges on a strategic operating plan, creation of measurable value for customers, investment in customer-targeted training, and measurement of performance outputs. (SK)

  20. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  1. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  2. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  3. USE OF ELECTRONIC EDUCATIONAL RESOURCES WHEN TRAINING IN WORK WITH SPREADSHEETS

    Directory of Open Access Journals (Sweden)

    Х А Гербеков

    2017-12-01

    Full Text Available Today the tools for maintaining training courses based on opportunities of information and communication technologies are developed. Practically in all directions of preparation and on all subject matters electronic textbook and self-instruction manuals are created. Nevertheless the industry of computer educational and methodical materials actively develops and gets more and more areas of development and introduction. In this regard more and more urgent is a problem of development of the electronic educational resources adequate to modern educational requirements. Creation and the organization of training courses with use of electronic educational resources in particular on the basis of Internet technologies remains a difficult methodical task.In article the questions connected with development of electronic educational resources for use when studying the substantial line “Information technologies” of a school course of informatics in particular for studying of spreadsheets are considered. Also the analysis of maintenance of a school course and the unified state examination from the point of view of representation of task in him corresponding to the substantial line of studying “Information technologies” on mastering technology of information processing in spreadsheets and the methods of visualization given by means of charts and schedules is carried out.

  4. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  5. Analytical Study of Usage of Electronic Information Resources at Pharmacopoeial Libraries in India

    Directory of Open Access Journals (Sweden)

    Sunil Tyagi

    2014-02-01

    Full Text Available The objective of this study is to know the rate and purpose of the use of e-resource by the scientists at pharmacopoeial libraries in India. Among other things, this study examined the preferences of the scientists toward printed books and journals, electronic information resources, and pattern of using e-resources. Non-probability sampling specially accidental and purposive technique was applied in the collection of primary data through administration of user questionnaire. The sample respondents chosen for the study consists of principle scientific officer, senior scientific officer, scientific officer, and scientific assistant of different division of the laboratories, namely, research and development, pharmaceutical chemistry, pharmacovigilance, pharmacology, pharmacogonosy, and microbiology. The findings of the study reveal the personal experiences and perceptions they have had on practice and research activity using e-resource. The major findings indicate that of the total anticipated participants, 78% indicated that they perceived the ability to use computer for electronic information resources. The data analysis shows that all the scientists belonging to the pharmacopoeial libraries used electronic information resources to address issues relating to drug indexes and compendia, monographs, drugs obtained through online databases, e-journals, and the Internet sources—especially polices by regulatory agencies, contacts, drug promotional literature, and standards.

  6. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  7. Page 170 Use of Electronic Resources by Undergraduates in Two ...

    African Journals Online (AJOL)

    undergraduate students use electronic resources such as NUC virtual library, HINARI, ... web pages articles from magazines, encyclopedias, pamphlets and other .... of Nigerian university libraries have Internet connectivity, some of the system.

  8. Model of e-learning with electronic educational resources of new generation

    Directory of Open Access Journals (Sweden)

    A. V. Loban

    2017-01-01

    Full Text Available Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with electronic educational resource of new generation is developed, conditionally decomposed into three basic components: the formalization model of the course in the form of the thesaurusclassifier (“Author of e-resource”, the model of learning as management (“Coordination. Consultation. Control”, the learning model with the thesaurus-classifier (“Student”. Model “Author of e-resource” allows the student to achieve completeness, high degree of didactic elaboration and structuring of the studied material in triples of variants: modules of education information, practical task and control tasks; the result of the student’s (author’s of e-resource activity is the thesaurus-classifier. Model of learning as management is based on the principle of personal orientation of learning in computer environment and determines the logic of interaction between the lecturer and the student when determining the triple of variants individually for each student; organization of a dialogue between the lecturer and the student for consulting purposes; personal control of the student’s success (report generation and iterative search for the concept of the class assignment in the thesaurus-classifier before acquiring the required level of training. Model “Student” makes it possible to concretize the learning tasks in relation to the personality of the student and to the training level achieved; the assumption of the lecturer about the level of training of a

  9. A survey of the use of electronic scientific information resources among medical and dental students

    Directory of Open Access Journals (Sweden)

    Aarnio Matti

    2006-05-01

    Full Text Available Abstract Background To evaluate medical and dental students' utilization of electronic information resources. Methods A web survey sent to 837 students (49.9% responded. Results Twenty-four per cent of medical students and ninteen per cent of dental students searched MEDLINE 2+ times/month for study purposes, and thiry-two per cent and twenty-four per cent respectively for research. Full-text articles were used 2+ times/month by thirty-three per cent of medical and ten per cent of dental students. Twelve per cent of respondents never utilized either MEDLINE or full-text articles. In multivariate models, the information-searching skills among students were significantly associated with use of MEDLINE and full-text articles. Conclusion Use of electronic resources differs among students. Forty percent were non-users of full-text articles. Information-searching skills are correlated with the use of electronic resources, but the level of basic PC skills plays not a major role in using these resources. The student data shows that adequate training in information-searching skills will increase the use of electronic information resources.

  10. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  11. Access to electronic information resources by students of federal ...

    African Journals Online (AJOL)

    The paper discusses access to electronic information resources by students of Federal Colleges of Education in Eha-Amufu and Umunze. Descriptive survey design was used to investigate sample of 526 students. Sampling technique used was a Multi sampling technique. Data for the study were generated using ...

  12. Adoption and use of electronic information resources by medical ...

    African Journals Online (AJOL)

    This study investigated the adoption and use of electronic information resources by medical science students of the University of Benin. The descriptive survey research design was adopted for the study and 390 students provided the data. Data collected were analysed with descriptive Statistics(Simple percentage and ...

  13. Where Do Electronic Books Fit in the College Research Arsenal of Resources?

    Science.gov (United States)

    Barbier, Patricia

    2007-01-01

    Student use of electronic books has become an accepted supplement to traditional resources. Student use and satisfaction was monitored through an online course discussion board. Increased use of electronic books indicate this service is an accepted supplement to the print book collection.

  14. The Defense Resource Allocation Process

    National Research Council Canada - National Science Library

    Keller, William

    1997-01-01

    Above all, this book is about DECISION MAKING. In particular, it attempts to describe the formalized process by which we in the United States make and implement decisions about resources for our national security...

  15. Antioxidant defense in quiescent cells determines selectivity of electron transport chain inhibition-induced cell death

    Czech Academy of Sciences Publication Activity Database

    Blecha, Jan; Novais, Silvia Magalhaes; Rohlenová, Kateřina; Novotná, Eliška; Lettlová, Sandra; Schmitt, S.; Zischka, H.; Neužil, Jiří; Rohlena, Jakub

    2017-01-01

    Roč. 112, NOV 2017 (2017), s. 253-266 ISSN 0891-5849 R&D Projects: GA ČR GA16-22823S; GA ČR GA17-20904S; GA ČR GA16-12719S; GA MZd(CZ) NV16-31604A; GA MŠk(CZ) LM2015062; GA MŠk(CZ) LQ1604; GA MŠk(CZ) ED1.1.00/02.0109 Institutional support: RVO:86652036 Keywords : Electron transport chain * Supercomplexes * Antioxidant defense * SOD2 Subject RIV: EB - Genetics ; Molecular Biology OBOR OECD: Biochemistry and molecular biology Impact factor: 5.606, year: 2016

  16. THE PLANNING, PROGRAMING, BUDGETING SYSTEM AND ITS IMPLEMENTATION IN THE SERBIAN MINISTRY OF DEFENSE

    Directory of Open Access Journals (Sweden)

    Sasa RADUSKI

    2010-01-01

    Full Text Available The main purpose of introducing the PPBES to the Serbian Ministry of Defense and the Serbian Armed Forces is to provide a rational management of resources and to maintain and build capacity of the Ministry and the Serbian Armed Forces in order to achieve their goals, objectives and missions.Expected results of implementation of the PPBES are reflected in increasing the efficiency and rationalization of the defense planning to a higher level, ensuring compatibility with defense planning and budgeting system of the state and developing a foundation for the effective management of defense resources.

  17. Strategic Planning for Electronic Resources Management: A Case Study at Gustavus Adolphus College

    Science.gov (United States)

    Hulseberg, Anna; Monson, Sarah

    2009-01-01

    Electronic resources, the tools we use to manage them, and the needs and expectations of our users are constantly evolving; at the same time, the roles, responsibilities, and workflow of the library staff who manage e-resources are also in flux. Recognizing a need to be more intentional and proactive about how we manage e-resources, the…

  18. REVIEW OF MOODLE PLUGINS FOR DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES FROM LANGUAGE DISCIPLINES

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2015-09-01

    Full Text Available Today the problem of designing multimedia electronic educational resources from language disciplines in Moodle is very important. This system has a lot of different, powerful resources, plugins to facilitate the learning of students with language disciplines. This article presents an overview and comparative analysis of the five Moodle plugins for designing multimedia electronic educational resources from language disciplines. There have been considered their key features and functionality in order to choose the best for studying language disciplines in the Moodle. Plugins are compared by a group of experts according to the criteria: efficiency, functionality and easy use. For a comparative analysis of the plugins it is used the analytic hierarchy process.

  19. Modern ICT Tools: Online Electronic Resources Sharing Using Web ...

    African Journals Online (AJOL)

    Modern ICT Tools: Online Electronic Resources Sharing Using Web 2.0 and Its Implications For Library And Information Practice In Nigeria. ... The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader). If you would like more ...

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  1. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    Directory of Open Access Journals (Sweden)

    Anton M. Avramchuk

    2017-10-01

    Full Text Available The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system should be assessed. Developed a model for the development of the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system, which is based on the main scientific approaches, used in adult education, and consists of five blocks: target, informative, technological, diagnostic and effective.

  2. Developing Humanities Collections in the Digital Age: Exploring Humanities Faculty Engagement with Electronic and Print Resources

    Science.gov (United States)

    Kachaluba, Sarah Buck; Brady, Jessica Evans; Critten, Jessica

    2014-01-01

    This article is based on quantitative and qualitative research examining humanities scholars' understandings of the advantages and disadvantages of print versus electronic information resources. It explores how humanities' faculty members at Florida State University (FSU) use print and electronic resources, as well as how they perceive these…

  3. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  4. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  5. Electronic resource management systems a workflow approach

    CERN Document Server

    Anderson, Elsa K

    2014-01-01

    To get to the bottom of a successful approach to Electronic Resource Management (ERM), Anderson interviewed staff at 11 institutions about their ERM implementations. Among her conclusions, presented in this issue of Library Technology Reports, is that grasping the intricacies of your workflow-analyzing each step to reveal the gaps and problems-at the beginning is crucial to selecting and implementing an ERM. Whether the system will be used to fill a gap, aggregate critical data, or replace a tedious manual process, the best solution for your library depends on factors such as your current soft

  6. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  7. Electronic Resource Management System. Vernetzung von Lizenzinformationen

    Directory of Open Access Journals (Sweden)

    Michaela Selbach

    2014-12-01

    Full Text Available In den letzten zehn Jahren spielen elektronische Ressourcen im Bereich der Erwerbung eine zunehmend wichtige Rolle: Eindeutig lässt sich hier ein Wandel in den Bibliotheken (fort vom reinen Printbestand zu immer größeren E-Only-Beständen feststellen. Die stetig wachsende Menge an E-Ressourcen und deren Heterogenität stellt Bibliotheken vor die Herausforderung, die E-Ressourcen effizient zu verwalten. Nicht nur Bibliotheken, sondern auch verhandlungsführende Institutionen von Konsortial- und Allianzlizenzen benötigen ein geeignetes Instrument zur Verwaltung von Lizenzinformationen, welches den komplexen Anforderungen moderner E-Ressourcen gerecht wird. Die Deutsche Forschungsgemeinschaft (DFG unterstützt ein Projekt des Hochschulbibliothekszentrums des Landes Nordrhein-Westfalen (hbz, der Universitätsbibliothek Freiburg, der Verbundzentrale des Gemeinsamen Bibliotheksverbundes (GBV und der Universitätsbibliothek Frankfurt, in dem ein bundesweit verfügbares Electronic Ressource Managementsystem (ERMS aufgebaut werden soll. Ein solches ERMS soll auf Basis einer zentralen Knowledge Base eine einheitliche Nutzung von Daten zur Lizenzverwaltung elektronischer Ressourcen auf lokaler, regionaler und nationaler Ebene ermöglichen. Statistische Auswertungen, Rechteverwaltung für alle angeschlossenen Bibliotheken, kooperative Datenpflege sowie ein über standardisierte Schnittstellen geführter Datenaustausch stehen bei der Erarbeitung der Anforderungen ebenso im Fokus wie die Entwicklung eines Daten- und Funktionsmodells. In the last few years the importance of electronic resources in library acquisitions has increased significantly. There has been a shift from mere print holdings to both e- and print combinations and even e-only subscriptions. This shift poses a double challenge for libraries: On the one hand they have to provide their e-resource collections to library users in an appealing way, on the other hand they have to manage these

  8. The Electron Microscopy Outreach Program: A Web-based resource for research and education.

    Science.gov (United States)

    Sosinsky, G E; Baker, T S; Hand, G; Ellisman, M H

    1999-01-01

    We have developed a centralized World Wide Web (WWW)-based environment that serves as a resource of software tools and expertise for biological electron microscopy. A major focus is molecular electron microscopy, but the site also includes information and links on structural biology at all levels of resolution. This site serves to help integrate or link structural biology techniques in accordance with user needs. The WWW site, called the Electron Microscopy (EM) Outreach Program (URL: http://emoutreach.sdsc.edu), provides scientists with computational and educational tools for their research and edification. In particular, we have set up a centralized resource containing course notes, references, and links to image analysis and three-dimensional reconstruction software for investigators wanting to learn about EM techniques either within or outside of their fields of expertise. Copyright 1999 Academic Press.

  9. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  10. Technical Communicator: A New Model for the Electronic Resources Librarian?

    Science.gov (United States)

    Hulseberg, Anna

    2016-01-01

    This article explores whether technical communicator is a useful model for electronic resources (ER) librarians. The fields of ER librarianship and technical communication (TC) originated and continue to develop in relation to evolving technologies. A review of the literature reveals four common themes for ER librarianship and TC. While the…

  11. 32 CFR 215.9 - Providing military resources to civil authorities.

    Science.gov (United States)

    2010-07-01

    ... requests for firefighting assistance to DSA. (4) Request from civil law enforcement agencies for training... 32 National Defense 2 2010-07-01 2010-07-01 false Providing military resources to civil... DEFENSE (CONTINUED) MISCELLANEOUS EMPLOYMENT OF MILITARY RESOURCES IN THE EVENT OF CIVIL DISTURBANCES...

  12. Searching the Skies: the Legacy of the United States Cold War Defense Radar Program

    National Research Council Canada - National Science Library

    Winkler, David

    1997-01-01

    The Department of Defense (DOD) Legacy Resource Management Program was established under the Defense Appropriations Act of 1991 to determine how to better integrate the conservation of irreplaceable biological, cultural...

  13. MODEL OF AN ELECTRONIC EDUCATIONAL RESOURCE OF NEW GENERATION

    Directory of Open Access Journals (Sweden)

    Anatoliy V. Loban

    2016-01-01

    Full Text Available The mathematical structure of the modular architecture of an electronic educational resource (EER of new generation, which allows to decompose the process of studying the subjects of the course at a hierarchically ordered set of data (knowledge and procedures for manipulating them, to determine the roles of participants of process of training of and technology the development and use of EOR in the study procrate.

  14. Cultural Resource Predictive Modeling

    Science.gov (United States)

    2017-10-01

    CR cultural resource CRM cultural resource management CRPM Cultural Resource Predictive Modeling DoD Department of Defense ESTCP Environmental...resource management ( CRM ) legal obligations under NEPA and the NHPA, military installations need to demonstrate that CRM decisions are based on objective...maxim “one size does not fit all,” and demonstrate that DoD installations have many different CRM needs that can and should be met through a variety

  15. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  16. A Study of Security Awareness Information Delivery within the Defense Intelligence Community

    Science.gov (United States)

    Krasley, Paul F.

    2011-01-01

    Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…

  17. Choosing What to Protect When Attacker Resources and Asset Valuations are Uncertain

    Directory of Open Access Journals (Sweden)

    Kjell Hausken

    2014-01-01

    Full Text Available The situation has been modelled where the attacker's resources are unknown to the defender. Protecting assets presupposes that the defender has some information on the attacker's resource capabilities. An attacker targets one of two assets. The attacker's resources and valuations of these assets are drawn probabilistically. We specify when the isoutility curves are upward sloping (the defender prefers to invest less in defense, thus leading to higher probabilities of success for attacks on both assets or downward sloping (e.g. when one asset has a low value or high unit defense cost. This stands in contrast to earlier research and results from the uncertainty regarding the level of the attacker's resources. We determine which asset the attacker targets depending on his type, unit attack costs, the contest intensity, and investment in defense. A two stage game is considered, where the defender moves first and the attacker moves second. When both assets are equivalent and are treated equivalently by both players, an interior equilibrium exists when the contest intensity is low, and a corner equilibrium with no defense exists when the contest intensity is large and the attacker holds large resources. Defense efforts are inverse U shaped in the attacker's resources. (original abstract

  18. Light-dependent expression of flg22-induced defense genes in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Satoshi eSano

    2014-10-01

    Full Text Available Chloroplasts have been reported to generate retrograde immune signals that activate defense gene expression in the nucleus. However, the roles of light and photosynthesis in plant immunity remain largely elusive. In this study, we evaluated the effects of light on the expression of defense genes induced by flg22, a peptide derived from bacterial flagellins which acts as a potent elicitor in plants. Whole-transcriptome analysis of flg22-treated Arabidopsis thaliana seedlings under light and dark conditions for 30 min revealed that a number of (30% genes strongly induced by flg22 (>4.0 require light for their rapid expression, whereas flg22-repressed genes include a significant number of genes that are down-regulated by light. Furthermore, light is responsible for the flg22-induced accumulation of salicylic acid, indicating that light is indispensable for basal defense responses in plants. To elucidate the role of photosynthesis in defense, we further examined flg22-induced defense gene expression in the presence of specific inhibitors of photosynthetic electron transport: 3-(3,4-dichlorophenyl-1,1-dimethylurea (DCMU and 2,5-dibromo-3-methyl-6-isopropyl-benzoquinone (DBMIB. Light-dependent expression of defense genes was largely suppressed by DBMIB, but only partially suppressed by DCMU. These findings suggest that photosynthetic electron flow plays a role in controling the light-dependent expression of flg22-inducible defense genes.

  19. GUIDELINES FOR EVALUATION OF PSYCHOLOGICAL AND PEDAGOGICAL QUALITY CHARACTERISTICS OF ELECTRONIC EDUCATIONAL RESOURCES

    Directory of Open Access Journals (Sweden)

    Galina P. Lavrentieva

    2014-05-01

    Full Text Available The article highlights the causes of insufficient effective use of electronic learning resources and sets out the guidelines on ways to solve the aforementioned problems. The set of didactic, methodical, psychological, pedagogical, design and ergonomic quality requirements is considered for evaluation, selection and application of information and communication technologies in the educational process. The most appropriate mechanisms for the ICT introduction into the learning process are disclosed as it should meet the specific learning needs of the student and the objectives of the educational process. The guidance for psycho-educational assessment of quality of electronic educational resources is provided. It is argued that the effectiveness of the ICT use is to be improved by means of quality evaluation mechanisms involved into the educational process.

  20. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    National Research Council Canada - National Science Library

    Givens, Mark

    2004-01-01

    In order to ensure the confidentially, integrity, and availability of networked resources operating on the Global Information Grid, the Department of Defense has incorporated a "Defense-in-Depth" posture...

  1. Availability, Use and Constraints to Use of Electronic Information Resources by Postgraduates Students at the University of Ibadan

    Directory of Open Access Journals (Sweden)

    Dare Samuel Adeleke

    2017-12-01

    Full Text Available Availability, awareness and use of electronic resources provide access to authoritative, reliable, accurate and timely access to information. The use of electronic information resources (EIRs can enable innovation in teaching and increase timeliness in research of postgraduate students which will eventual result into encouragement of the expected research-led enquiry in this digital age. The study adopted a descriptive survey design. Samples of 300 of postgraduate students within seven out 13 Faculties were randomly selected. Data were collected using questionnaire designed to elicit response from respondents and data were analyzed using descriptive statistics methods percentages, mean, and standard deviation. Results indicated that internet was ranked most available and used in the university. Low level of usage of electronic resources, in particular, full texts data bases is linked to a number of constraints: Interrupted power supply was ranked highest among other factors as speed and capacity of computers, retrieval of records with high recall and low precision, retrieving records relevant to information need, lack of knowledge of search techniques to retrieve information effectively, non possession of requisite IT skills and problems accessing the internet. The study recommended that usage of electronic resources be made compulsory, intensifying awareness campaigns concerning the availability, training on use of electronic resources and the problem of power outage be addressed.

  2. Control of Carbon Assimilation and Partitioning by Jasmonate: An Accounting of Growth–Defense Tradeoffs

    Directory of Open Access Journals (Sweden)

    Nathan E. Havko

    2016-01-01

    Full Text Available Plant growth is often constrained by the limited availability of resources in the microenvironment. Despite the continuous threat of attack from insect herbivores and pathogens, investment in defense represents a lost opportunity to expand photosynthetic capacity in leaves and absorption of nutrients and water by roots. To mitigate the metabolic expenditure on defense, plants have evolved inducible defense strategies. The plant hormone jasmonate (JA is a key regulator of many inducible defenses. Synthesis of JA in response to perceived danger leads to the deployment of a variety of defensive structures and compounds, along with a potent inhibition of growth. Genetic studies have established an important role for JA in mediating tradeoffs between growth and defense. However, several gaps remain in understanding of how JA signaling inhibits growth, either through direct transcriptional control of JA-response genes or crosstalk with other signaling pathways. Here, we highlight recent progress in uncovering the role of JA in controlling growth-defense balance and its relationship to resource acquisition and allocation. We also discuss tradeoffs in the context of the ability of JA to promote increased leaf mass per area (LMA, which is a key indicator of leaf construction costs and leaf life span.

  3. A Study on Developing Evaluation Criteria for Electronic Resources in Evaluation Indicators of Libraries

    Science.gov (United States)

    Noh, Younghee

    2010-01-01

    This study aimed to improve the current state of electronic resource evaluation in libraries. While the use of Web DB, e-book, e-journal, and other e-resources such as CD-ROM, DVD, and micro materials is increasing in libraries, their use is not comprehensively factored into the general evaluation of libraries and may diminish the reliability of…

  4. Priorities for a 21st-century defense: aligning u.s. Army environmental science and engineering officer resources with the department of defense strategic guidance.

    Science.gov (United States)

    Licina, Derek; Rufolo, Dennis; Story, Mike

    2013-01-01

    The recently published Department of Defense (DoD) strategic guidance highlights the need to ?shape a joint force for the future.? Supporting requirements to shape the joint force while the overall DoD force structure is reduced will be challenging. Fortunately, based on its unique training and experience, the Army Environmental Science and Engineering Officer (ESEO) profession is positioned today to fill anticipated joint public health requirements. Obtaining the U.S. Army Medical Department (AMEDD) approval to meet these requirements will have near-term consequences for the ESEO profession as some existing (albeit antiquated) authorizations may go unfilled. However, long-term dividends for the Medical Service Corps (MSC), AMEDD, Army, and DoD will be achieved by realigning critical resources to future joint and interagency requirements. Assigning ESEOs now to organizations such as the Theater Special Operations Commands (TSOCs), U.S. Agency for International Development (USAID), and the North Atlantic Treaty Organization (NATO) with perceived and real joint force health protection/public health requirements through unique means will ensure our profession remains relevant today and supports the joint force of tomorrow. 2013.

  5. DOD Electronic Commerce (EC)/Electronic Data Interchange (EDI) in contracting report

    Science.gov (United States)

    1993-12-01

    Use of Electronic Commerce (EC)/Electronic Data Interchange (EDI) to support Department of Defense (DoD) procurement processes has been under consideration for some time. A 1988 Deputy Secretary of Defense memo calls for maximum use of EDI, based on 10 years of DoD EDI investigation and experiments. In 1990, Defense Management Review Decision 941 stated, 'The strategic goal of DoD's current efforts is to provide the department with the capability to initiate, conduct, and maintain its external business related transactions and internal logistics, contracting, and financial activities without requiring the use of hard copy media.' The EC in Contracting PAT membership reflected a broad cross section of Military Services and Defense Agencies working on a full-time basis for 60 days. The diversity of the EC in Contracting PAT ensured that the needs and concerns of all DoD components were addressed during the creation of the report. The resultant plan, therefore, represents a comprehensive approach for implementing EC throughout the DoD.

  6. THE MODEL OF LINGUISTIC TEACHERS’ COMPETENCY DEVELOPMENT ON DESIGNING MULTIMEDIA ELECTRONIC EDUCATIONAL RESOURCES IN THE MOODLE SYSTEM

    OpenAIRE

    Anton M. Avramchuk

    2017-01-01

    The article is devoted to the problem of developing the competency of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system. The concept of "the competence of teachers of language disciplines on designing multimedia electronic educational resources in the Moodle system" is justified and defined. Identified and characterized the components by which the levels of the competency development of teachers of language disciplines on designing ...

  7. Determining the level of awareness of the physicians in using the variety of electronic information resources and the effecting factors.

    Science.gov (United States)

    Papi, Ahmad; Ghazavi, Roghayeh; Moradi, Salimeh

    2015-01-01

    Understanding of the medical society's from the types of information resources for quick and easy access to information is an imperative task in medical researches and management of the treatment. The present study was aimed to determine the level of awareness of the physicians in using various electronic information resources and the factors affecting it. This study was a descriptive survey. The data collection tool was a researcher-made questionnaire. The study population included all the physicians and specialty physicians of the teaching hospitals affiliated to Isfahan University of Medical Sciences and numbered 350. The sample size based on Morgan's formula was set at 180. The content validity of the tool was confirmed by the library and information professionals and the reliability was 95%. Descriptive statistics were used including the SPSS software version 19. On reviewing the need of the physicians to obtain the information on several occasions, the need for information in conducting the researches was reported by the maximum number of physicians (91.9%) and the usage of information resources, especially the electronic resources, formed 65.4% as the highest rate with regard to meeting the information needs of the physicians. Among the electronic information databases, the maximum awareness was related to Medline with 86.5%. Among the various electronic information resources, the highest awareness (43.3%) was related to the E-journals. The highest usage (36%) was also from the same source. The studied physicians considered the most effective deterrent in the use of electronic information resources as being too busy and lack of time. Despite the importance of electronic information resources for the physician's community, there was no comprehensive knowledge of these resources. This can lead to less usage of these resources. Therefore, careful planning is necessary in the hospital libraries in order to introduce the facilities and full capabilities of the

  8. Managing Selection for Electronic Resources: Kent State University Develops a New System to Automate Selection

    Science.gov (United States)

    Downey, Kay

    2012-01-01

    Kent State University has developed a centralized system that manages the communication and work related to the review and selection of commercially available electronic resources. It is an automated system that tracks the review process, provides selectors with price and trial information, and compiles reviewers' feedback about the resource. It…

  9. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  10. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli

    2012-01-01

    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources...... of Arabidopsis thaliana, coupled with 39 years of field data on aphid abundance, to (i) demonstrate that geographic patterns in a polymorphic defense locus (GS-ELONG) are strongly correlated with changes in the relative abundance of two specialist aphids; and (ii) demonstrate differential selection by the two...... aphids on GS-ELONG, using a multigeneration selection experiment. We thereby show a causal link between variation in abundance of the two specialist aphids and the geographic pattern at GS-ELONG, which highlights the potency of natural enemies as selective forces....

  11. End-of-life resource recovery from emerging electronic products

    DEFF Research Database (Denmark)

    Parajuly, Keshav; Habib, Komal; Cimpan, Ciprian

    2016-01-01

    Integrating product design with appropriate end-of-life (EoL) processing is widely recognized to have huge potentials in improving resource recovery from electronic products. In this study, we investigate both the product characteristics and EoL processing of robotic vacuum cleaner (RVC), as a case...... of emerging electronic product, in order to understand the recovery fate of different materials and its linkage to product design. Ten different brands of RVC were dismantled and their material composition and design profiles were studied. Another 125 RVCs (349 kg) were used for an experimental trial...... at a conventional ‘shred-and-separate’ type preprocessing plant in Denmark. A detailed material flow analysis was performed throughout the recycling chain. The results show a mismatch between product design and EoL processing, and the lack of practical implementation of ‘Design for EoL’ thinking. In the best...

  12. Use of electronic sales data to tailor nutrition education resources for an ethnically diverse population.

    Science.gov (United States)

    Eyles, H; Rodgers, A; Ni Mhurchu, C

    2010-02-01

    Nutrition education may be most effective when personally tailored. Individualised electronic supermarket sales data offer opportunities to tailor nutrition education using shopper's usual food purchases. The present study aimed to use individualised electronic supermarket sales data to tailor nutrition resources for an ethnically diverse population in a large supermarket intervention trial in New Zealand. Culturally appropriate nutrition education resources (i.e. messages and shopping lists) were developed with the target population (through two sets of focus groups) and ethnic researchers. A nutrient database of supermarket products was developed using retrospective sales data and linked to participant sales to allow tailoring by usual food purchases. Modified Heart Foundation Tick criteria were used to identify 'healthier' products in the database suitable for promotion in the resources. Rules were developed to create a monthly report listing the tailored and culturally targeted messages to be sent to each participant, and to produce automated, tailored shopping lists. Culturally targeted nutrition messages (n = 864) and shopping lists (n = 3 formats) were developed. The food and nutrient database (n = 3000 top-selling products) was created using 12 months of retrospective sales data, and comprised 60%'healthier' products. Three months of baseline sales data were used to determine usual food purchases. Tailored resources were successfully mailed to 123 Māori, 52 Pacific and 346 non-Māori non-Pacific participants over the 6-month trial intervention period. Electronic supermarket sales data can be used to tailor nutrition education resources for a large number of ethnically diverse supermarket shoppers.

  13. Availability, Level of Use and Constraints to Use of Electronic Resources by Law Lecturers in Public Universities in Nigeria

    Science.gov (United States)

    Amusa, Oyintola Isiaka; Atinmo, Morayo

    2016-01-01

    (Purpose) This study surveyed the level of availability, use and constraints to use of electronic resources among law lecturers in Nigeria. (Methodology) Five hundred and fifty-two law lecturers were surveyed and four hundred and forty-two responded. (Results) Data analysis revealed that the level of availability of electronic resources for the…

  14. A systematic review of portable electronic technology for health education in resource-limited settings.

    Science.gov (United States)

    McHenry, Megan S; Fischer, Lydia J; Chun, Yeona; Vreeman, Rachel C

    2017-08-01

    The objective of this study is to conduct a systematic review of the literature of how portable electronic technologies with offline functionality are perceived and used to provide health education in resource-limited settings. Three reviewers evaluated articles and performed a bibliography search to identify studies describing health education delivered by portable electronic device with offline functionality in low- or middle-income countries. Data extracted included: study population; study design and type of analysis; type of technology used; method of use; setting of technology use; impact on caregivers, patients, or overall health outcomes; and reported limitations. Searches yielded 5514 unique titles. Out of 75 critically reviewed full-text articles, 10 met inclusion criteria. Study locations included Botswana, Peru, Kenya, Thailand, Nigeria, India, Ghana, and Tanzania. Topics addressed included: development of healthcare worker training modules, clinical decision support tools, patient education tools, perceptions and usability of portable electronic technology, and comparisons of technologies and/or mobile applications. Studies primarily looked at the assessment of developed educational modules on trainee health knowledge, perceptions and usability of technology, and comparisons of technologies. Overall, studies reported positive results for portable electronic device-based health education, frequently reporting increased provider/patient knowledge, improved patient outcomes in both quality of care and management, increased provider comfort level with technology, and an environment characterized by increased levels of technology-based, informal learning situations. Negative assessments included high investment costs, lack of technical support, and fear of device theft. While the research is limited, portable electronic educational resources present promising avenues to increase access to effective health education in resource-limited settings, contingent

  15. 32 CFR 806b.29 - Sending personal information over electronic mail.

    Science.gov (United States)

    2010-07-01

    ... information over electronic mail. (a) Exercise caution before transmitting personal information over e-mail to... 32 National Defense 6 2010-07-01 2010-07-01 false Sending personal information over electronic mail. 806b.29 Section 806b.29 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR...

  16. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  17. SAGES: a suite of freely-available software tools for electronic disease surveillance in resource-limited settings.

    Directory of Open Access Journals (Sweden)

    Sheri L Lewis

    Full Text Available Public health surveillance is undergoing a revolution driven by advances in the field of information technology. Many countries have experienced vast improvements in the collection, ingestion, analysis, visualization, and dissemination of public health data. Resource-limited countries have lagged behind due to challenges in information technology infrastructure, public health resources, and the costs of proprietary software. The Suite for Automated Global Electronic bioSurveillance (SAGES is a collection of modular, flexible, freely-available software tools for electronic disease surveillance in resource-limited settings. One or more SAGES tools may be used in concert with existing surveillance applications or the SAGES tools may be used en masse for an end-to-end biosurveillance capability. This flexibility allows for the development of an inexpensive, customized, and sustainable disease surveillance system. The ability to rapidly assess anomalous disease activity may lead to more efficient use of limited resources and better compliance with World Health Organization International Health Regulations.

  18. Use and Cost of Electronic Resources in Central Library of Ferdowsi University Based on E-metrics

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Davarpanah

    2012-07-01

    Full Text Available The purpose of this study was to investigate the usage of electronic journals in Ferdowsi University, Iran based on e-metrics. The paper also aimed to emphasize the analysis of cost-benefit and the correlation between the journal impact factors and the usage data. In this study experiences of Ferdowsi University library on licensing and usage of electronic resources was evaluated by providing a cost-benefit analysis based on the cost and usage statistics of electronic resources. Vendor-provided data were also compared with local usage data. The usage data were collected by tracking web-based access locally, and by collecting vender-provided usage data. The data sources were one-year of vendor-supplied e-resource usage data such as Ebsco, Elsevier, Proquest, Emerald, Oxford and Springer and local usage data collected from the Ferdowsi university web server. The study found that actual usage values differ for vendor-provided data and local usage data. Elsevier has got the highest usage degree in searches, sessions and downloads. Statistics also showed that a small number of journals satisfy significant amount of use while the majority of journals were used less frequent and some were never used at all. The users preferred the PDF rather than HTML format. The data in subject profile suggested that the provided e-resources were best suited to certain subjects. There was no correlation between IF and electronic journal use. Monitoring the usage of e-resources gained increasing importance for acquisition policy and budget decisions. The article provided information about local metrics for the six surveyed vendors/publishers, e.g. usage trends, requests per package, cost per use as related to the scientific specialty of the university.

  19. "Homeland Defense: At Risk as a Result of Civil Support?"

    National Research Council Canada - National Science Library

    Brickhouse, Tonja

    2003-01-01

    This research effort is an attempt by the author to examine the broad area of military support to civil authorities and the potential for a significant demand on Department of Defense (DoD) resources...

  20. Building and Managing Electronic Resources in Digital Era in India with Special Reference to IUCAA and NIV, Pune: A Comparative Case Study

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2015-04-01

    This paper discusses and presents a comparative case study of two libraries in Pune, India, Inter-University Centre for Astronomy and Astrophysics and Information Centre and Library of National Institute of Virology (Indian Council of Medical Research). It compares how both libraries have managed their e-resource collections, including acquisitions, subscriptions, and consortia arrangements, while also developing a collection of their own resources, including pre-prints and publications, video lectures, and other materials in an institutional repository. This study illustrates how difficult it is to manage electronic resources in a developing country like India, even though electronic resources are used more than print resources. Electronic resource management can be daunting, but with a systematic approach, various problems can be solved, and use of the materials will be enhanced.

  1. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  2. Resource allocation in Copaifera langsdorffii (Fabaceae): how supra-annual fruiting affects plant traits and herbivory?

    Science.gov (United States)

    da Costa, Fernanda Vieira; de Queiroz, Antônio César Medeiros; Maia, Maria Luiza Bicalho; Júnior, Ronaldo Reis; Fagundes, Marcilio

    2016-06-01

    Plants have limited resources to invest in reproduction, vegetative growth and defense against herbivorous. Trade-off in resources allocation promotes changes in plant traits that may affect higher trophic levels. In this study, we evaluated the trade-off effect between years of high and low fruiting on the investment of resources for growth and defense, and their indirect effects on herbivory in Copaifera langsdorffii. Our questions were: (i) does the resource investment on reproduction causes a depletion in vegetative growth as predicted by the Carbon/Nutrient Balance hypothesis (CNBH), resulting in more availability of resources to be allocated for defense?, (ii) does the variation in resource allocation for growth and defense between years of high and low fruiting leads to indirect changes in herbivory? Thirty-five trees located in a Cerrado area were monitored during 2008 (year of high fruiting) and 2009 (year of no fruiting) to evaluate the differential investment in vegetative traits (biomass, growth and number of ramifications), plant defense (tannin concentration and plant hypersensitivity) and herbivory (galling attack and folivory). According to our first question, we observed that in the fruiting year, woody biomass negatively affected tannin concentration, indicating that fruit production restricted the resources that could be invested both in growth as in defense. In the same way, we observed an inter-annual variation in herbivorous attack, and found that plants with higher leaf biomass and tannin concentration, experienced higher galling attack and hypersensitive reaction, regardless years. These findings suggested that plants’ resistance to herbivory is a good proxy of plant defense and an effective defense strategy for C. langsdorffii, besides the evidence of indirect responses of the third trophic level, as postulated by the second question. In summary, the supra-annual fruiting pattern promoted several changes on plant development

  3. The US National Resources Defense Council/Soviet Academy of Sciences Nuclear Test Ban Verification Project

    International Nuclear Information System (INIS)

    Cochran, T.B.

    1989-01-01

    The first week in September 1987 was an extraordinary one for arms control verification. As part of the co-operative Test Ban Verification Project of the Natural Resources Defense Council (NRDC) and the Soviet Academy of Sciences, fourteen American scientists from the Scripps Institution of Oceanography (at the University of California- San Diego), University of Nevada-Reno and the University of Colorado went to the region of the Soviet's principal nuclear test site near Semipalatinsk. Together with their Soviet counterparts from the Institute of Physics of the Earth (IPE) in Moscow, they fired off three large chemical explosions. The purpose of these explosions was to demonstrate the sensitivity of the three seismic stations surrounding the test site, to study the efficiency with which high-frequency seismic waves propagate in the region, and to study differences between chemical explosions, nuclear explosions and earthquakes in order more firmly to establish procedures for verification of a nuclear test ban. This paper presents a review of the results of these experiments, an update on the status of the joint project, and a review of the significance of high frequency seismic data to test ban verification

  4. Natural selection on immune defense: A field experiment.

    Science.gov (United States)

    Langeloh, Laura; Behrmann-Godel, Jasminca; Seppälä, Otto

    2017-02-01

    Predicting the evolution of phenotypic traits requires an understanding of natural selection on them. Despite its indispensability in the fight against parasites, selection on host immune defense has remained understudied. Theory predicts immune traits to be under stabilizing selection due to associated trade-offs with other fitness-related traits. Empirical studies, however, report mainly positive directional selection. This discrepancy could be caused by low phenotypic variation in the examined individuals and/or variation in host resource level that confounds trade-offs in empirical studies. In a field experiment where we maintained Lymnaea stagnalis snails individually in cages in a lake, we investigated phenotypic selection on two immune defense traits, phenoloxidase (PO)-like activity and antibacterial activity, in hemolymph. We used a diverse laboratory population and manipulated snail resource level by limiting their food supply. For six weeks, we followed immune activity, growth, and two fitness components, survival and fecundity of snails. We found that PO-like activity and growth were under stabilizing selection, while antibacterial activity was under positive directional selection. Selection on immune traits was mainly driven by variation in survival. The form of selection on immune defense apparently depends on the particular trait, possibly due to its importance for countering the present parasite community. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  5. Cost and price auditing: effectiveness in the procurement of defense services in Spain

    Directory of Open Access Journals (Sweden)

    José Aguado Romero

    Full Text Available Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

  6. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  7. [Use of internet and electronic resources among Spanish intensivist physicians. First national survey].

    Science.gov (United States)

    Gómez-Tello, V; Latour-Pérez, J; Añón Elizalde, J M; Palencia-Herrejón, E; Díaz-Alersi, R; De Lucas-García, N

    2006-01-01

    Estimate knowledge and use habits of different electronic resources in a sample of Spanish intensivists: Internet, E-mail, distribution lists, and use of portable electronic devices. Self-applied questionnaire. A 50-question questionnaire was distributed among Spanish intensivists through the hospital marketing delegates of a pharmaceutical company and of electronic forums. A total of 682 questionnaires were analyzed (participation: 74%). Ninety six percent of those surveyed used Internet individually: 67% admitted training gap. Internet was the second source of clinical consultations most used (61%), slightly behind consultation to colleagues (65%). The pages consulted most were bibliographic databases (65%) and electronic professional journals (63%), with limited use of Evidence Based Medicine pages (19%). Ninety percent of those surveyed used e-mail regularly in the practice of their profession, although 25% admitted that were not aware of its possibilities. The use of E-mail decreased significantly with increase in age. A total of 62% of the intensivists used distribution lists. Of the rest, 42% were not aware of its existence and 32% admitted they had insufficient training to handle them. Twenty percent of those surveyed had portable electronic devices and 64% considered it useful, basically due to its rapid consultation at bedside. Female gender was a negative predictive factor of its use (OR 0.35; 95% CI 0.2-0.63; p=0.0002). A large majority of the Spanish intensivists use Internet and E-mail. E-mail lists and use of portable devices are still underused resources. There are important gaps in training and infrequent use of essential pages. There are specific groups that require directed educational policies.

  8. Model of e-learning with electronic educational resources of new generation

    OpenAIRE

    A. V. Loban; D. A. Lovtsov

    2017-01-01

    Purpose of the article: improving of scientific and methodical base of the theory of the е-learning of variability. Methods used: conceptual and logical modeling of the е-learning of variability process with electronic educational resource of new generation and system analysis of the interconnection of the studied subject area, methods, didactics approaches and information and communication technologies means. Results: the formalization complex model of the е-learning of variability with elec...

  9. Is Soviet Defense Policy Becoming Civilianized?

    Science.gov (United States)

    1990-08-01

    Larionov, a consultant to the institute, both at RAND and in Moscow; and Drs. Alexei Arbatov and Aleksandr Savelyev and several of their colleagues during...Soviet defense industry resources to civilian use is presented in Arthur J. Alexander , Perestroika and Change in Soviet Weapons Acquisition, The RAND...1986, especially pp. 101-102. 17 18 the more prominent younger specialists like Alexei Arbatov, Andrei Kokoshin, and Aleksandr Savelyev have long been

  10. Does investment in leaf defenses drive changes in leaf economic strategy? A focus on whole-plant ontogeny.

    Science.gov (United States)

    Mason, Chase M; Donovan, Lisa A

    2015-04-01

    Leaf defenses have long been studied in the context of plant growth rate, resource availability, and optimal investment theory. Likewise, one of the central modern paradigms of plant ecophysiology, the leaf economics spectrum (LES), has been extensively studied in the context of these factors across ecological scales ranging from global species data sets to temporal shifts within individuals. Despite strong physiological links between LES strategy and leaf defenses in structure, function, and resource investment, the relationship between these trait classes has not been well explored. This study investigates the relationship between leaf defenses and LES strategy across whole-plant ontogeny in three diverse Helianthus species known to exhibit dramatic ontogenetic shifts in LES strategy, focusing primarily on physical and quantitative chemical defenses. Plants were grown under controlled environmental conditions and sampled for LES and defense traits at four ontogenetic stages. Defenses were found to shift strongly with ontogeny, and to correlate strongly with LES strategy. More advanced ontogenetic stages with more conservative LES strategy leaves had higher tannin activity and toughness in all species, and higher leaf dry matter content in two of three species. Modeling results in two species support the conclusion that changes in defenses drive changes in LES strategy through ontogeny, and in one species that changes in defenses and LES strategy are likely independently driven by ontogeny. Results of this study support the hypothesis that leaf-level allocation to defenses might be an important determinant of leaf economic traits, where high investment in defenses drives a conservative LES strategy.

  11. Impact of Knowledge Resources Linked to an Electronic Health Record on Frequency of Unnecessary Tests and Treatments

    Science.gov (United States)

    Goodman, Kenneth; Grad, Roland; Pluye, Pierre; Nowacki, Amy; Hickner, John

    2012-01-01

    Introduction: Electronic knowledge resources have the potential to rapidly provide answers to clinicians' questions. We sought to determine clinicians' reasons for searching these resources, the rate of finding relevant information, and the perceived clinical impact of the information they retrieved. Methods: We asked general internists, family…

  12. Electronic Document Management: A Human Resource Management Case Study

    Directory of Open Access Journals (Sweden)

    Thomas Groenewald

    2004-11-01

    Full Text Available This case study serve as exemplar regarding what can go wrong with the implementation of an electronic document management system. Knowledge agility and knowledge as capital, is outlined against the backdrop of the information society and knowledge economy. The importance of electronic document management and control is sketched thereafter. The literature review is concluded with the impact of human resource management on knowledge agility, which includes references to the learning organisation and complexity theory. The intervention methodology, comprising three phases, follows next. The results of the three phases are presented thereafter. Partial success has been achieved with improving the human efficacy of electronic document management, however the client opted to discontinue the system in use. Opsomming Die gevalle studie dien as voorbeeld van wat kan verkeerd loop met die implementering van ’n elektroniese dokumentbestuur sisteem. Teen die agtergrond van die inligtingsgemeenskap en kennishuishouding word kennissoepelheid en kennis as kapitaal bespreek. Die literatuurstudie word afgesluit met die inpak van menslikehulpbronbestuur op kennissoepelheid, wat ook die verwysings na die leerorganisasie en kompleksietydsteorie insluit. Die metodologie van die intervensie, wat uit drie fases bestaan, volg daarna. Die resultate van die drie fases word vervolgens aangebied. Slegs gedeelte welslae is behaal met die verbetering van die menslike doeltreffendheid ten opsigte van elektroniese dokumentbestuur. Die klient besluit egter om nie voort te gaan om die huidige sisteem te gebruik nie.

  13. Space use of Amazonian poison frogs: Testing the reproductive resource defense hypothesis

    NARCIS (Netherlands)

    Poelman, E.H.; Dicke, M.

    2008-01-01

    In most Anuran species, space use includes a lek mating system with defense of a calling site for only a short time period during an individual's lifespan. In contrast, territoriality over a longer time period by one or both of the sexes has been reported in all studied dendrobatid frogs. In most

  14. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  15. Challenges in the implementation of an electronic surveillance system in a resource-limited setting: Alerta, in Peru

    Directory of Open Access Journals (Sweden)

    Soto Giselle

    2008-11-01

    Full Text Available Abstract Background Infectious disease surveillance is a primary public health function in resource-limited settings. In 2003, an electronic disease surveillance system (Alerta was established in the Peruvian Navy with support from the U.S. Naval Medical Research Center Detachment (NMRCD. Many challenges arose during the implementation process, and a variety of solutions were applied. The purpose of this paper is to identify and discuss these issues. Methods This is a retrospective description of the Alerta implementation. After a thoughtful evaluation according to the Centers for Disease Control and Prevention (CDC guidelines, the main challenges to implementation were identified and solutions were devised in the context of a resource-limited setting, Peru. Results After four years of operation, we have identified a number of challenges in implementing and operating this electronic disease surveillance system. These can be divided into the following categories: (1 issues with personnel and stakeholders; (2 issues with resources in a developing setting; (3 issues with processes involved in the collection of data and operation of the system; and (4 issues with organization at the central hub. Some of the challenges are unique to resource-limited settings, but many are applicable for any surveillance system. For each of these challenges, we developed feasible solutions that are discussed. Conclusion There are many challenges to overcome when implementing an electronic disease surveillance system, not only related to technology issues. A comprehensive approach is required for success, including: technical support, personnel management, effective training, and cultural sensitivity in order to assure the effective deployment of an electronic disease surveillance system.

  16. DefenseLink Feature: Zero Tolerance for Sexual Assault, Harassment;

    Science.gov (United States)

    Websites Employee Resources Gender Relations Academies Work to Prevent Assault, Harassment WASHINGTON, Dec . 13, 2007 - The Defense Department's Annual Report on Sexual Harassment and Violence at the U.S assault at the U.S. service academies during the 2006-2007 school year, officials are calling them a sign

  17. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Science.gov (United States)

    2010-07-01

    ... environment. 2001.23 Section 2001.23 National Defense Other Regulations Relating to National Defense... environment. (a) General. Classified national security information in the electronic environment shall be: (1... electronic environment cannot be marked in this manner, a warning shall be applied to alert users that the...

  18. [Bio-terrorism, bio-defense, bioethics].

    Science.gov (United States)

    Kottow, Miguel

    2003-01-01

    The terrorist attacks launched on September 11, 2001, ignited fear of further aggression with biological weapons, leading to a discourse and allocation of resources for both defensive and dissuasive/ offensive use in order to counteract such threats. Many such measures involved the investigation and production of biological agents, and the public health field has been called upon to participate in these strategic efforts. Participation by health programs is in moral contradiction with military tactics and should be limited to protecting the health of the purportedly threatened population, in itself a difficult task due to the numerous imponderable factors. The additional resources being made available to public health are largely conditioned on their strategic military application, leaving traditional public health care in its chronic state of insufficient funding and non-egalitarian allocation.

  19. Considering Point-of-Care Electronic Medical Resources in Lieu of Traditional Textbooks for Medical Education.

    Science.gov (United States)

    Hale, LaDonna S; Wallace, Michelle M; Adams, Courtney R; Kaufman, Michelle L; Snyder, Courtney L

    2015-09-01

    Selecting resources to support didactic courses is a critical decision, and the advantages and disadvantages must be carefully considered. During clinical rotations, students not only need to possess strong background knowledge but also are expected to be proficient with the same evidence-based POC resources used by clinicians. Students place high value on “real world” learning and therefore may place more value on POC resources that they know practicing clinicians use as compared with medical textbooks. The condensed nature of PA education requires students to develop background knowledge and information literacy skills over a short period. One way to build that knowledge and those skills simultaneously is to use POC resources in lieu of traditional medical textbooks during didactic training. Electronic POC resources offer several advantages over traditional textbooks and should be considered as viable options in PA education.

  20. Resource conservation approached with an appropriate collection and upgrade-remanufacturing for used electronic products.

    Science.gov (United States)

    Zlamparet, Gabriel I; Tan, Quanyin; Stevels, A B; Li, Jinhui

    2018-03-01

    This comparative research represents an example for a better conservation of resources by reducing the amount of waste (kg) and providing it more value under the umbrella of remanufacturing. The three discussed cases will expose three issues already addressed separately in the literature. The generation of waste electrical and electronic equipment (WEEE) interacts with the environmental depletion. In this article, we gave the examples of addressed issues under the concept of remanufacturing. Online collection opportunity eliminating classical collection, a business to business (B2B) implementation for remanufactured servers and medical devices. The material reuse (recycling), component sustainability, reuse (part harvesting), product reuse (after repair/remanufacturing) indicates the recovery potential using remanufacturing tool for a better conservation of resources adding more value to the products. Our findings can provide an overview of new system organization for the general collection, market potential and the technological advantages using remanufacturing instead of recycling of WEEE or used electrical and electronic equipment. Copyright © 2017. Published by Elsevier Ltd.

  1. Internet - a resource for nuclear utilities

    International Nuclear Information System (INIS)

    Slone, B.J. III; Richardson, C.E.

    1993-01-01

    Internet is the name of the largest computer network in the world. It is actually a collection of many networks all running the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, connected through gateways and sharing common names and address spaces. Its purpose is to facilitate sharing of resources at participating organizations, which include government agencies, educational institutions, and private corporations. The Internet roots begin with the creation of the Advanced Research Projects Agency (ARPA) within the U.S. Department of Defense (DOD) in 1958. In 1969, the DOD formed a computer network for ARPA and gave it the name ARPANET. It was designed to help government scientists communicate and share information by allowing remote computer log-in and program execution, but it quickly became a tool for sharing information through file transfer, electronic mail, and interest-group mailing lists. In 1970, ARPA became the Defense Advanced Research Projects Agency (DARPA) and ARPANET became DARPANET. By 1980, the DARPANET had grown in size, and other connecting networks were being developed. To support system growth and performance, it was recognized that a new communication protocol was required. In 1983, DARPANET split into DARPANET and MILNET (Military Network), and the Internet was formed when the Defense Communications Agency, which managed both networks, mandated the use of TCP/IP for connected hosts. In 1986, the National Science Foundation (NSF) joined Internet. The NSF created NSFNET to link several national supercomputer centers to support scholarly research. It now comprises 17 networks, connecting to 23 midlevel wide-area networks across the continent. In turn, the midlevel networks link computers in more than 1000 university, government, and commercial research organizations throughout the world

  2. Effects of the Use of Electronic Human Resource Management (EHRM Within Human Resource Management (HRM Functions at Universities

    Directory of Open Access Journals (Sweden)

    Chux Gervase Iwu

    2016-09-01

    Full Text Available This study set out to examine the effect of e-hrm systems in assisting human resource practitioners to execute their duties and responsibilities. In comparison to developed economies of the world, information technology adoption in sub-Saharan Africa has not been without certain glitches. Some of the factors that are responsible for these include poor need identification, sustainable funding, and insufficient skills. Besides these factors, there is also the issue of change management and users sticking to what they already know. Although, the above factors seem negative, there is strong evidence that information systems such as electronic human resource management present benefits to an organization. To achieve this, a dual research approach was utilized. Literature assisted immensely in both the development of the conceptual framework upon which the study hinged as well as in the development of the questionnaire items. The study also made use of an interview checklist to guide the participants. The findings reveal a mix of responses that indicate that while there are gains in adopting e-hrm systems, it is wiser to consider supporting resources as well as articulate the needs of the university better before any investment is made.

  3. Chemical defenses and resource trade-offs structure sponge communities on Caribbean coral reefs.

    Science.gov (United States)

    Loh, Tse-Lynn; Pawlik, Joseph R

    2014-03-18

    Ecological studies have rarely been performed at the community level across a large biogeographic region. Sponges are now the primary habitat-forming organisms on Caribbean coral reefs. Recent species-level investigations have demonstrated that predatory fishes (angelfishes and some parrotfishes) differentially graze sponges that lack chemical defenses, while co-occurring, palatable species heal, grow, reproduce, or recruit at faster rates than defended species. Our prediction, based on resource allocation theory, was that predator removal would result in a greater proportion of palatable species in the sponge community on overfished reefs. We tested this prediction by performing surveys of sponge and fish community composition on reefs having different levels of fishing intensity across the Caribbean. A total of 109 sponge species was recorded from 69 sites, with the 10 most common species comprising 51.0% of sponge cover (3.6-7.7% per species). Nonmetric multidimensional scaling indicated that the species composition of sponge communities depended more on the abundance of sponge-eating fishes than geographic location. Across all sites, multiple-regression analyses revealed that spongivore abundance explained 32.8% of the variation in the proportion of palatable sponges, but when data were limited to geographically adjacent locations with strongly contrasting levels of fishing pressure (Cayman Islands and Jamaica; Curaçao, Bonaire, and Martinique), the adjusted R(2) values were much higher (76.5% and 94.6%, respectively). Overfishing of Caribbean coral reefs, particularly by fish trapping, removes sponge predators and is likely to result in greater competition for space between faster-growing palatable sponges and endangered reef-building corals.

  4. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  5. Electronic human resource management: Enhancing or entrancing?

    Directory of Open Access Journals (Sweden)

    Paul Poisat

    2017-07-01

    Full Text Available Orientation: This article provides an investigation into the current level of development of the body of knowledge related to electronic human resource management (e-HRM by means of a qualitative content analysis. Several aspects of e-HRM, namely definitions of e-HRM, the theoretical perspectives around e-HRM, the role of e-HRM, the various types of e-HRM and the requirements for successful e-HRM, are examined. Research purpose: The purpose of the article was to determine the status of e-HRM and examine the studies that report on the link between e-HRM and organisational productivity. Motivation for the study: e-HRM has the capacity to improve organisational efficiency and leverage the role of human resources (HR as a strategic business partner. Main findings: The notion that the implementation of e-HRM will lead to improved organisational productivity is commonly assumed; however, empirical evidence in this regard was found to be limited. Practical/managerial implications: From the results of this investigation it is evident that more research is required to gain a greater understanding of the influence of e-HRM on organisational productivity, as well as to develop measures for assessing this influence. Contribution: This article proposes additional areas to research and measure when investigating the effectiveness of e-HRM. It provides a different lens from which to view e-HRM assessment whilst keeping it within recognised HR measurement parameters (the HR value chain. In addition, it not only provides areas for measuring e-HRM’s influence but also provides important clues as to how the measurements may be approached.

  6. 48 CFR 239.7405 - Delegated authority for telecommunications resources.

    Science.gov (United States)

    2010-10-01

    ... telecommunications resources. 239.7405 Section 239.7405 Federal Acquisition Regulations System DEFENSE ACQUISITION... TECHNOLOGY Telecommunications Services 239.7405 Delegated authority for telecommunications resources. The contracting officer may enter into a telecommunications service contract on a month-to-month basis or for any...

  7. Identifying and evaluating electronic learning resources for use in adult-gerontology nurse practitioner education.

    Science.gov (United States)

    Thompson, Hilaire J; Belza, Basia; Baker, Margaret; Christianson, Phyllis; Doorenbos, Ardith; Nguyen, Huong

    2014-01-01

    Enhancing existing curricula to meet newly published adult-gerontology advanced practice registered nurse (APRN) competencies in an efficient manner presents a challenge to nurse educators. Incorporating shared, published electronic learning resources (ELRs) in existing or new courses may be appropriate in order to assist students in achieving competencies. The purposes of this project were to (a) identify relevant available ELR for use in enhancing geriatric APRN education and (b) to evaluate the educational utility of identified ELRs based on established criteria. A multilevel search strategy was used. Two independent team members reviewed identified ELR against established criteria to ensure utility. Only resources meeting all criteria were retained. Resources were found for each of the competency areas and included formats such as podcasts, Web casts, case studies, and teaching videos. In many cases, resources were identified using supplemental strategies and not through traditional search or search of existing geriatric repositories. Resources identified have been useful to advanced practice educators in improving lecture and seminar content in a particular topic area and providing students and preceptors with additional self-learning resources. Addressing sustainability within geriatric APRN education is critical for sharing of best practices among educators and for sustainability of teaching and related resources. © 2014.

  8. Systematic review of electronic surveillance of infectious diseases with emphasis on antimicrobial resistance surveillance in resource-limited settings.

    Science.gov (United States)

    Rattanaumpawan, Pinyo; Boonyasiri, Adhiratha; Vong, Sirenda; Thamlikitkul, Visanu

    2018-02-01

    Electronic surveillance of infectious diseases involves rapidly collecting, collating, and analyzing vast amounts of data from interrelated multiple databases. Although many developed countries have invested in electronic surveillance for infectious diseases, the system still presents a challenge for resource-limited health care settings. We conducted a systematic review by performing a comprehensive literature search on MEDLINE (January 2000-December 2015) to identify studies relevant to electronic surveillance of infectious diseases. Study characteristics and results were extracted and systematically reviewed by 3 infectious disease physicians. A total of 110 studies were included. Most surveillance systems were developed and implemented in high-income countries; less than one-quarter were conducted in low-or middle-income countries. Information technologies can be used to facilitate the process of obtaining laboratory, clinical, and pharmacologic data for the surveillance of infectious diseases, including antimicrobial resistance (AMR) infections. These novel systems require greater resources; however, we found that using electronic surveillance systems could result in shorter times to detect targeted infectious diseases and improvement of data collection. This study highlights a lack of resources in areas where an effective, rapid surveillance system is most needed. The availability of information technology for the electronic surveillance of infectious diseases, including AMR infections, will facilitate the prevention and containment of such emerging infectious diseases. Copyright © 2018 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  9. Strategy alternatives for homeland air and cruise missile defense.

    Science.gov (United States)

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  10. 32 CFR 37.505 - What resources are available to assist me during the pre-award business evaluation?

    Science.gov (United States)

    2010-07-01

    ...-Award Business Evaluation § 37.505 What resources are available to assist me during the pre-award business evaluation? Administrative agreements officers of the Defense Contract Management Agency and the... 32 National Defense 1 2010-07-01 2010-07-01 false What resources are available to assist me during...

  11. Long-Term Implications of the Fiscal Year 2009 Future Years Defense Program

    National Research Council Canada - National Science Library

    Talaber, Adam; Arthur, David; Bass, Elizabeth; Bennett, Michael; Eveker, Kevin; Frisk, Daniel; Labs, Eric J; Lussier, Frances; Percy, Allison; Hall, Raymond; Newman, David; Regan, Dawn S; Schmit, Matthew; Wheelock, Jason; Kelley, Kate

    2009-01-01

    ...) has published a series of reports about its projections of the resources that might be needed over the long term to carry out the Bush Administration's plans as expressed in the Future Years Defense Program (FYDP...

  12. 32 CFR 1900.33 - Allocation of resources; agreed extensions of time.

    Science.gov (United States)

    2010-07-01

    ... time. 1900.33 Section 1900.33 National Defense Other Regulations Relating to National Defense CENTRAL... Administrative Matters § 1900.33 Allocation of resources; agreed extensions of time. (a) In general. Agency... the component, (2) The business demands imposed on the component by the Director of Central...

  13. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables

  14. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  15. 32 CFR 701.21 - Electronic record.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Electronic record. 701.21 Section 701.21... THE NAVY DOCUMENTS AFFECTING THE PUBLIC FOIA Definitions and Terms § 701.21 Electronic record. Records (including e-mail) which are created, stored, and retrieved by electronic means. ...

  16. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  17. Open-Source Electronic Health Record Systems for Low-Resource Settings: Systematic Review.

    Science.gov (United States)

    Syzdykova, Assel; Malta, André; Zolfo, Maria; Diro, Ermias; Oliveira, José Luis

    2017-11-13

    Despite the great impact of information and communication technologies on clinical practice and on the quality of health services, this trend has been almost exclusive to developed countries, whereas countries with poor resources suffer from many economic and social issues that have hindered the real benefits of electronic health (eHealth) tools. As a component of eHealth systems, electronic health records (EHRs) play a fundamental role in patient management and effective medical care services. Thus, the adoption of EHRs in regions with a lack of infrastructure, untrained staff, and ill-equipped health care providers is an important task. However, the main barrier to adopting EHR software in low- and middle-income countries is the cost of its purchase and maintenance, which highlights the open-source approach as a good solution for these underserved areas. The aim of this study was to conduct a systematic review of open-source EHR systems based on the requirements and limitations of low-resource settings. First, we reviewed existing literature on the comparison of available open-source solutions. In close collaboration with the University of Gondar Hospital, Ethiopia, we identified common limitations in poor resource environments and also the main requirements that EHRs should support. Then, we extensively evaluated the current open-source EHR solutions, discussing their strengths and weaknesses, and their appropriateness to fulfill a predefined set of features relevant for low-resource settings. The evaluation methodology allowed assessment of several key aspects of available solutions that are as follows: (1) integrated applications, (2) configurable reports, (3) custom reports, (4) custom forms, (5) interoperability, (6) coding systems, (7) authentication methods, (8) patient portal, (9) access control model, (10) cryptographic features, (11) flexible data model, (12) offline support, (13) native client, (14) Web client,(15) other clients, (16) code

  18. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  19. Analisis Teori Offense-Defense Pada Reformasi Kebijakan Pertahanan Jepang Dalam Dinamika Keamanan Di Asia Timur

    Directory of Open Access Journals (Sweden)

    Fadhil Alghifari

    2016-05-01

    Full Text Available This paper will seek to demonstrate how the use of Offense-Defense Theory can best explain the Japan’s new defense reform legislation that enables the country to play a more comprehensive global security role commensurate with its capabilities, resources, national interests, and international responsibilities. Through this offense-defense lens, it will be argued that Japan’s new defense reform legislation is a response to the growing dominance of ‘offensive’ behaviour by the neighbouring countries in East Asia. This paper will then elaborate more about the elements that are used in the offense-defense theory to analyze the ‘offense’ dominance that prompts East Asian states behave aggressively and defensively including Japan. Furthermore, this paper will explain why Japan is currently playing the ‘defensive’ role to counter the growing dominance of ‘offense’ in East Asia through the four variables of offense-defense balance; military doctrine and technology, geographical considerations, social and political order, and diplomatic arrangements. Thus, we will see that Japan holds the key to the offense-defense and security balance in the increasingly hostile environment in East Asia.

  20. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  1. Feeding Immunity: Physiological and Behavioral Responses to Infection and Resource Limitation

    Directory of Open Access Journals (Sweden)

    Sarah A. Budischak

    2018-01-01

    Full Text Available Resources are a core currency of species interactions and ecology in general (e.g., think of food webs or competition. Within parasite-infected hosts, resources are divided among the competing demands of host immunity and growth as well as parasite reproduction and growth. Effects of resources on immune responses are increasingly understood at the cellular level (e.g., metabolic predictors of effector function, but there has been limited consideration of how these effects scale up to affect individual energetic regimes (e.g., allocation trade-offs, susceptibility to infection, and feeding behavior (e.g., responses to local resource quality and quantity. We experimentally rewilded laboratory mice (strain C57BL/6 in semi-natural enclosures to investigate the effects of dietary protein and gastrointestinal nematode (Trichuris muris infection on individual-level immunity, activity, and behavior. The scale and realism of this field experiment, as well as the multiple physiological assays developed for laboratory mice, enabled us to detect costs, trade-offs, and potential compensatory mechanisms that mice employ to battle infection under different resource conditions. We found that mice on a low-protein diet spent more time feeding, which led to higher body fat stores (i.e., concentration of a satiety hormone, leptin and altered metabolite profiles, but which did not fully compensate for the effects of poor nutrition on albumin or immune defenses. Specifically, immune defenses measured as interleukin 13 (IL13 (a primary cytokine coordinating defense against T. muris and as T. muris-specific IgG1 titers were lower in mice on the low-protein diet. However, these reduced defenses did not result in higher worm counts in mice with poorer diets. The lab mice, living outside for the first time in thousands of generations, also consumed at least 26 wild plant species occurring in the enclosures, and DNA metabarcoding revealed that the consumption of different

  2. Salicylic acid binding of mitochondrial alpha-ketoglutarate dehydrogenase E2 affects mitochondrial oxidative phosphorylation and electron transport chain components and plays a role in basal defense against tobacco mosaic virus in tomato.

    Science.gov (United States)

    Liao, Yangwenke; Tian, Miaoying; Zhang, Huan; Li, Xin; Wang, Yu; Xia, Xiaojian; Zhou, Jie; Zhou, Yanhong; Yu, Jingquan; Shi, Kai; Klessig, Daniel F

    2015-02-01

    Salicylic acid (SA) plays a critical role in plant defense against pathogen invasion. SA-induced viral defense in plants is distinct from the pathways mediating bacterial and fungal defense and involves a specific pathway mediated by mitochondria; however, the underlying mechanisms remain largely unknown. The SA-binding activity of the recombinant tomato (Solanum lycopersicum) alpha-ketoglutarate dehydrogenase (Slα-kGDH) E2 subunit of the tricarboxylic acid (TCA) cycle was characterized. The biological role of this binding in plant defenses against tobacco mosaic virus (TMV) was further investigated via Slα-kGDH E2 silencing and transient overexpression in plants. Slα-kGDH E2 was found to bind SA in two independent assays. SA treatment, as well as Slα-kGDH E2 silencing, increased resistance to TMV. SA did not further enhance TMV defense in Slα-kGDH E2-silenced tomato plants but did reduce TMV susceptibility in Nicotiana benthamiana plants transiently overexpressing Slα-kGDH E2. Furthermore, Slα-kGDH E2-silencing-induced TMV resistance was fully blocked by bongkrekic acid application and alternative oxidase 1a silencing. These results indicated that binding by Slα-kGDH E2 of SA acts upstream of and affects the mitochondrial electron transport chain, which plays an important role in basal defense against TMV. The findings of this study help to elucidate the mechanisms of SA-induced viral defense. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.

  3. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  4. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  5. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  6. Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet

    Directory of Open Access Journals (Sweden)

    Frank Yeong-Sung Lin

    2013-01-01

    Full Text Available Virtualization plays an important role in the recent trend of cloud computing. It allows the administrator to manage and allocate hardware resources flexibly. However, it also causes some security issues. This is a critical problem for service providers, who simultaneously strive to defend against malicious attackers while providing legitimate users with high quality service. In this paper, the attack-defense scenario is formulated as a mathematical model where the defender applies both proactive and reactive defense mechanisms against attackers with different attack strategies. In order to simulate real-world conditions, the attackers are assumed to have incomplete information and imperfect knowledge of the target network. This raises the difficulty of solving the model greatly, by turning the problem nondeterministic. After examining the experiment results, effective proactive and reactive defense strategies are proposed. This paper finds that a proactive defense strategy is suitable for dealing with aggressive attackers under “winner takes all” circumstances, while a reactive defense strategy works better in defending against less aggressive attackers under “fight to win or die” circumstances.

  7. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  8. Evaluation of three electronic report processing systems for preparing hydrologic reports of the U.S Geological Survey, Water Resources Division

    Science.gov (United States)

    Stiltner, G.J.

    1990-01-01

    In 1987, the Water Resources Division of the U.S. Geological Survey undertook three pilot projects to evaluate electronic report processing systems as a means to improve the quality and timeliness of reports pertaining to water resources investigations. The three projects selected for study included the use of the following configuration of software and hardware: Ventura Publisher software on an IBM model AT personal computer, PageMaker software on a Macintosh computer, and FrameMaker software on a Sun Microsystems workstation. The following assessment criteria were to be addressed in the pilot studies: The combined use of text, tables, and graphics; analysis of time; ease of learning; compatibility with the existing minicomputer system; and technical limitations. It was considered essential that the camera-ready copy produced be in a format suitable for publication. Visual improvement alone was not a consideration. This report consolidates and summarizes the findings of the electronic report processing pilot projects. Text and table files originating on the existing minicomputer system were successfully transformed to the electronic report processing systems in American Standard Code for Information Interchange (ASCII) format. Graphics prepared using a proprietary graphics software package were transferred to all the electronic report processing software through the use of Computer Graphic Metafiles. Graphics from other sources were entered into the systems by scanning paper images. Comparative analysis of time needed to process text and tables by the electronic report processing systems and by conventional methods indicated that, although more time is invested in creating the original page composition for an electronically processed report , substantial time is saved in producing subsequent reports because the format can be stored and re-used by electronic means as a template. Because of the more compact page layouts, costs of printing the reports were 15% to 25

  9. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  10. The importance of ecological costs for the evolution of plant defense against herbivory.

    Science.gov (United States)

    van Velzen, Ellen; Etienne, Rampal S

    2015-05-07

    Plant defense against herbivory comes at a cost, which can be either direct (reducing resources available for growth and reproduction) or indirect (through reducing ecological performance, for example intraspecific competitiveness). While direct costs have been well studied in theoretical models, ecological costs have received almost no attention. In this study we compare models with a direct trade-off (reduced growth rate) to models with an ecological trade-off (reduced competitive ability), using a combination of adaptive dynamics and simulations. In addition, we study the dependence of the level of defense that can evolve on the type of defense (directly by reducing consumption, or indirectly by inducing herbivore mortality (toxicity)), and on the type of herbivore against which the plant is defending itself (generalists or specialists). We find three major results: First, for both direct and ecological costs, defense only evolves if the benefit to the plant is direct (through reducing consumption). Second, the type of cost has a major effect on the evolutionary dynamics: direct costs always lead to a single optimal strategy against herbivores, but ecological costs can lead to branching and the coexistence of non-defending and defending plants; however, coexistence is only possible when defending against generalist herbivores. Finally, we find that fast-growing plants invest less than slow-growing plants when defending against generalist herbivores, as predicted by the Resource Availability Hypothesis, but invest more than slow-growing plants when defending against specialists. Our results clearly show that assumptions about ecological interactions are crucial for understanding the evolution of defense against herbivores. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Use and User Perception of Electronic Information Resources: A Case Study of Siva Institute of Frontier Technology, India

    Directory of Open Access Journals (Sweden)

    Velmurugan Chandran

    2013-12-01

    Full Text Available The present study aims to explore the use and user perception of electronic resources in Siva Institute of Frontier Technology, India. A total number of 123 users were taken into account for the study through a questionnaire-based survey method. A well-structured questionnaire was designed and distributed to the selected 200 students and staff members. 123 copies of the questionnaires were returned dully filled in and the overall response rate was 61.50 percent. The questionnaire contained both open- and close-ended questions. The collected data were classified, analyzed, and tabulated by using simple statistical methods. This study covers the impact of electronic resources on students and faculty in their academic pursuit.

  12. A preliminary categorization of end-of-life electrical and electronic equipment as secondary metal resources

    International Nuclear Information System (INIS)

    Oguchi, Masahiro; Murakami, Shinsuke; Sakanakura, Hirofumi; Kida, Akiko; Kameya, Takashi

    2011-01-01

    Highlights: → End-of-life electrical and electronic equipment (EEE) as secondary metal resources. → The content and the total amount of metals in specific equipment are both important. → We categorized 21 EEE types from contents and total amounts of various metals. → Important equipment types as secondary resources were listed for each metal kind. → Collectability and possible collection systems of various EEE types were discussed. - Abstract: End-of-life electrical and electronic equipment (EEE) has recently received attention as a secondary source of metals. This study examined characteristics of end-of-life EEE as secondary metal resources to consider efficient collection and metal recovery systems according to the specific metals and types of EEE. We constructed an analogy between natural resource development and metal recovery from end-of-life EEE and found that metal content and total annual amount of metal contained in each type of end-of-life EEE should be considered in secondary resource development, as well as the collectability of the end-of-life products. We then categorized 21 EEE types into five groups and discussed their potential as secondary metal resources. Refrigerators, washing machines, air conditioners, and CRT TVs were evaluated as the most important sources of common metals, and personal computers, mobile phones, and video games were evaluated as the most important sources of precious metals. Several types of small digital equipment were also identified as important sources of precious metals; however, mid-size information and communication technology (ICT) equipment (e.g., printers and fax machines) and audio/video equipment were shown to be more important as a source of a variety of less common metals. The physical collectability of each type of EEE was roughly characterized by unit size and number of end-of-life products generated annually. Current collection systems in Japan were examined and potentially appropriate collection

  13. Consequences of Food Restriction for Immune Defense, Parasite Infection, and Fitness in Monarch Butterflies.

    Science.gov (United States)

    McKay, Alexa Fritzsche; Ezenwa, Vanessa O; Altizer, Sonia

    2016-01-01

    Organisms have a finite pool of resources to allocate toward multiple competing needs, such as development, reproduction, and enemy defense. Abundant resources can support investment in multiple traits simultaneously, but limited resources might promote trade-offs between fitness-related traits and immune defenses. We asked how food restriction at both larval and adult life stages of the monarch butterfly (Danaus plexippus) affected measures of immunity, fitness, and immune-fitness interactions. We experimentally infected a subset of monarchs with a specialist protozoan parasite to determine whether parasitism further affected these relationships and whether food restriction influenced the outcome of infection. Larval food restriction reduced monarch fitness measures both within the same life stage (e.g., pupal mass) as well as later in life (e.g., adult lifespan); adult food restriction further reduced adult lifespan. Larval food restriction lowered both hemocyte concentration and phenoloxidase activity at the larval stage, and the effects of larval food restriction on phenoloxidase activity persisted when immunity was sampled at the adult stage. Adult food restriction reduced only adult phenoloxidase activity but not hemocyte concentration. Parasite spore load decreased with one measure of larval immunity, but food restriction did not increase the probability of parasite infection. Across monarchs, we found a negative relationship between larval hemocyte concentration and pupal mass, and a trade-off between adult hemocyte concentration and adult life span was evident in parasitized female monarchs. Adult life span increased with phenoloxidase activity in some subsets of monarchs. Our results emphasize that food restriction can alter fitness and immunity across multiple life stages. Understanding the consequences of resource limitation for immune defense is therefore important for predicting how increasing constraints on wildlife resources will affect fitness and

  14. Resource Allocation Methodology to Support Mission Area Analysis

    National Research Council Canada - National Science Library

    Parr, John

    1994-01-01

    .... The MAA program envisioned will examine, among other things, potential force structure and modernization trade-offs that are essential to the formulation of an affordable long-term plan for defense resource allocation...

  15. Principles of formation of the content of an educational electronic resource on the basis of general and didactic patterns of learning

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Заславская

    2018-12-01

    Full Text Available The article considers the influence of the development of technical means of teaching on the effectiveness of educational and methodical resources. Modern opportunities of information and communication technologies allow creating electronic educational resources that represent educational information that automates the learning process, provide information assistance, if necessary, collect and process statistical information on the degree of development of the content of the school material by schoolchildren, set an individual trajectory of learning, and so on. The main principle of data organization is the division of the training course into separate sections on the thematic elements and components of the learning process. General regularities include laws that encompass the entire didactic system, and in specific (particular cases, those whose actions extend to a separate component (aspect of the system. From the standpoint of the existence of three types of electronic training modules in the aggregate content of the electronic learning resource - information, control and module of practical classes - the principles of the formation of the electronic learning resource, in our opinion, should regulate all these components. Each of the certain principles is considered in the groups: scientific orientation, methodological orientation, systemic nature, accounting of interdisciplinary connections, fundamentalization, systematic and dosage sequence, rational use of study time, accessibility, minimization, operationalization of goals, unified identification diagnosis.

  16. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  17. Estimated Impacts of Sequestration-Level Funding: United States Department of Defense Fiscal Year 1015 Budget Request

    Science.gov (United States)

    2014-04-01

    Prepositioned Stocks, and Environmental Restoration. The other O&M portfolio indirectly supports Service readiness by funding such areas as training and...and administration. The portfolio also supports intelligence programs and defense-wide activities, such as the Defense Health Program, Special...2.0) (1.6) (1.1) (0.9) (5.7) SUMMARY OF MILCON Under BCA levels, the MILCON accounts would decline to allow for the rebalancing of resources

  18. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  19. From Millennium ERM to Proquest 360 Resource Manager: Implementing a new Electronic Resources Management System ERMS in an International Graduate Research University in Saudi Arabia

    KAUST Repository

    Ramli, Rindra M.

    2017-05-17

    An overview of the Recommendation Study and the subsequent Implementation of a new Electronic Resources Management system ERMS in an international graduate research university in the Kingdom of Saudi Arabia. It covers the timeline, deliverables and challenges as well as lessons learnt by the Project Team.

  20. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  1. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  2. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  3. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  4. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  5. The Synthesis of the Hierarchical Structure of Information Resources for Management of Electronic Commerce Entities

    Directory of Open Access Journals (Sweden)

    Krutova Anzhelika S.

    2017-06-01

    Full Text Available The aim of the article is to develop the theoretical bases for the classification and coding of economic information and the scientific justification of the content of information resources of an electronic commerce enterprise. The essence of information resources for management of electronic business entities is investigated. It is proved that the organization of accounting in e-commerce systems is advisable to be built on the basis of two circuits: accounting for financial flows and accounting associated with transformation of business factors in products and services as a result of production activities. There presented a sequence of accounting organization that allows to combine the both circuits in a single information system, which provides a possibility for the integrated replenishment and distributed simultaneous use of the e-commerce system by all groups of users. It is proved that the guarantee of efficient activity of the information management system of electronic commerce entities is a proper systematization of the aggregate of information resources on economic facts and operations of an enterprise in accordance with the management tasks by building the hierarchy of accounting nomenclatures. It is suggested to understand nomenclature as an objective, primary information aggregate concerning a certain fact of the economic activity of an enterprise, which is characterized by minimum requisites, is entered into the database of the information system and is to be reflected in the accounting system. It is proposed to build a database of e-commerce systems as a part of directories (constants, personnel, goods / products, suppliers, buyers and the hierarchy of accounting nomenclatures. The package of documents regulating the organization of accounting at an enterprise should include: the provision on the accounting services, the order on the accounting policy, the job descriptions, the schedules of information exchange, the report card and

  6. EW 101 a first course in electronic warfare

    CERN Document Server

    Adamy, David L

    2000-01-01

    This popular series of tutorials, featured over a period of years in the Journal of Electronic Defense, is now available in a single volume. Organized into chapters with new introductory and supplementary material from the author, you get clear, concise and well-illustrated examinations of critical topics such as antenna parameters, receiver sensitivity, processing tasks, and search strategies, LPI signals, jamming, communication links, and simulation. The chapters define key terms and explain how and why particular technologies are relevant to electronic defense. Detailed charts, diagrams and

  7. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    these conditions, ownership retained the power and control instruments at the highest level. The specific form of relations of ownership and management can be found in the so-called public sector as an institutional system of state economic engagement. Stronger organizational democracy and managers and employees participation are  moving in two directions: greater participation in the ownership and greater participation in decision making. This implies closer and partly equalized interests between important internal stakeholders (owners, managers, employees.   Development of management in public sector   The way in which public administration performs its duties (so-called administrative work has always been a matter of dispute and the desire for reform. Poor quality of communication between users (citizens and the administrative system has resulted in distrust, on the one hand, and bureaucratization on the other hand. Due to decentralization of political systems, government subjects at various levels of hierarchy have relationships closer to partnership than to subordination. Partnerships require a redistribution of responsibilities, obligations, and funds and other resources among all stakeholders in the management of the affairs of general - common importance. Hence, the term public administration replaced the term government administration, indicating a wider range of entities involved in policy making and implementation of activities. Traditional administrative approach (Public Administration, assuming the concept of elite democracy, relies on three institutional social categories: the party system, the political leadership and the bureaucracy. Accordingly, the authorities can successfully respond to numerous demands and expectations of citizens only by a standardized and administrative approach, particularly in areas such as education, health, economic and monetary system, defense and others. In accordance with its own peculiarities and historical heritage

  8. Controls for the Electronic Data Interchange at the Defense Finance and Accounting Service Columbus

    National Research Council Canada - National Science Library

    2001-01-01

    On May 21, 1997, the Under Secretary of Defense (Comptroller) directed the move to a paper-free contracting process which would modernize the acquisition processes of contract writing, administration, finance, and auditing...

  9. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  10. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  11. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  12. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  13. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  14. Electronic theses and dissertations: a review of this valuable resource for nurse scholars worldwide.

    Science.gov (United States)

    Goodfellow, L M

    2009-06-01

    A worldwide repository of electronic theses and dissertations (ETDs) could provide worldwide access to the most up-to-date research generated by masters and doctoral students. Until that international repository is established, it is possible to access some of these valuable knowledge resources. ETDs provide a technologically advanced medium with endless multimedia capabilities that far exceed the print and bound copies of theses and dissertations housed traditionally in individual university libraries. CURRENT USE: A growing trend exists for universities worldwide to require graduate students to submit theses or dissertations as electronic documents. However, nurse scholars underutilize ETDs, as evidenced by perusing bibliographic citation lists in many of the research journals. ETDs can be searched for and retrieved through several digital resources such as the Networked Digital Library of Theses and Dissertations (http://www.ndltd.org), ProQuest Dissertations and Theses (http://www.umi.com), the Australasian Digital Theses Program (http://adt.caul.edu.au/) and through individual university web sites and online catalogues. An international repository of ETDs benefits the community of nurse scholars in many ways. The ability to access recent graduate students' research electronically from anywhere in the world is advantageous. For scholars residing in developing countries, access to these ETDs may prove to be even more valuable. In some cases, ETDs are not available for worldwide access and can only be accessed through the university library from which the student graduated. Public access to university library ETD collections is not always permitted. Nurse scholars from both developing and developed countries could benefit from ETDs.

  15. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  16. Chemical defenses and resource trade-offs structure sponge communities on Caribbean coral reefs

    OpenAIRE

    Loh, Tse-Lynn; Pawlik, Joseph R.

    2014-01-01

    Chemical defenses are known to protect some species from consumers, but it is often difficult to detect this advantage at the community or ecosystem levels because of the complexity of abiotic and biotic factors that influence species abundances. We surveyed the community of sponges and sponge predators (angelfishes and parrotfishes) on coral reefs across the Caribbean ranging from heavily overfished sites to protected marine reserves. High predator abundance correlated with high abundance of...

  17. Impact of defense spending on unemployment in five countries from Asia

    Directory of Open Access Journals (Sweden)

    Abdul Qayyum Khan

    2015-11-01

    Full Text Available The objective of this study is to examine empirically the impact of defense spending on unemployment along with a number of control variables for a set of five selected countries from Asia which include Cambodia, China, Malaysia, Pakistan, and the Philippines. For empirical investigation annual data over the period of 1992 to 2013 are used. While, prior to regression analysis, the data were sensibly checked using sundry of relevant tests. The empirical results reveal that defense spending is not a better option to overcome unemployment problem in most of the sample countries. Thus, the findings suggest that lower defense budget allocation will provide more resources for other sectors which are relatively more productive and can help to improve economic and social welfare of these selected countries from Asia. Besides decreased military expenditures, encouraging domestic investment and discouraging population growth can help reduce unemployment. Remittance appears to have a positive relation with unemployment, the implications of which need to be addressed by policymakers

  18. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  19. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  20. Activities for the strengthening of Defense Preparedness in formation of radiochemists

    International Nuclear Information System (INIS)

    Lau-González, MSc. Maritza; Hernández-Garcés, MSc. Anel; Corona-Hernández, MSc. José Á.; Ruiz-Machado, Lic. José R.; Zamora-Lugo, Dr.C Luis O.

    2015-01-01

    The discipline Defense Preparedness in Bachelor of Radiochemistry, is complemented by the other subjects of Basic and Specialized Chemistry training through a series of contents that equip the professional greater awareness of their social responsibility in relation to peaceful use of nuclear energy, the prevention of radiological accidents and environmental protection. In this paper examples of learning activities aimed at the independent work of students are introduced, allowing, systemically, a coherent link between the disciplines of General and Inorganic Chemistry and Defense Preparedness, through the study of toxic substances of different nature and risks that can arise for human health during handling and employment, economic resources and the environment; aspects to consider within the dimensions of National Security. (author)

  1. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  2. Activities in department of energy hazardous and mixed waste defense waste management

    International Nuclear Information System (INIS)

    Eyman, L.D.

    1988-01-01

    In January 1986, the U.S. Department of Energy (DOE) Office of Assistant Secretary for Defense Programs (DP) created the Hazardous Waste and Remedial Actions Division within the Office of Defense Waste and Transportation Management. The Oak Ridge Operations Office (ORO) was assigned the responsibility for supporting DOE Headquarters (HQ) in planning nationally integrated activities for Resource Conservation and Recovery Act/Comprehensive Environmental Response, Compensation, and Liability Act/Superfund Amendments and Reauthorization Act (RCRA/CERCLA/SARA) compliance. In turn, ORO created the Hazardous Waste Remedial Actions Program Support Contractor Office (HAZWRAPSCO) to assist with the expanded lead assignment. The HAZWRAPSCO activities are currently supported by three distinct DOE-HQ funding elements: the Environmental Restoration Program, the Hazardous Waste Compliance Technology Program, and the Hazardous Waste Research and Development R and D Program. The Environmental Restoration Program is discussed in the paper, entitled The DOE Defense Program for Environmental Restoration

  3. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  4. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  5. ELECTRONIC EDUCATIONAL RESOURCES FOR ONLINE SUPPORT OF MODERN CHEMISTRY CLASSES IN SPECIALIZED SCHOOL

    Directory of Open Access Journals (Sweden)

    Maria D. Tukalo

    2013-09-01

    Full Text Available This article contains material of some modern electronic educational resources that can be used via the Internet to support the modern chemistry classes in specialized school. It was drawn attention to the educational chemical experiments as means of knowledge; simulated key motivational characteristics to enhance students interest for learning subjects, their cognitive and practical activity in the formation of self-reliance and self-creative; commented forecasts for creating of conditions to enhance the creative potential of students in a modern learning environment.

  6. Selection and Evaluation of Electronic Resources

    Directory of Open Access Journals (Sweden)

    Doğan Atılgan

    2013-11-01

    Full Text Available Publication boom and issues related to controlling and accession of printed sources have created some problems after World War II. Consequently, publishing industry has encountered the problem of finding possible solution for emerged situation. Industry of electronic publishing has started to improve with the rapid increase of the price of printed sources as well as the problem of publication boom. The first effects of electronic publishing were appeared on the academic and scholarly publications then electronic publishing became a crucial part of all types of publications. As a result of these developments, collection developments and service policies of information centers were also significantly changed. In this article, after a general introduction about selection and evaluation processes of electronic publications, the subscribed databases by a state and a privately owned university in Turkey and their usage were examined.

  7. Nuclear energy: Environmental issues at DOE's nuclear defense facilities

    International Nuclear Information System (INIS)

    1986-01-01

    GAO's review of nine Department of Energy defense facilities identified a number of significant environmental issues: (1) eight facilities have groundwater contaminated with radioactive and/or hazardous substances to high levels; (2) six facilities have soil contamination in unexpected areas, including offsite locations; (3) four facilities are not in full compliance with the Clean Water Act; and (4) all nine facilities are significantly changing their waste disposal practices to obtain a permit under the Resource Conservation and Recovery Act. GAO is recommending that DOE develop and overall groundwater and soil protection strategy that would provide a better perspective on the environmental risks and impacts associated with operating DOE's nuclear defense facilities. GAO also recommends that DOE allow outside independent inspections of the disposal practices used for any waste DOE self-regulates and revise its order governing the management of hazardous and mixed waste

  8. Quality Assurance Program description, Defense Waste Processing Facility (DWPF)

    International Nuclear Information System (INIS)

    Maslar, S.R.

    1992-01-01

    This document describes the Westinghouse Savannah River Company's (WSRC) Quality Assurance Program for Defense Waste Processing at the Savannah River Site (SRS). WSRC is the operating contractor for the US Department of Energy (DOE) at the SRS. The following objectives are achieved through developing and implementing the Quality Assurance Program: (1) Ensure that the attainment of quality (in accomplishing defense high-level waste processing objectives at the SRS) is at a level commensurate with the government's responsibility for protecting public health and safety, the environment, the public investment, and for efficiently and effectively using national resources. (2) Ensure that high-level waste from qualification and production activities conform to requirements defined by OCRWM. These activities include production processes, equipment, and services; and products that are planned, designed, procured, fabricated, installed, tested, operated, maintained, modified, or produced

  9. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  10. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-01-01

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  11. An Exploratory study on the use of LibAnswers to Resolve, Track and Monitor Electronic Resources Issues: The KAUST Library experience

    KAUST Repository

    Ramli, Rindra M.

    2017-05-03

    An Exploratory study on KAUST library use of LibAnswers in resolving electronic resources questions received in LibAnswers. It describes the findings of the questions received in LibAnswers. The author made suggestions based on the findings to improve the reference services in responding to e-resources questions.

  12. The level of the usage of the human resource information system and electronic recruitment in Croatian companies

    Directory of Open Access Journals (Sweden)

    Snježana Pivac

    2014-12-01

    Full Text Available Performing business according to contemporary requirements influences companies for continuous usage of modern managerial tools, such as a human resource information system (HRIS and electronic recruitment (ER. Human resources have been recognised as curtail resources and the main source of a competitive advantage in creation of successful business performance. In order to attract and select the top employees, companies use quality information software for attracting internal ones, and electronic recruitment for attracting the best possible external candidates. The main aim of this paper is to research the level of the usage of HRIS and ER within medium-size and large Croatian companies. Moreover, the additional aim of this paper is to evaluate the relationship among the usage of these modern managerial tools and the overall success of human resource management within these companies. For the purpose of this paper, primary and secondary research has been conducted in order to reveal the level of the usage of HRIS and ER as well as the overall success of human resource management in Croatian companies. The companies’ classification (HRIS and ER is done by using the non-hierarchical k-means cluster method as well as the nonparametric Kruskal Wallis test. Further, the companies are ranked by the multicriteria PROMETHEE method. Relevant nonparametric tests are used for testing the overall companies’ HRM. Finally, binary logistic regression is estimated, relating binary variable HRM and HRIS development. After detailed research, it can be concluded that large Croatian companies apply HRIS in majority (with a positive relation to HRM performance, but still require certain degrees of its development.

  13. The electronic encapsulation of knowledge in hydraulics, hydrology and water resources

    Science.gov (United States)

    Abbott, Michael B.

    The rapidly developing practice of encapsulating knowledge in electronic media is shown to lead necessarily to the restructuring of the knowledge itself. The consequences of this for hydraulics, hydrology and more general water-resources management are investigated in particular relation to current process-simulation, real-time control and advice-serving systems. The generic properties of the electronic knowledge encapsulator are described, and attention is drawn to the manner in which knowledge 'goes into hiding' through encapsulation. This property is traced in the simple situations of pure mathesis and in the more complex situations of taxinomia using one example each from hydraulics and hydrology. The consequences for systems architectures are explained, pointing to the need for multi-agent architectures for ecological modelling and for more general hydroinformatics systems also. The relevance of these developments is indicated by reference to ongoing projects in which they are currently being realised. In conclusion, some more general epistemological aspects are considered within the same context. As this contribution is so much concerned with the processes of signification and communication, it has been partly shaped by the theory of semiotics, as popularised by Eco ( A Theory of Semiotics, Indiana University, Bloomington, 1977).

  14. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  15. RESEARCH OF INFLUENCE OF QUALITY OF ELECTRONIC EDUCATIONAL RESOURCES ON QUALITY OF TRAINING WITH USE OF DISTANCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    H. M. Kravtsov

    2013-03-01

    Full Text Available Communication improving of educational processes requires today new approaches to the management arrangements and forming of educational policy in the field of distance learning, which is based on the use of modern information and communication technologies. An important step in this process is the continuous monitoring of the development and implementation of information technology and, in particular, the distance learning systems in higher educational establishments. The main objective of the monitoring is the impact assessment on the development of distance learning following the state educational standards, curricula, methodical and technical equipment and other factors; factors revelation that influence the implementation and outcomes of distance learning; results comparison of educational institution functioning and distance education systems in order to determine the most efficient ways of its development. The paper presents the analysis results of the dependence of the quality of educational services on the electronic educational resources. Trends in educational services development was studied by comparing the quality influence of electronic educational resources on the quality of educational services of higher pedagogical educational institutions of Ukraine as of 2009-2010 and 2012-2013. Generally, the analysis of the survey results allows evaluating quality of the modern education services as satisfactory and it can be said that almost 70% of the success of their future development depends on the quality of the used electronic educational resources and distance learning systems in particular.

  16. Egg Production Constrains Chemical Defenses in a Neotropical Arachnid.

    Directory of Open Access Journals (Sweden)

    Taís M Nazareth

    Full Text Available Female investment in large eggs increases the demand for fatty acids, which are allocated for yolk production. Since the biosynthetic pathway leading to fatty acids uses the same precursors used in the formation of polyketides, allocation trade-offs are expected to emerge. Therefore, egg production should constrain the investment in chemical defenses based on polyketides, such as benzoquinones. We tested this hypothesis using the harvestman Acutiosoma longipes, which produces large eggs and releases benzoquinones as chemical defense. We predicted that the amount of secretion released by ovigerous females (OFs would be smaller than that of non-ovigerous females (NOF. We also conducted a series of bioassays in the field and in the laboratory to test whether egg production renders OFs more vulnerable to predation. OFs produce less secretion than NOFs, which is congruent with the hypothesis that egg production constrains the investment in chemical defenses. Results of the bioassays show that the secretion released by OFs is less effective in deterring potential predators (ants and spiders than the secretion released by NOFs. In conclusion, females allocate resources to chemical defenses in a way that preserves a primary biological function related to reproduction. However, the trade-off between egg and secretion production makes OFs vulnerable to predators. We suggest that egg production is a critical moment in the life of harvestman females, representing perhaps the highest cost of reproduction in the group.

  17. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  18. Deceived, Disgusted, and Defensive: Motivated Processing of Anti-Tobacco Advertisements.

    Science.gov (United States)

    Leshner, Glenn; Clayton, Russell B; Bolls, Paul D; Bhandari, Manu

    2017-08-29

    A 2 × 2 experiment was conducted, where participants watched anti-tobacco messages that varied in deception (content portraying tobacco companies as dishonest) and disgust (negative graphic images) content. Psychophysiological measures, self-report, and a recognition test were used to test hypotheses generated from the motivated cognition framework. The results of this study indicate that messages containing both deception and disgust push viewers into a cascade of defensive responses reflected by increased self-reported unpleasantness, reduced resources allocated to encoding, worsened recognition memory, and dampened emotional responses compared to messages depicting one attribute or neither. Findings from this study demonstrate the value of applying a motivated cognition theoretical framework in research on responses to emotional content in health messages and support previous research on defensive processing and message design of anti-tobacco messages.

  19. Tracking the Flow of Resources in Electronic Waste - The Case of End-of-Life Computer Hard Disk Drives.

    Science.gov (United States)

    Habib, Komal; Parajuly, Keshav; Wenzel, Henrik

    2015-10-20

    Recovery of resources, in particular, metals, from waste flows is widely seen as a prioritized option to reduce their potential supply constraints in the future. The current waste electrical and electronic equipment (WEEE) treatment system is more focused on bulk metals, where the recycling rate of specialty metals, such as rare earths, is negligible compared to their increasing use in modern products, such as electronics. This study investigates the challenges in recovering these resources in the existing WEEE treatment system. It is illustrated by following the material flows of resources in a conventional WEEE treatment plant in Denmark. Computer hard disk drives (HDDs) containing neodymium-iron-boron (NdFeB) magnets were selected as the case product for this experiment. The resulting output fractions were tracked until their final treatment in order to estimate the recovery potential of rare earth elements (REEs) and other resources contained in HDDs. The results further show that out of the 244 kg of HDDs treated, 212 kg comprising mainly of aluminum and steel can be finally recovered from the metallurgic process. The results further demonstrate the complete loss of REEs in the existing shredding-based WEEE treatment processes. Dismantling and separate processing of NdFeB magnets from their end-use products can be a more preferred option over shredding. However, it remains a technological and logistic challenge for the existing system.

  20. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  1. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  2. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  3. Inland Electronic Navigational Charts (IENC)

    Data.gov (United States)

    Army Corps of Engineers, Department of the Army, Department of Defense — These Inland Electronic Navigational Charts (IENCs) were developed from available data used in maintenance of Navigation channels. Users of these IENCs should be...

  4. Male-biased sexual size dimorphism, resource defense polygyny, and multiple paternity in the Emei moustache toad (Leptobrachium boringii).

    Science.gov (United States)

    Hudson, Cameron M; Fu, Jinzhong

    2013-01-01

    We tested the hypotheses that the Emei moustache toad (Leptobrachium boringii) exhibits resource defense polygyny and that combat led to the evolution of male-biased sexual size dimorphism. Between February and March of 2011 and 2012, 26 female and 55 male L. boringii from Mount Emei UNESCO World Heritage Site, Sichuan, China, were observed throughout the breeding season. Prior to the breeding season, males grow 10-16 keratinized maxillary nuptial spines, which fall off once the season has ended. Throughout this time, males construct and defend aquatic nests where they produce advertisement calls to attract females. In a natural setting, we documented 14 cases involving a total of 22 males where males used their moustaches for aggressive interaction, and nest takeover was observed on seven occasions. Males were also observed to possess injuries resulting from combat. Genetic analysis using microsatellite DNA markers revealed several cases of multiple paternity, both within nest and within clutch. This observation indicated that some alternative male reproductive strategy, such as satellite behaviour, is occurring, which may have led to the multiple paternity. Larger males were observed to mate more frequently, and in multiple nests, suggesting that females are selecting for larger males, or that larger males are more capable of defending high quality territories.

  5. A Probabilistic environmental decision support framework for managing risk and resources

    International Nuclear Information System (INIS)

    Gallegos, D.P.; Webb, E.K.; Davis, P.A.; Conrad, S.H.

    1996-01-01

    The ability to make cost effective, timely decisions associated with waste management and environmental remediation problems has been the subject of considerable debate in recent years. On one hand, environmental decision makers do not have unlimited resources that they can apply to come to resolution on outstanding and uncertain technical issues. On the other hand, because of the possible impending consequences associated with these types of systems, avoiding making a decision is usually not an alternative either. Therefore, a structured, quantitative process is necessary that will facilitate technically defensible decision making in light of both uncertainty and resource constraints. An environmental decision support framework has been developed to provide a logical structure that defines a cost-effective, traceable, and defensible path to closure on decision regarding compliance and resource allocation. The methodology has been applied effectively to waste disposal problems and is being adapted and implemented in subsurface environmental remediation problems

  6. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  7. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  8. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  9. IMPROVING THE STRATEGIC PLANNING OF THE DEFENSE-INDUSTRIAL COMPLEX CORPORATIONS OF RUSSIA

    Directory of Open Access Journals (Sweden)

    Katrina B. Dobrova

    2016-01-01

    Full Text Available In this paper, we develop proposals to improve the strategic planning of Russian corporations of the defense-industrial complex. The relevance of the study due to the fact that the methodology for the adaptation of the strategic management of the military-industrial enterprises with substantial scientifi c and technical potential, should take into account a number of features, such as the identifi cation of the features of competition in the future; understanding of the prospects and development opportunities in the medium and long term; assessment of resource potential; impact assessment and risk in the implementation of promising strategies. In the more precise understanding of the strategy as a pattern of behavior aimed at achieving these goals, a set of rules for search and opportunities; strategic plan is seen as a series of specifi c steps and actions that are integrated in space and time, which lead to the transformation of the current position to the desired. We consider the practice of corporate transformation strategies of the world defense industry using a system method. To improve the strategic planning of Russian defense industry corporations it is recommended to apply the strategy of adapting the defense industry companies and their diversifi cation with the civilian sectors. The key vectors of the development strategy of the defense-industrial complex of Russian corporations are defi ned: providing an acceptable investment climate in the sphere of military-technical cooperation; neutralization of threats by the activities of DIC TNCs; creation of their own TNK defense industry and others.

  10. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  11. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  12. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  13. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  14. Missions to Near-Earth Asteroids: Implications for Exploration, Science, Resource Utilization, and Planetary Defense

    Science.gov (United States)

    Abell, P. A.; Sanders, G. B.; Mazanek, D. D.; Barbee, B. W.; Mink, R. G.; Landis, R. R.; Adamo, D. R.; Johnson, L. N.; Yeomans, D. K.; Reeves, D. M.; Drake, B. G.; Friedensen, V. P.

    2012-12-01

    Considerations: These missions would be the first human expeditions to interplanetary bodies beyond the Earth-Moon system and would prove useful for testing technologies required for human missions to Mars, Phobos and Deimos, and other Solar System destinations. Current analyses of operational concepts suggest that stay times of 15 to 30 days may be possible at a NEA with total mission duration limits of 180 days or less. Hence, these missions would undoubtedly provide a great deal of technical and engineering data on spacecraft operations for future human space exploration while simultaneously conducting detailed investigations of these primitive objects with instruments and equipment that exceed the mass and power capabilities delivered by robotic spacecraft. All of these activities will be vital for refinement of resource characterization/identification and development of extraction/utilization technologies to be used on airless bodies under low- or micro-gravity conditions. In addition, gaining enhanced understanding of a NEA's geotechnical properties and its gross internal structure will assist the development of hazard mitigation techniques for planetary defense. Conclusions: The scientific, resource utilization, and hazard mitigation benefits, along with the programmatic and operational benefits of a human venture beyond the Earth-Moon system, make a piloted sample return mission to a NEA using NASA's proposed human exploration systems a compelling endeavor.

  15. Nitrogen Supply Influences Herbivore-Induced Direct and Indirect Defenses and Transcriptional Responses in Nicotiana attenuata[w

    Science.gov (United States)

    Lou, Yonggen; Baldwin, Ian T.

    2004-01-01

    Although nitrogen (N) availability is known to alter constitutive resistance against herbivores, its influence on herbivore-induced responses, including signaling pathways, transcriptional signatures, and the subsequently elicited chemical defenses is poorly understood. We used the native tobacco, Nicotiana attenuata, which germinates in the postfire environment and copes with large changes in soil N during postfire succession, to compare a suite of Manduca sexta- and elicitor-induced responses in plants grown under high- and low-N (LN) supply rates. LN supply decreased relative growth rates and biomass by 35% at 40 d compared to high-N plants; furthermore, it also attenuated (by 39 and 60%) the elicitor-induced jasmonate and salicylate bursts, two N-intensive direct defenses (nicotine and trypsin proteinase inhibitors, albeit by different mechanisms), and carbon-containing nonvolatile defenses (rutin, chlorogenic acid, and diterpene glycosides), but did not affect the induced release of volatiles (cis-α-bergamotene and germacrene A), which function as indirect defenses. M. sexta and methyl jasmonate-induced transcriptional responses measured with a microarray enriched in herbivore-induced genes were also substantially reduced in plants grown under LN supply rates. In M. sexta-attacked LN plants, only 36 (45%) up-regulated and 46 (58%) down-regulated genes showed the same regulation as those in attacked high-N plants. However, transcriptional responses frequently directly countered the observed metabolic changes. Changes in a leaf's sensitivity to elicitation, an attacked leaf's waning ability to export oxylipin wound signals, and/or resource limitations in LN plants can account for the observed results, underscoring the conclusion that defense activation is a resource-intensive response. PMID:15133153

  16. A change of course: The importance to DoD of international standards for electronic commerce

    Science.gov (United States)

    Payne, Judith E.

    1991-12-01

    The U.S. Department of Defense (DoD) is committed to using electronic commerce in the future with the over 300,000 vendors interested in doing business with DoD. Electronic commerce will move DoD from a paper-based world to one based on electronic transactions enabled by the exchange of formatted, electronic messages referred to as electronic data interchange (EDI). With electronic commerce, DoD plans to reduce costs, increase effectiveness, and make it easier for vendors to deal with DoD. Benefits from electronic commerce are enhanced when many businesses use the same standards for EDI messages themselves and their transmission. The fewer standards used, the less time and resources must be spent translating messages and agreeing on how to use different standards. To enhance benefits and smooth the transition to electronic commerce for itself and its vendors, DoD has chosen to use the widely accepted American National Standards Institute (ANSI) X12 standards for EDI messages, coupled with international standards for delivering messages and organizing addresses. In the past 18 months, EDI standards sponsored by a United Nations body and serving the same purpose as ANSI X12 message standards have begun to gain wider acceptance internationally.

  17. Leaf habit does not determine the investment in both physical and chemical defences and pair-wise correlations between these defensive traits.

    Science.gov (United States)

    Moreira, X; Pearse, I S

    2017-05-01

    Plant life-history strategies associated with resource acquisition and economics (e.g. leaf habit) are thought to be fundamental determinants of the traits and mechanisms that drive herbivore pressure, resource allocation to plant defensive traits, and the simultaneous expression (positive correlations) or trade-offs (negative correlations) between these defensive traits. In particular, it is expected that evergreen species - which usually grow slower and support constant herbivore pressure in comparison with deciduous species - will exhibit higher levels of both physical and chemical defences and a higher predisposition to the simultaneous expression of physical and chemical defensive traits. Here, by using a dataset which included 56 oak species (Quercus genus), we investigated whether leaf habit of plant species governs the investment in both physical and chemical defences and pair-wise correlations between these defensive traits. Our results showed that leaf habit does not determine the production of most leaf physical and chemical defences. Although evergreen oak species had higher levels of leaf toughness and specific leaf mass (physical defences) than deciduous oak species, both traits are essentially prerequisites for evergreenness. Similarly, our results also showed that leaf habit does not determine pair-wise correlations between defensive traits because most physical and chemical defensive traits were simultaneously expressed in both evergreen and deciduous oak species. Our findings indicate that leaf habit does not substantially contribute to oak species differences in plant defence investment. © 2017 German Botanical Society and The Royal Botanical Society of the Netherlands.

  18. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  19. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  20. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  1. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  2. The roots of defense: plant resistance and tolerance to belowground herbivory.

    Directory of Open Access Journals (Sweden)

    Sean M Watts

    2011-04-01

    Full Text Available There is conclusive evidence that there are fitness costs of plant defense and that herbivores can drive selection for defense. However, most work has focused on above-ground interactions, even though belowground herbivory may have greater impacts on individual plants than above-ground herbivory. Given the role of belowground plant structures in resource acquisition and storage, research on belowground herbivores has much to contribute to theories on the evolution of plant defense. Pocket gophers (Geomyidae provide an excellent opportunity to study root herbivory. These subterranean rodents spend their entire lives belowground and specialize on consuming belowground plant parts.We compared the root defenses of native forbs from mainland populations (with a history of gopher herbivory to island populations (free from gophers for up to 500,000 years. Defense includes both resistance against herbivores and tolerance of herbivore damage. We used three approaches to compare these traits in island and mainland populations of two native California forbs: 1 Eschscholzia californica populations were assayed to compare alkaloid deterrents, 2 captive gophers were used to test the palatability of E. californica roots and 3 simulated root herbivory assessed tolerance to root damage in Deinandra fasciculata and E. californica. Mainland forms of E. californica contained 2.5 times greater concentration of alkaloids and were less palatable to gophers than island forms. Mainland forms of D. fasciculata and, to a lesser extent, E. californica were also more tolerant of root damage than island conspecifics. Interestingly, undamaged island individuals of D. fasciculata produced significantly more fruit than either damaged or undamaged mainland individuals.These results suggest that mainland plants are effective at deterring and tolerating pocket gopher herbivory. Results also suggest that both forms of defense are costly to fitness and thus reduced in the absence of

  3. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  4. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  5. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    Science.gov (United States)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  6. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  7. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  8. The journal of medical chemical, biological and radiological defense, an update

    International Nuclear Information System (INIS)

    Price, B. B. S.; Peitersen, L.E.

    2009-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense (www.JMedCBR.org) is a peer-reviewed scientific online journal focusing on the biology, chemistry, physiology, toxicology and treatment of exposure to threat agents. JMedCBR provides a central international forum for the publication of current research and development information on medical chemical, biological and radiological defense, as well as training, doctrine, and problems related to chemical, biological and radiological casualties. JMedCBR is sponsored by the US Defense Threat Reduction Agency (DTRA) Chem-Bio Technologies Directorate as part of its scientific outreach program in chemical and biological defense solutions for the Department of Defense. In addition to scientific and medical research, JMedCBR hosts an archive of related papers from authors in the field. Although organized into annual issues, articles are published on the web continuously. The complete JMedCBR is published electronically and is made available to the scientific community free of charge. JMedCBR is committed to providing its readers with quality scientific information and critical analyses. All submissions are peer-reviewed by an editorial board of recognized and respected international scientists who represent expertise in different aspects of medical chemical, biological and radiological defense. Contributions to JMedCBR must be original works of the author(s) and must not have been previously published or simultaneously submitted to other publications. The author(s) transfer the copyright of articles published in JMedCBR to the journal. A copyright transfer form must accompany each manuscript submission. For more information on submitting to JMedCBR, see the Authors' Guide, available at http://www.jmedcbr.org/authorGuide.html.(author)

  9. U.S. Department of Defense Multiple-Parameter Biodosimetry Network

    International Nuclear Information System (INIS)

    Blakely, William F.; Hoefer, Matthew H.; Huff, L. Andrew; Romanyukha, Alexander; Hayes, Selena M.; Williams, Anthony; Sharp, Thad; Reyes, Ricardo A.; Stewart, H. Michael Jr

    2016-01-01

    The U.S. Department of Defense (US-DOD) service members are at risk of exposure to ionizing radiation due to radiation accidents, terrorist attacks and national defense activities. The use of biodosimetry is a standard of care for the triage and treatment of radiation injuries. Resources and procedures need to be established to implement a multiple-parameter biodosimetry system coupled with expert medial guidance to provide an integrated radiation diagnostic system to meet US-DOD requirements. Current US-DOD biodosimetry capabilities were identified and recommendations to fill the identified gaps are provided. A US-DOD Multi-parametric Biodosimetry Network, based on the expertise that resides at the Armed Forces Radiobiology Research Institute and the Naval Dosimetry Center, was designed. This network based on the use of multiple biodosimetry modalities would provide diagnostic and triage capabilities needed to meet US-DOD requirements. These are not available with sufficient capacity elsewhere but could be needed urgently after a major radiological/nuclear event. (authors)

  10. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  11. Using mobile electronic devices to deliver educational resources in developing countries.

    Science.gov (United States)

    Mazal, Jonathan Robert; Ludwig, Rebecca

    2015-01-01

    Developing countries have far fewer trained radiography professionals than developed countries, which exacerbates the limited access to imaging services. The lack of trained radiographers reflects, in part, limited availability of radiographer-specific educational resources. Historically, organizations that provided such resources in the developing world faced challenges related to the limited stock of current materials as well as expenses associated with shipping and delivery. Four mobile electronic devices (MEDs) were loaded with educational content (e-books, PDFs, and digital applications) spanning major radiography topics. The MEDs were distributed to 4 imaging departments in Ghana, India, Nepal, and Nigeria based on evidence of need for radiography-specific resources, as revealed by survey responses. A cost comparison of postal delivery vs digital delivery of educational content was performed. The effectiveness of delivering additional content via Wi-Fi transmission also was evaluated. Feedback was solicited on users' experience with the MEDs as a delivery tool for educational content. An initial average per e-book expense of $30.05, which included the cost of the device, was calculated for the MED delivery method compared with $15.56 for postal delivery of printed materials. The cost of the MED delivery method was reduced to an average of $10.05 for subsequent e-book deliveries. Additional content was successfully delivered via Wi-Fi transmission to all recipients during the 3-month follow-up period. Overall user feedback on the experience was positive, and ideas for enhancing the MED-based method were identified. Using MEDs to deliver radiography-specific educational content appears to be more cost effective than postal delivery of printed materials on a long-term basis. MEDs are more efficient for providing updates to educational materials. Customization of content to department needs, and using projector devices could enhance the usefulness of MEDs for

  12. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  13. Success criteria for electronic medical record implementations in low-resource settings: a systematic review.

    Science.gov (United States)

    Fritz, Fleur; Tilahun, Binyam; Dugas, Martin

    2015-03-01

    Electronic medical record (EMR) systems have the potential of supporting clinical work by providing the right information at the right time to the right people and thus make efficient use of resources. This is especially important in low-resource settings where reliable data are also needed to support public health and local supporting organizations. In this systematic literature review, our objectives are to identify and collect literature about success criteria of EMR implementations in low-resource settings and to summarize them into recommendations. Our search strategy relied on PubMed queries and manual bibliography reviews. Studies were included if EMR implementations in low-resource settings were described. The extracted success criteria and measurements were summarized into 7 categories: ethical, financial, functionality, organizational, political, technical, and training. We collected 381 success criteria with 229 measurements from 47 articles out of 223 articles. Most papers were evaluations or lessons learned from African countries, published from 1999 to 2013. Almost half of the EMR systems served a specific disease area like human immunodeficiency virus (HIV). The majority of criteria that were reported dealt with the functionality, followed by organizational issues, and technical infrastructures. Sufficient training and skilled personnel were mentioned in roughly 10%. Political, ethical, and financial considerations did not play a predominant role. More evaluations based on reliable frameworks are needed. Highly reliable data handling methods, human resources and effective project management, as well as technical architecture and infrastructure are all key factors for successful EMR implementation. © The Author 2015. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Allometry of individual reproduction and defense in eusocial colonies: A comparative approach to trade-offs in social sponge-dwelling Synalpheus shrimps.

    Directory of Open Access Journals (Sweden)

    Sarah L Bornbusch

    Full Text Available Eusociality, one of the most complex forms of social organization, is thought to have evolved in several animal clades in response to competition for resources and reproductive opportunities. Several species of snapping shrimp in the genus Synalpheus, the only marine organisms known to exhibit eusociality, form colonies characterized by high reproductive skew, and aggressive territoriality coupled with cooperative defense. In eusocial Synalpheus colonies, individual reproduction is limited to female 'queens', whose fecundity dictates colony growth. Given that individual reproduction and defense are both energetically costly, individual and colony fitness likely depend on the optimal allocation of resources by these reproducing individuals towards these potentially competing demands. Synalpheus species, however, display varying degrees of eusociality, suggesting that reproducing females have adopted different strategies for allocation among reproduction and defense. Here, we use structural equation modeling to characterize the relationships between the allometry of queen reproductive capacity and defensive weaponry, and colony size in six eusocial Synalpheus species, estimating trade-offs between reproduction and defense. We document strong trade-offs between mass of the fighting claw (defense and egg number (reproduction in queens from weakly eusocial species, while the trade-off is reduced or absent in those from strongly eusocial species. These results suggest that in less cooperative species, intra-colony conflict selects for queen retention of weapons that have significant costs to fecundity, while reproducing females from highly eusocial species, i.e., those with a single queen, have been able to reduce the cost of weapons as a result of protection by other colony members.

  15. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  16. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  17. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  18. Defense Acquisition Research Journal. Volume 20, Number 3, Issue 67, October 2013

    Science.gov (United States)

    2013-10-01

    National Security and Resource Strategy Dr. Keith Snider Naval Postgraduate School Dr. John Snoderly Defense Acquisition University Dr. David M. Tate... David M. Van Buren on our Research Advisory Board. Second, Mr. Jerry Vandewiele has replaced Dr. Don McKeon as the DAU Midwest representative on our...planning in particular—and has proven its value (Barzelay & Campbell, 2003; Berman & West, 1998; Berry & Wechsler , 1995; Boyne & Gould-Williams

  19. 78 FR 28756 - Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes...

    Science.gov (United States)

    2013-05-16

    ... Management Name Changes, Phase 1 Implementation (DFARS Case 2012- D053) AGENCY: Defense Acquisition... Excluded Parties Listing System (EPLS) databases into the System for Award Management (SAM) database. DATES... enacted in an effort to improve the management and promotion of electronic Government services and...

  20. Revisiting the Concept and Implementation of Defense-in-Depth

    International Nuclear Information System (INIS)

    Choi, Youngsung

    2013-01-01

    The subsequent tsunami, with its maximum wave height greater than the design basis, invalidated all layers of the Fukushima NPP. This raises the question on which of the philosophy or the implementation of DID fell short at Fukushima. This paper suggests several complements necessary to the concept of DID and new application practice in a wide variety of safety related objectives/areas/events. Since its conception, DID appears to have been successfully applied to the design and operation but less to the site, external events, resource requirements, the unexpected impacts of organization, etc. Thus, the horizontal as well as vertical application of DID is suggested. Here, the latter application means repeated questions of 'What if this fails?' and the former one means the application of DID to all the applicable objectives, which can be a real defense-in-width. It is widely accepted that defense-in-depth (DID) has been the core of safety philosophy in nuclear safety regulation. Its concept has been developed and refined over many years to go beyond physical barriers and design practices. The historical development of the concept led to a general structure of four physical barriers and five successive levels of defense. The accident at the Fukushima nuclear power plant (NPP) showed that multiple levels of defense could fail at the same time, demonstrated how these could work and how some were challenged, and gave the chance of the concept and implementation being improved. This paper examines the traditional concept and implementation strategies of DID, identifies some weaknesses in that, and suggest some complements and new approach to improving the application of DID

  1. Parasitism by Cuscuta pentagona attenuates host plant defenses against insect herbivores.

    Science.gov (United States)

    Runyon, Justin B; Mescher, Mark C; De Moraes, Consuelo M

    2008-03-01

    Considerable research has examined plant responses to concurrent attack by herbivores and pathogens, but the effects of attack by parasitic plants, another important class of plant-feeding organisms, on plant defenses against other enemies has not been explored. We investigated how attack by the parasitic plant Cuscuta pentagona impacted tomato (Solanum lycopersicum) defenses against the chewing insect beet armyworm (Spodoptera exigua; BAW). In response to insect feeding, C. pentagona-infested (parasitized) tomato plants produced only one-third of the antiherbivore phytohormone jasmonic acid (JA) produced by unparasitized plants. Similarly, parasitized tomato, in contrast to unparasitized plants, failed to emit herbivore-induced volatiles after 3 d of BAW feeding. Although parasitism impaired antiherbivore defenses, BAW growth was slower on parasitized tomato leaves. Vines of C. pentagona did not translocate JA from BAW-infested plants: amounts of JA in parasite vines grown on caterpillar-fed and control plants were similar. Parasitized plants generally contained more salicylic acid (SA), which can inhibit JA in some systems. Parasitized mutant (NahG) tomato plants deficient in SA produced more JA in response to insect feeding than parasitized wild-type plants, further suggesting cross talk between the SA and JA defense signaling pathways. However, JA induction by BAW was still reduced in parasitized compared to unparasitized NahG, implying that other factors must be involved. We found that parasitized plants were capable of producing induced volatiles when experimentally treated with JA, indicating that resource depletion by the parasite does not fully explain the observed attenuation of volatile response to herbivore feeding. Collectively, these findings show that parasitic plants can have important consequences for host plant defense against herbivores.

  2. U.S. Air Force Information Resources Management: An Exploratory Study of Policy

    National Research Council Canada - National Science Library

    Munoz, Brian

    1998-01-01

    .... Information Resources Management (IRM) was established within the Department of Defense (DoD) in 1983 as a tool for better managing its information in the wake of automated information processing and sharing...

  3. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  4. The New Structure of Brazilian Ministry of Defense: Challenges and Opportunities

    Science.gov (United States)

    2011-03-04

    in the prominent northeast were called “ Trampoline to Victory.”3 Because of difficulties with mobilization, preparation and training at American...technology. These three departments of the Joint Staff of Armed Forces will be headed by general officers of the last rank in active duty from each Service...primarily on human resources. The leadership process 21 is guaranteed with Minister Nelson Jobim as head of the Ministry of Defense in the next

  5. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  6. Defence electronics industry profile, 1990-1991

    Science.gov (United States)

    The defense electronics industry profiled in this review comprises an estimated 150 Canadian companies that develop, manufacture, and repair radio and communications equipment, radars for surveillance and navigation, air traffic control systems, acoustic and infrared sensors, computers for navigation and fire control, signal processors and display units, special-purpose electronic components, and systems engineering and associated software. Canadian defense electronics companies generally serve market niches and end users of their products are limited to the military, government agencies, or commercial airlines. Geographically, the industry is concentrated in Ontario and Quebec, where about 91 percent of the industry's production and employment is found. In 1989, the estimated revenue of the industry was $2.36 billion, and exports totalled an estimated $1.4 billion. Strengths and weaknesses of the industry are discussed in terms of such factors as the relatively small size of Canadian companies, the ability of Canadian firms to access research and development opportunities and export markets in the United States, the dependence on foreign-made components, and international competition.

  7. Building Stakeholder Trust: Defensible Government Decisions - 13110

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

    2013-07-01

    front-end of the process reaps rewards far more efficiently than attempts to assuage and mitigate the concerns of those parties after the fact and there are a number of tools Savannah River Remediation (SRR) has deployed that render transparency an ally in this context. The makers, applicators, and beneficiaries of policies and decisions will all benefit from strong administrative records which document decisional choices in an open and transparent manner and from timely, up-front management of concerns of interested parties. The strongest defense to decisional challenges is an ability to demonstrate the basis of the decision and the reason(s) that the decision was chosen over other alternatives. Providing a sound basis for defending challenges rather than avoiding or fighting over them allows the deciding entity the greatest opportunity to produce value for its customer. Often, a transparent process that invites public participation and is open for public review and comment will thwart challenge genesis. An entity that has to devote resources to defending its choices obviously cannot utilize those resources to further its mission. (authors)

  8. Building Stakeholder Trust: Defensible Government Decisions - 13110

    International Nuclear Information System (INIS)

    Franklin, Victor A.

    2013-01-01

    the process reaps rewards far more efficiently than attempts to assuage and mitigate the concerns of those parties after the fact and there are a number of tools Savannah River Remediation (SRR) has deployed that render transparency an ally in this context. The makers, applicators, and beneficiaries of policies and decisions will all benefit from strong administrative records which document decisional choices in an open and transparent manner and from timely, up-front management of concerns of interested parties. The strongest defense to decisional challenges is an ability to demonstrate the basis of the decision and the reason(s) that the decision was chosen over other alternatives. Providing a sound basis for defending challenges rather than avoiding or fighting over them allows the deciding entity the greatest opportunity to produce value for its customer. Often, a transparent process that invites public participation and is open for public review and comment will thwart challenge genesis. An entity that has to devote resources to defending its choices obviously cannot utilize those resources to further its mission. (authors)

  9. Plant neighbor identity influences plant biochemistry and physiology related to defense.

    Science.gov (United States)

    Broz, Amanda K; Broeckling, Corey D; De-la-Peña, Clelia; Lewis, Matthew R; Greene, Erick; Callaway, Ragan M; Sumner, Lloyd W; Vivanco, Jorge M

    2010-06-17

    Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa) or heterospecific (Festuca idahoensis) plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  10. 75 FR 57906 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2010-09-23

    ... publication of this notice. FOR FURTHER INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management Division, Defense Contract Audit Agency, 8725 John J. Kingman Road, Suite 2133, Fort Belvoir... following are the names and titles of DCAA career executives appointed to serve as members of the DCAA...

  11. 76 FR 59664 - Membership of the Defense Contract Audit Agency Senior Executive Service Performance Review Boards

    Science.gov (United States)

    2011-09-27

    ... Date: Upon publication of this notice. FOR FURTHER INFORMATION CONTACT: Sandra L. Burrell, Chief, Human Resources Management Division, Defense Contract Audit Agency, 8725 John J. Kingman Road, Suite 2133, Fort...(c)(4), the following are the names and titles of DCAA career executives appointed to serve as...

  12. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  13. 78 FR 35262 - Detection and Avoidance of Counterfeit Electronic Parts

    Science.gov (United States)

    2013-06-12

    ... experts and interested parties in Government and the private sector regarding the electronic parts... Avoidance of Counterfeit Electronic Parts AGENCY: Defense Acquisition Regulations System, Department of... interested parties in Government and the private sector about the requirements for detection and avoidance of...

  14. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  15. Radar coordination and resource management in a distributed sensor network using emergent control

    Science.gov (United States)

    Weir, B. S.; Sokol, T. M.

    2009-05-01

    As the list of anti-air warfare and ballistic missile defense missions grows, there is an increasing need to coordinate and optimize usage of radar resources across the netted force. Early attempts at this optimization involved top-down control mechanisms whereby sensors accept resource tasking orders from networked tracking elements. These approaches rely heavily on uncertain knowledge of sensor constraints and capabilities. Furthermore, advanced sensor systems may support self-defense missions of the host platform and are therefore unable to relinquish control to an external function. To surmount these issues, the use of bottom-up emergent control techniques is proposed. The information necessary to make quality, network-wide resource allocations is readily available to sensor nodes with access to a netted track picture. By assessing resource priorities relative to the network (versus local) track picture, sensors can understand the contribution of their resources to the netted force. This allows the sensors to apply resources where most needed and remove waste. Furthermore, simple local rules for resource usage, when properly constructed, allow sensors to obtain a globally optimal resource allocation without direct coordination (emergence). These results are robust to partial implementation (i.e., not all nodes upgraded at once) and failures on individual nodes (whether from casualty or reallocation to other sensor missions), and they leave resource control decisions in the hands of the sensor systems instead of an external function. This paper presents independent research and development work on emergent control of sensor resources and the impact to resource allocation and tracking performance.

  16. Electronic Human Resources Management (e-HRM Adoption Studies: Past and Future Research

    Directory of Open Access Journals (Sweden)

    Winarto Winarto

    2018-05-01

    Full Text Available Electronic human resource management (e-HRM systems become more widely used by profit and non-profit organization. However, the field currently lacks sound theoretical frameworks that can be useful in addressing a key issue concerning the implementation of e-HRM systems, in particular to obtain a better understanding of the factors influencing the adoption of e-HRM systems. The objective of this paper is to provide a foundation towards the development of a theoretical framework for the implementation of e-HRM systems and develop a conceptual model that would reflect the nature of e-HRM systems’ adoption through systematic literature review. Adopting Crossan and Apaydin’s procedure of systematic review, this paper investigated 21 empirical papers of electronics human resources management, then categorized them into 4 characteristics which influence the adoption; System and technology characteristics; Organizational characteristics; User/individual characteristics, and Environmental and contextual characteristics. Finally, the e-HRM adoption research framework is drawn and based on the framework; avenues for future research are discussed.   Bahasa Indonesia Abstrak: Manajemen sumber daya manusia elektronik (selanjutnya disebut dengan e-HRM semakin banyak digunakan oleh organisasi profit dan nonprofit. Namun, bidang dan topik ini belum memiliki kerangka teori yang mapan, yang dapat digunakan untuk menganalisis isu-isu terkait penerapan e-HRM, terutama mengenai faktor-faktor yang mempengaruhi adopsi sistem e-HRM. Tujuan penelitian ini adalah untuk memberikan landasan bagi pengembangan kerangka teoritis untuk implementasi sistem e-HRM dan mengembangkan model konseptual yang akan menggambarkan adopsi sistem e-HRM melalui tinjauan literatur sistematis. Mengadopsi prosedur dan metode Crossan dan Apaydin untuk melakukan telaah literatur secara sistematis, paper ini menyelidiki 21 publikasi empiris manajemen sumber daya manusia elektronik dari 2

  17. Defense Acquisition Research Journal. Volume 23, Number 4, Issue 79, October 2016

    Science.gov (United States)

    2016-10-01

    avoid conflicting expectations. The book ends with the ninth step, which offers new managers an approach they refer to as “The Four Pillars of Self...University Dr. William T. Eliason Dwight D. Eisenhower School for National Security and Resource Strategy Dr. J. Ronald Fox Harvard Business School Mr...and Layout The C3 Group &Schatz Publishing Group CONTENTS | Featured Book Reviews A Publication of the Defense Acquisition University October 2016

  18. Defense-Waste-Processing Faclity, Savannah River Plant, Aiken, SC: Draft environmental impact statement

    International Nuclear Information System (INIS)

    1981-09-01

    The purpose of this Environmental Impact Statement (EIS) is to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste (HLW) currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility (DWPF) at the SRP site. The SRP is a major US Department of Energy (DOE) installation for the production of nuclear materials for national defense. Approximately 83 x 10 3 m 3 (22 million gal) of HLW currently are stored in tanks at the SRP site. The proposed DWPF would process the liquid HLW generated by SRP operations into a stable form for ultimate disposal. This EIS assesses the effects of the proposed immobilization project on land use, air quality, water quality, ecological systems, health risk, cultural resources, endangered species, wetlands protection, resource depletion, and regional social and economic systems. The radiological and nonradiological risks of transporting the immobilized wastes are assessed. The environmental impacts of disposal alternatives have recently been evaluated in a previous EIS and are therefore only summarized in this EIS

  19. Defense Waste Processing Facility: Savannah River Plant, Aiken, SC. Final environmental impact statement

    International Nuclear Information System (INIS)

    1982-02-01

    The purpose of this Environmental Impact Statement (EIS) is to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste (HLW) currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility (DWPF) at the SRP site. The SRP is a major US Department of Envgy (DOE) installation for the production of nuclear materials for national defense. Approximately 83 x 10 3 m 3 (22 million gal) of HLW currently are stored in tanks at the SRP site. The proposed DWPF would process the liquid HLW generated by SRP operations into a stable form for ultimate disposal. This EIS assesses the effects of the proposed immobilization project on land use, air quality, water quality, ecological systems, health risk, cultural resources, endangered species, wetlands protection, resource depletion, and regional social and economic systems. The radiological and nonradiological risks of transporting the immobilized wastes are assessed. The environmental impacts of disposal alternatives have recently been evaluated in a previous EIS and are therefore only summarized in this EIS

  20. Improving Electronic Resources through Holistic Budgeting

    Science.gov (United States)

    Kusik, James P.; Vargas, Mark A.

    2009-01-01

    To establish a more direct link between its collections and the educational goals of Saint Xavier University, the Byrne Memorial Library has adopted a "holistic" approach to collection development. This article examines how traditional budget practices influenced the library's selection of resources and describes how holistic collection…

  1. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  2. A PROMISING MECHANISM FOR FINANCING THE NATIONAL ECONOMY, SECURITY AND DEFENSE OF UKRAINE

    OpenAIRE

    Dmitry Klinovoi, Peter Rogov

    2017-01-01

    The principles of the permanent financing of necessities of state development, national safety and defensive due to forming of legal institute of civil property on natural resources and mechanisms of the sovereign financing by receivabless from natural rent are grounded here. The description of sovereign fund and fund of civil dividends as institutes of accumulation of state facilities and management of assets is given here.

  3. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  4. Clinician‐selected Electronic Information Resources do not Guarantee Accuracy in Answering Primary Care Physicians’ Information Needs. A review of: McKibbon, K. Ann, and Douglas B. Fridsma. “Effectiveness of Clinician‐selected Electronic Information Resources for Answering Primary Care Physicians’ Information Needs.” Journal of the American Medical Informatics Association 13.6 (2006: 653‐9.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2008-03-01

    Full Text Available Objective – To determine if electronic information resources selected by primary care physicians improve their ability to answer simulated clinical questions.Design – An observational study utilizing hour‐long interviews and think‐aloud protocols.Setting – The offices and clinics of primary care physicians in Canada and the United States.Subjects – Twenty‐five primary care physicians of whom 4 were women, 17 were from Canada, 22 were family physicians,and 24 were board certified.Methods – Participants provided responses to 23 multiple‐choice questions. Each physician then chose two questions and looked for the answers utilizing information resources of their own choice. The search processes, chosen resources and search times were noted. These were analyzed along with data on the accuracy of the answers and certainties related to the answer to each clinical question prior to the search.Main results – Twenty‐three physicians sought answers to 46 simulated clinical questions. Utilizing only electronic information resources, physicians spent a mean of 13.0 (SD 5.5 minutes searching for answers to the questions, an average of 7.3(SD 4.0 minutes for the first question and 5.8 (SD 2.2 minutes to answer the second question. On average, 1.8 resources were utilized per question. Resources that summarized information, such as the Cochrane Database of Systematic Reviews, UpToDate and Clinical Evidence, were favored 39.2% of the time, MEDLINE (Ovid and PubMed 35.7%, and Internet resources including Google 22.6%. Almost 50% of the search and retrieval strategies were keyword‐based, while MeSH, subheadings and limiting were used less frequently. On average, before searching physicians answered 10 of 23 (43.5% questions accurately. For questions that were searched using clinician‐selected electronic resources, 18 (39.1% of the 46 answers were accurate before searching, while 19 (42.1% were accurate after searching. The difference of

  5. Parasitism by Cuscuta pentagona Attenuates Host Plant Defenses against Insect Herbivores1

    Science.gov (United States)

    Runyon, Justin B.; Mescher, Mark C.; De Moraes, Consuelo M.

    2008-01-01

    Considerable research has examined plant responses to concurrent attack by herbivores and pathogens, but the effects of attack by parasitic plants, another important class of plant-feeding organisms, on plant defenses against other enemies has not been explored. We investigated how attack by the parasitic plant Cuscuta pentagona impacted tomato (Solanum lycopersicum) defenses against the chewing insect beet armyworm (Spodoptera exigua; BAW). In response to insect feeding, C. pentagona-infested (parasitized) tomato plants produced only one-third of the antiherbivore phytohormone jasmonic acid (JA) produced by unparasitized plants. Similarly, parasitized tomato, in contrast to unparasitized plants, failed to emit herbivore-induced volatiles after 3 d of BAW feeding. Although parasitism impaired antiherbivore defenses, BAW growth was slower on parasitized tomato leaves. Vines of C. pentagona did not translocate JA from BAW-infested plants: amounts of JA in parasite vines grown on caterpillar-fed and control plants were similar. Parasitized plants generally contained more salicylic acid (SA), which can inhibit JA in some systems. Parasitized mutant (NahG) tomato plants deficient in SA produced more JA in response to insect feeding than parasitized wild-type plants, further suggesting cross talk between the SA and JA defense signaling pathways. However, JA induction by BAW was still reduced in parasitized compared to unparasitized NahG, implying that other factors must be involved. We found that parasitized plants were capable of producing induced volatiles when experimentally treated with JA, indicating that resource depletion by the parasite does not fully explain the observed attenuation of volatile response to herbivore feeding. Collectively, these findings show that parasitic plants can have important consequences for host plant defense against herbivores. PMID:18165323

  6. Review of material recovery from used electric and electronic equipment-alternative options for resource conservation.

    Science.gov (United States)

    Friege, Henning

    2012-09-01

    For waste from electric and electronic equipment, the WEEE Directive stipulates the separate collection of electric and electronic waste. As to new electric and electronic devices, the Restriction of Hazardous Substances (RoHS) Directive bans the use of certain chemicals dangerous for man and environment. From the implementation of the WEEE directive, many unsolved problems have been documented: poor collection success, emission of dangerous substances during collection and recycling, irretrievable loss of valuable metals among others. As to RoHS, data from the literature show a satisfying success. The problems identified in the process can be reduced to some basic dilemmas at the borders between waste management, product policy and chemical safety. The objectives of the WEEE Directive and the specific targets for use and recycling of appliances are not consistent. There is no focus on scarce resources. Extended producer responsibility is not sufficient to guarantee sustainable waste management. Waste management reaches its limits due to problems of implementation but also due to physical laws. A holistic approach is necessary looking at all branch points and sinks in the stream of used products and waste from electric and electronic equipment. This may be done with respect to the general rules for sustainable management of material streams covering the three dimensions of sustainable policy. The relationships between the players in the field of electric and electronic devices have to be taken into account. Most of the problems identified in the implementation process will not be solved by the current amendment of the WEEE Directive.

  7. Charting a Course through CORAL: Texas A&M University Libraries' Experience Implementing an Open-Source Electronic Resources Management System

    Science.gov (United States)

    Hartnett, Eric; Beh, Eugenia; Resnick, Taryn; Ugaz, Ana; Tabacaru, Simona

    2013-01-01

    In 2010, after two previous unsuccessful attempts at electronic resources management system (ERMS) implementation, Texas A&M University (TAMU) Libraries set out once again to find an ERMS that would fit its needs. After surveying the field, TAMU Libraries selected the University of Notre Dame Hesburgh Libraries-developed, open-source ERMS,…

  8. Discussion and practice of information work in defense enterprises or institutes at the basic level

    International Nuclear Information System (INIS)

    Hu Junyong

    2010-01-01

    With the advent of an epoch when national economy and society is information-based and information transmission is predominantly implemented through networks and information carrier is characterized by digitalisation, information workers in defense enterprises or institutes at the basic level are faced with unprecedented pressures and at the same time with new opportunities and challenges. The integration of information resources with library resources can bring the resources into play effectively and efficiently, thus being propitious to information work. Demand orientation and deepening of services are the foundations for the existence and development of information team or department in theses enterprise or institutes. Resources construction in terms of literature and qualified information workers is the foundation for information work and can safeguard the development of information work in these enterprises or institutes. (author)

  9. Plant neighbor identity influences plant biochemistry and physiology related to defense

    Directory of Open Access Journals (Sweden)

    Callaway Ragan M

    2010-06-01

    Full Text Available Abstract Background Chemical and biological processes dictate an individual organism's ability to recognize and respond to other organisms. A small but growing body of evidence suggests that plants may be capable of recognizing and responding to neighboring plants in a species specific fashion. Here we tested whether or not individuals of the invasive exotic weed, Centaurea maculosa, would modulate their defensive strategy in response to different plant neighbors. Results In the greenhouse, C. maculosa individuals were paired with either conspecific (C. maculosa or heterospecific (Festuca idahoensis plant neighbors and elicited with the plant defense signaling molecule methyl jasmonate to mimic insect herbivory. We found that elicited C. maculosa plants grown with conspecific neighbors exhibited increased levels of total phenolics, whereas those grown with heterospecific neighbors allocated more resources towards growth. To further investigate these results in the field, we conducted a metabolomics analysis to explore chemical differences between individuals of C. maculosa growing in naturally occurring conspecific and heterospecific field stands. Similar to the greenhouse results, C. maculosa individuals accumulated higher levels of defense-related secondary metabolites and lower levels of primary metabolites when growing in conspecific versus heterospecific field stands. Leaf herbivory was similar in both stand types; however, a separate field study positively correlated specialist herbivore load with higher densities of C. maculosa conspecifics. Conclusions Our results suggest that an individual C. maculosa plant can change its defensive strategy based on the identity of its plant neighbors. This is likely to have important consequences for individual and community success.

  10. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  11. Designing a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology

    Directory of Open Access Journals (Sweden)

    Mirali Seyednaghavi

    2017-06-01

    Full Text Available : In the first phase of this study a model for electronic human resource management in government agencies based on new public services was explored by using software MAXQDA, then in the second phase, relationship between the elements of the theory were tested using software Smart PLS2. So the aim of this study is to design a model of electronic human resource management’s implementation at the Ministry of Communications and Information Technology. In this regard, according to Strauss and Corbin’s structured plan, five hypotheses were tested. Quantitative data analysis indicates that the pressures of the policies and global perspectives cause to move toward e-HRM. Among the contextual conditions macro structural mechanisms, considerations of actors, governance considerations have a significant impact on the strategy of new public services and therefore lead to the consequences of its implementation in public organizations. The findings suggest that e-HRM does not have a positive and meaningful impact on new public services, and in our country, although the recent political developments have somehow removed the gap between public policy makers, administrators, and the public, but there is still a long way to go.

  12. Cooperative Electronic Attack using Unmanned Air Vehicles

    National Research Council Canada - National Science Library

    Mears, Mark J

    2006-01-01

    ... that are salient in the context of cooperative control. The utility of electronic attack is described in the context of integrated air defense systems that rely on RADAR sites that act as a network to gather information about potential airborne threats...

  13. Pair bond endurance promotes cooperative food defense and inhibits conflict in coral reef butterflyfishes

    KAUST Repository

    Nowicki, Jessica; Walker, Stefan; Coker, Darren James; Hoey, Andrew; Nicolet, Katia; Pratchett, Morgan

    2017-01-01

    Pair bonding is generally linked to monogamous mating systems, where the reproductive benefits of extended mate guarding and/or of bi-parental care are considered key adaptive functions. However, in some species, including coral reef butterflyfishes (f. Chaetodonitidae), pair bonding occurs in sexually immature and homosexual partners, and in the absence of parental care, suggesting there must be non-reproductive adaptive benefits of pair bonding. Here, we examined whether pair bonding butterflyfishes cooperate in defense of food, conferring direct benefits to one or both partners. Pairs of Chaetodon lunulatus and C. baronessa use contrasting cooperative strategies. In C. lunulatus, both partners mutually defend their territory, while in C. baronessa, males prioritize territory defence; conferring improvements in feeding and energy reserves in both sexes relative to solitary counterparts. We further demonstrate that partner fidelity contributes to this function by showing that re-pairing invokes intra-pair conflict and inhibits cooperatively-derived feeding benefits, and that partner endurance is required for these costs to abate. Overall, our results suggest that in butterflyfishes, pair bonding enhances cooperative defense of prey resources, ultimately benefiting both partners by improving food resource acquisition and energy reserves.

  14. Pair bond endurance promotes cooperative food defense and inhibits conflict in coral reef butterflyfishes

    KAUST Repository

    Nowicki, Jessica P

    2017-11-14

    Pair bonding is generally linked to monogamous mating systems, where the reproductive benefits of extended mate guarding and/or of bi-parental care are considered key adaptive functions. However, in some species, including coral reef butterflyfishes (f. Chaetodonitidae), pair bonding occurs in sexually immature and homosexual partners, and in the absence of parental care, suggesting there must be non-reproductive adaptive benefits of pair bonding. Here, we examined whether pair bonding butterflyfishes cooperate in defense of food, conferring direct benefits to one or both partners. Pairs of Chaetodon lunulatus and C. baronessa use contrasting cooperative strategies. In C. lunulatus, both partners mutually defend their territory, while in C. baronessa, males prioritize territory defence; conferring improvements in feeding and energy reserves in both sexes relative to solitary counterparts. We further demonstrate that partner fidelity contributes to this function by showing that re-pairing invokes intra-pair conflict and inhibits cooperatively-derived feeding benefits, and that partner endurance is required for these costs to abate. Overall, our results suggest that in butterflyfishes, pair bonding enhances cooperative defense of prey resources, ultimately benefiting both partners by improving food resource acquisition and energy reserves.

  15. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  16. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  17. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  18. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  19. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  20. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  1. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  2. The module of methodical support in system of electronic educational resources as the innovative element of the modern maintenance of formation

    Directory of Open Access Journals (Sweden)

    Ольга Николаевна Крылова

    2009-06-01

    Full Text Available The article introduces some results of research, which were devoted to evaluation of tearches' mobility to introduce innovations in the contents of education. The author considers innovative potential of modules of the methodical support for system of electronic educational resources.

  3. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  4. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  5. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  6. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  7. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  8. Impact of Electronic Resources and Usage in Academic Libraries in Ghana: Evidence from Koforidua Polytechnic & All Nations University College, Ghana

    Science.gov (United States)

    Akussah, Maxwell; Asante, Edward; Adu-Sarkodee, Rosemary

    2015-01-01

    The study investigates the relationship between impact of electronic resources and its usage in academic libraries in Ghana: evidence from Koforidua Polytechnic & All Nations University College, Ghana. The study was a quantitative approach using questionnaire to gather data and information. A valid response rate of 58.5% was assumed. SPSS…

  9. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  11. Internet and Electronic Information Management

    Science.gov (United States)

    2003-04-01

    technologies ) and information markets (buying and selling information ), and the competitors’ success or failures. Such factors are beyond the control of... technology , and 1-19 market pressures. They have to cooperate with other entities within their organizations to develop more innovative information ...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP014048 TITLE: Internet and Electronic Information Management

  12. Utilization of Electronic Information Resources by Undergraduate Students of University of Ibadan: A Case Study of Social Sciences and Education

    Science.gov (United States)

    Owolabi, Sola; Idowu, Oluwafemi A.; Okocha, Foluke; Ogundare, Atinuke Omotayo

    2016-01-01

    The study evaluated utilization of electronic information resources by undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan. The study adopted a descriptive survey design with a study population of 1872 undergraduates in the Faculties of Education and the Social Sciences in University of Ibadan, from which a…

  13. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  14. Shaping the Electronic Library--The UW-Madison Approach.

    Science.gov (United States)

    Dean, Charles W., Ed.; Frazier, Ken; Pope, Nolan F.; Gorman, Peter C.; Dentinger, Sue; Boston, Jeanne; Phillips, Hugh; Daggett, Steven C.; Lundquist, Mitch; McClung, Mark; Riley, Curran; Allan, Craig; Waugh, David

    1998-01-01

    This special theme section describes the University of Wisconsin-Madison's experience building its Electronic Library. Highlights include integrating resources and services; the administrative framework; the public electronic library, including electronic publishing capability and access to World Wide Web-based and other electronic resources;…

  15. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  16. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  17. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  18. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  19. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  20. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  1. The use of quality benchmarking in assessing web resources for the dermatology virtual branch library of the National electronic Library for Health (NeLH).

    Science.gov (United States)

    Kamel Boulos, M N; Roudsari, A V; Gordon, C; Muir Gray, J A

    2001-01-01

    In 1998, the U.K. National Health Service Information for Health Strategy proposed the implementation of a National electronic Library for Health to provide clinicians, healthcare managers and planners, patients and the public with easy, round the clock access to high quality, up-to-date electronic information on health and healthcare. The Virtual Branch Libraries are among the most important components of the National electronic Library for Health. They aim at creating online knowledge based communities, each concerned with some specific clinical and other health-related topics. This study is about the envisaged Dermatology Virtual Branch Libraries of the National electronic Library for Health. It aims at selecting suitable dermatology Web resources for inclusion in the forthcoming Virtual Branch Libraries after establishing preliminary quality benchmarking rules for this task. Psoriasis, being a common dermatological condition, has been chosen as a starting point. Because quality is a principal concern of the National electronic Library for Health, the study includes a review of the major quality benchmarking systems available today for assessing health-related Web sites. The methodology of developing a quality benchmarking system has been also reviewed. Aided by metasearch Web tools, candidate resources were hand-selected in light of the reviewed benchmarking systems and specific criteria set by the authors. Over 90 professional and patient-oriented Web resources on psoriasis and dermatology in general are suggested for inclusion in the forthcoming Dermatology Virtual Branch Libraries. The idea of an all-in knowledge-hallmarking instrument for the National electronic Library for Health is also proposed based on the reviewed quality benchmarking systems. Skilled, methodical, organized human reviewing, selection and filtering based on well-defined quality appraisal criteria seems likely to be the key ingredient in the envisaged National electronic Library for

  2. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  3. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  4. There is a Relationship between Resource Expenditures and Reference Transactions in Academic Libraries. A Review of: Dubnjakovic, A. (2012. Electronic resource expenditure and the decline in reference transaction statistics in academic libraries. Journal of Academic Librarianship, 38(2, 94-100. doi:10.1016/j.acalib.2012.01.001

    Directory of Open Access Journals (Sweden)

    Annie M. Hughes

    2013-03-01

    Full Text Available Objective – To provide an analysis of the impact of expenditures on electronic resourcesand gate counts on the increase or decrease in reference transactions.Design – Analysis of results of existing survey data from the National Center for Educational Statistics (NCES 2006 Academic Library Survey(ALS.Setting – Academic libraries in the United States.Subjects – 3925 academic library respondents.Methods – The author chose to use survey data collected from the 2006 ALS conducted bythe NCES. The survey included data on various topics related to academic libraries, but in the case of this study, the author chose to analyze three of the 193 variables included. The three variables: electronic books expenditure, computer hardware and software, and expenditures on bibliographic utilities, were combined into one variable called electronic resource expenditure. Gate counts were also considered as a variable. Electronic resource expenditure was also split as a variable into three groups: low, medium, and high. Multiple regression analysis and general linear modeling, along with tests of reliability, were employed. Main Results – The author determined that low, medium, and high spenders with regard to electronic resources exhibited differences in gate counts, and gate counts have an effect on reference transactions in any given week. Gate counts tend to not have much of an effect on reference transactions for the higher spenders, and higher spenders tend to have a higher number of reference transactions overall. Low spenders have lower gate counts and also a lower amount of reference transactions.Conclusion – The findings from this study show that academic libraries spending more on electronic resources also tend to have an increase with regard to reference transactions. The author also concludes that library spaces are no longer the determining factor with regard to number of reference transactions. Spending more on electronic resources is

  5. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  6. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  7. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  8. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    Science.gov (United States)

    2010-04-01

    thesis is a prima facie , Strength, Weakness, Opportunity and Threat (SWOT) analysis of both the NSC/DoD and the HSC/DHS security/defense...all true Muslims have an obligation to engage in violent acts with the aim of relieving the world of corrupt values and social demagoguery. Extremist...9426085 on December 26, 2009). 47 meet the obligations associated with the globalization of democracy, America must align resources in a well

  9. Electronic resources access and usage among the postgraduates of ...

    African Journals Online (AJOL)

    ... and usage among the postgraduates of a Nigerian University of Technology. ... faced by postgraduates in using e-resources include takes too much time to find, ... Resources, Access, Use, Postgraduat, Students, University, Technology, Nigeria ... By Country · List All Titles · Free To Read Titles This Journal is Open Access.

  10. 32 CFR 644.336 - Notices to Departments of Interior (DI); Health and Human Resources (HHR); Education; and Housing...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Notices to Departments of Interior (DI); Health and Human Resources (HHR); Education; and Housing and Urban Development (HUD). 644.336 Section 644.336... Departments of Interior (DI); Health and Human Resources (HHR); Education; and Housing and Urban Development...

  11. Destructive electronics from electrochemical-mechanically triggered chemical dissolution

    International Nuclear Information System (INIS)

    Sim, Kyoseung; Wang, Xu; Yu, Cunjiang; Li, Yuhang; Linghu, Changhong; Song, Jizhou; Gao, Yang

    2017-01-01

    The considerable need to enhance data and hardware security suggest one possible future for electronics where it is possible to destroy them and even make them disappear physically. This paper reports a type of destructive electronics which features fast transience from chemical dissolution on-demand triggered in an electrochemical-mechanical manner. The detailed materials, mechanics, and device construction of the destructive electronics are presented. Experiment and analysis of the triggered releasing and transience study of electronic materials, resistors and metal-oxide-semiconductor field effect transistors illustrate the key aspects of the destructive electronics. The reported destructive electronics is useful in a wide range of areas from security and defense, to medical applications (paper)

  12. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  13. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  14. Sweet Tetra-Trophic Interactions: Multiple Evolution of Nectar Secretion, a Defensive Extended Phenotype in Cynipid Gall Wasps.

    Science.gov (United States)

    Nicholls, James A; Melika, George; Stone, Graham N

    2017-01-01

    Many herbivores employ reward-based mutualisms with ants to gain protection from natural enemies. We examine the evolutionary dynamics of a tetra-trophic interaction in which gall wasp herbivores induce their host oaks to produce nectar-secreting galls, which attract ants that provide protection from parasitoids. We show that, consistent with other gall defensive traits, nectar secretion has evolved repeatedly across the oak gall wasp tribe and also within a single genus (Disholcaspis) that includes many nectar-inducing species. Once evolved, nectar secretion is never lost in Disholcaspis, consistent with high defensive value of this trait. We also show that evolution of nectar secretion is correlated with a transition from solitary to aggregated oviposition, resulting in clustered nectar-secreting galls, which produce a resource that ants can more easily monopolize. Such clustering is commonly seen in ant guard mutualisms. We suggest that correlated evolution between maternal oviposition and larval nectar induction traits has enhanced the effectiveness of this gall defense strategy.

  15. Electronic Safety Resource Tools -- Supporting Hydrogen and Fuel Cell Commercialization

    Energy Technology Data Exchange (ETDEWEB)

    Barilo, Nick F.

    2014-09-29

    The Pacific Northwest National Laboratory (PNNL) Hydrogen Safety Program conducted a planning session in Los Angeles, CA on April 1, 2014 to consider what electronic safety tools would benefit the next phase of hydrogen and fuel cell commercialization. A diverse, 20-person team led by an experienced facilitator considered the question as it applied to the eight most relevant user groups. The results and subsequent evaluation activities revealed several possible resource tools that could greatly benefit users. The tool identified as having the greatest potential for impact is a hydrogen safety portal, which can be the central location for integrating and disseminating safety information (including most of the tools identified in this report). Such a tool can provide credible and reliable information from a trustworthy source. Other impactful tools identified include a codes and standards wizard to guide users through a series of questions relating to application and specific features of the requirements; a scenario-based virtual reality training for first responders; peer networking tools to bring users from focused groups together to discuss and collaborate on hydrogen safety issues; and a focused tool for training inspectors. Table ES.1 provides results of the planning session, including proposed new tools and changes to existing tools.

  16. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  17. Transcriptome Analysis Reveals Candidate Genes involved in Blister Blight defense in Tea (Camellia sinensis (L) Kuntze)

    Science.gov (United States)

    Jayaswall, Kuldip; Mahajan, Pallavi; Singh, Gagandeep; Parmar, Rajni; Seth, Romit; Raina, Aparnashree; Swarnkar, Mohit Kumar; Singh, Anil Kumar; Shankar, Ravi; Sharma, Ram Kumar

    2016-07-01

    To unravel the molecular mechanism of defense against blister blight (BB) disease caused by an obligate biotrophic fungus, Exobasidium vexans, transcriptome of BB interaction with resistance and susceptible tea genotypes was analysed through RNA-seq using Illumina GAIIx at four different stages during ~20-day disease cycle. Approximately 69 million high quality reads were assembled de novo, yielding 37,790 unique transcripts with more than 55% being functionally annotated. Differentially expressed, 149 defense related transcripts/genes, namely defense related enzymes, resistance genes, multidrug resistant transporters, transcription factors, retrotransposons, metacaspases and chaperons were observed in RG, suggesting their role in defending against BB. Being present in the major hub, putative master regulators among these candidates were identified from predetermined protein-protein interaction network of Arabidopsis thaliana. Further, confirmation of abundant expression of well-known RPM1, RPS2 and RPP13 in quantitative Real Time PCR indicates salicylic acid and jasmonic acid, possibly induce synthesis of antimicrobial compounds, required to overcome the virulence of E. vexans. Compendiously, the current study provides a comprehensive gene expression and insights into the molecular mechanism of tea defense against BB to serve as a resource for unravelling the possible regulatory mechanism of immunity against various biotic stresses in tea and other crops.

  18. Post Milestone B Funding Climate and Cost Growth in Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    passed MS B in bust periods than it was for those that passed in boom periods. This observation was reported by the first paper in this series...5. iii did not experience a boom funding climate after passing MS B. That would require far more resources than were available for this paper ...acquisition policy and process. The paper employs three acquisition policy and process bins: • McNamara-Clifford (Fiscal Year (FY) 1964–FY 1969) • Defense

  19. What is so important about completing lives? A critique of the modified youngest first principle of scarce resource allocation.

    Science.gov (United States)

    Gamlund, Espen

    2016-04-01

    Ruth Tallman has recently offered a defense of the modified youngest first principle of scarce resource allocation [1]. According to Tallman, this principle calls for prioritizing adolescents and young adults between 15-40 years of age. In this article, I argue that Tallman's defense of the modified youngest first principle is vulnerable to important objections, and that it is thus unsuitable as a basis for allocating resources. Moreover, Tallman makes claims about the badness of death for individuals at different ages, but she lacks an account of the loss involved in dying to support her claims. To fill this gap in Tallman's account, I propose a view on the badness of death that I call 'Deprivationism'. I argue that this view explains why death is bad for those who die, and that it has some advantages over Tallman's complete lives view in the context of scarce resource allocation. Finally, I consider some objections to the relevance of Deprivationism to resource allocation, and offer my responses.

  20. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  1. EFFECTIVE ELECTRONIC TUTORIAL

    Directory of Open Access Journals (Sweden)

    Andrei A. Fedoseev

    2014-01-01

    Full Text Available The article analyzes effective electronic tutorials creation and application based on the theory of pedagogy. Herewith the issues of necessary electronic tutorial functional, ways of the educational process organization with the use of information and communication technologies and the logistics of electronic educational resources are touched upon. 

  2. Improving Patient Safety With the Military Electronic Health Record

    Science.gov (United States)

    2005-01-01

    Consolidated Health Informatics (CHI) project, one of the 24 electronic government ( eGov ) Internet- based technology initiatives supporting the president’s...United States Department of Defense (DoD) has transformed health care delivery in its use of information technology to automate patient data...use throughout the Federal Government . The importance of standards in EHR systems was further recognized in an IOM report, which stated, “Electronic

  3. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  4. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  5. Investigating the Association between Flowering Time and Defense in the Arabidopsis thaliana-Fusarium oxysporum Interaction

    Science.gov (United States)

    Lyons, Rebecca; Rusu, Anca; Stiller, Jiri; Powell, Jonathan; Manners, John M.; Kazan, Kemal

    2015-01-01

    Plants respond to pathogens either by investing more resources into immunity which is costly to development, or by accelerating reproductive processes such as flowering time to ensure reproduction occurs before the plant succumbs to disease. In this study we explored the link between flowering time and pathogen defense using the interaction between Arabidopsis thaliana and the root infecting fungal pathogen Fusarium oxysporum. We report that F. oxysporum infection accelerates flowering time and regulates transcription of a number of floral integrator genes, including FLOWERING LOCUS C (FLC), FLOWERING LOCUS T (FT) and GIGANTEA (GI). Furthermore, we observed a positive correlation between late flowering and resistance to F. oxysporum in A. thaliana natural ecotypes. Late-flowering gi and autonomous pathway mutants also exhibited enhanced resistance to F. oxysporum, supporting the association between flowering time and defense. However, epistasis analysis showed that accelerating flowering time by deletion of FLC in fve-3 or fpa-7 mutants did not alter disease resistance, suggesting that the effect of autonomous pathway on disease resistance occurs independently from flowering time. Indeed, RNA-seq analyses suggest that fve-3 mediated resistance to F. oxysporum is most likely a result of altered defense-associated gene transcription. Together, our results indicate that the association between flowering time and pathogen defense is complex and can involve both pleiotropic and direct effects. PMID:26034991

  6. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  7. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  8. Renewable energy resources

    DEFF Research Database (Denmark)

    Ellabban, Omar S.; Abu-Rub, Haitham A.; Blaabjerg, Frede

    2014-01-01

    Electric energy security is essential, yet the high cost and limited sources of fossil fuels, in addition to the need to reduce greenhouse gasses emission, have made renewable resources attractive in world energy-based economies. The potential for renewable energy resources is enormous because...... they can, in principle, exponentially exceed the world's energy demand; therefore, these types of resources will have a significant share in the future global energy portfolio, much of which is now concentrating on advancing their pool of renewable energy resources. Accordingly, this paper presents how...... renewable energy resources are currently being used, scientific developments to improve their use, their future prospects, and their deployment. Additionally, the paper represents the impact of power electronics and smart grid technologies that can enable the proportionate share of renewable energy...

  9. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  10. Preference and Use of Electronic Information and Resources by Blind/Visually Impaired in NCR Libraries in India

    Directory of Open Access Journals (Sweden)

    Shailendra Kumar

    2013-06-01

    Full Text Available This paper aims to determine the preference and use of electronic information and resources by blind/visually impaired users in the leading National Capital Region (NCR libraries of India. Survey methodology has been used as the basic research tool for data collection with the help of questionnaires. The 125 in total users surveyed in all the five libraries were selected randomly on the basis of willingness of the users with experience of working in digital environments to participate in the survey. The survey results were tabulated and analyzed with descriptive statistics methods using Excel software and 'Stata version 11'. The findings reveal that ICT have a positive impact in the lives of people with disabilities as it helps them to work independently and increases the level of confidence among them. The Internet is the most preferred medium of access to information among the majority of blind/visually impaired users. The 'Complexity of content available on the net' is found as the major challenge faced during Internet use by blind users of NCR libraries. 'Audio books on CDs/DVDs and DAISY books' are the most preferred electronic resources among the majority of blind/visually impaired users. This study will help the library professionals and organizations/institutions serving people with disabilities to develop effective library services for blind/visually impaired users in the digital environment on the basis of findings on information usage behavior in the study.

  11. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  12. Beryllium—A critical mineral commodity—Resources, production, and supply chain

    Science.gov (United States)

    Lederer, Graham W.; Foley, Nora K.; Jaskula, Brian W.; Ayuso, Robert A.

    2016-11-14

    Beryllium is a lightweight metallic element used in a wide variety of specialty and industrial applications. As a function of its unique chemical and physical properties, such as a high stiffness-to-weight ratio, resistance to temperature extremes, and high thermal conductivity, beryllium cannot be easily replaced by substitute materials in applications where combinations of these properties make it the material of choice. Because the number of beryllium producers is limited and the use of substitute materials in specific defense-related applications that are vital to national security is inadequate, several studies have categorized beryllium as a critical and strategic material. This categorization has led to the United States Government recommending that beryllium be stockpiled for use in the event of a national emergency. As of December 31, 2015, the National Defense Stockpile inventory of hot-pressed beryllium metal powder, structured beryllium metal powder, and vacuum-cast beryllium metal totaled 78 metric tons (t).The U.S. Geological Survey (USGS) Mineral Resources Program supports research on the occurrence, quality, quantity, and availability of mineral resources vital to the economy and national security. The USGS, through its National Minerals Information Center (NMIC), collects, analyzes, and disseminates information on more than 90 nonfuel mineral commodities from more than 180 countries. This fact sheet provides information on the production, consumption, supply chain, geology, and resource availability of beryllium in a global context.

  13. 76 FR 25566 - Defense Federal Acquisition Regulation Supplement (DFARS); Electronic Ordering Procedures (DFARS...

    Science.gov (United States)

    2011-05-05

    ... officials to specify e-mail as an ``electronic commerce method'' so long as it is authorized in the schedule... recognized electronic commerce method. The respondent recommended, in the alternative, that the Government... stated that electronic commerce is a term specifically identified in Federal Acquisition Regulation (FAR...

  14. Determining relevant financial statement ratios in Department of Defense service component general fund financial statements

    OpenAIRE

    Koetter, Nicholas J.; Krause, Daniel J.; Liptak, Carl S.

    2014-01-01

    Approved for public release; distribution is unlimited Department of Defense (DOD) service components are dedicating significant financial and human resources toward achieving unqualified opinions on audits of their financial statements. The DOD has endeavored to produce auditable financial statements as mandated in the Chief Financial Officers Act of 1990. In December of 2013, the United States Marine Corps became the first service component to achieve an unqualified audit opinion on its ...

  15. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  16. Plant Defense Inhibitors Affect the Structures of Midgut Cells in and

    Directory of Open Access Journals (Sweden)

    Hongmei Li-Byarlay

    2016-01-01

    Full Text Available Plants produce proteins such as protease inhibitors and lectins as defenses against herbivorous insects and pathogens. However, no systematic studies have explored the structural responses in the midguts of insects when challenged with plant defensive proteins and lectins across different species. In this study, we fed two kinds of protease inhibitors and lectins to the fruit fly Drosophila melanogaster and alpha-amylase inhibitors and lectins to the cowpea bruchid Callosobruchus maculatus . We assessed the changes in midgut cell structures by comparing them with such structures in insects receiving normal diets or subjected to food deprivation. Using light and transmission electron microscopy in both species, we observed structural changes in the midgut peritrophic matrix as well as shortened microvilli on the surfaces of midgut epithelial cells in D. melanogaster . Dietary inhibitors and lectins caused similar lesions in the epithelial cells but not much change in the peritrophic matrix in both species. We also noted structural damages in the Drosophila midgut after six hours of starvation and changes were still present after 12 hours. Our study provided the first evidence of key structural changes of midguts using a comparative approach between a dipteran and a coleopteran. Our particular observation and discussion on plant–insect interaction and dietary stress are relevant for future mode of action studies of plant defensive protein in insect physiology.

  17. Exposure to electronic cigarettes impairs pulmonary anti-bacterial and anti-viral defenses in a mouse model.

    Directory of Open Access Journals (Sweden)

    Thomas E Sussan

    Full Text Available Electronic cigarettes (E-cigs have experienced sharp increases in popularity over the past five years due to many factors, including aggressive marketing, increased restrictions on conventional cigarettes, and a perception that E-cigs are healthy alternatives to cigarettes. Despite this perception, studies on health effects in humans are extremely limited and in vivo animal models have not been generated. Presently, we determined that E-cig vapor contains 7 x 10(11 free radicals per puff. To determine whether E-cig exposure impacts pulmonary responses in mice, we developed an inhalation chamber for E-cig exposure. Mice that were exposed to E-cig vapor contained serum cotinine concentrations that are comparable to human E-cig users. E-cig exposure for 2 weeks produced a significant increase in oxidative stress and moderate macrophage-mediated inflammation. Since, COPD patients are susceptible to bacterial and viral infections, we tested effects of E-cigs on immune response. Mice that were exposed to E-cig vapor showed significantly impaired pulmonary bacterial clearance, compared to air-exposed mice, following an intranasal infection with Streptococcus pneumonia. This defective bacterial clearance was partially due to reduced phagocytosis by alveolar macrophages from E-cig exposed mice. In response to Influenza A virus infection, E-cig exposed mice displayed increased lung viral titers and enhanced virus-induced illness and mortality. In summary, this study reports a murine model of E-cig exposure and demonstrates that E-cig exposure elicits impaired pulmonary anti-microbial defenses. Hence, E-cig exposure as an alternative to cigarette smoking must be rigorously tested in users for their effects on immune response and susceptibility to bacterial and viral infections.

  18. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  19. Application of SYNROC to high-level defense wastes

    International Nuclear Information System (INIS)

    Tewhey, J.D.; Hoenig, C.L.; Newkirk, H.W.; Rozsa, R.B.; Coles, D.G.; Ryerson, F.J.

    1981-01-01

    The SYNROC method for immobilization of high-level nuclear reactor wastes is currently being applied to US defense wastes in tank storage at Savannah River, South Carolina. The minerals zirconolite, perovskite, and hollandite are used in SYNROC D formulations to immobilize fission products and actinides that comprise up to 10% of defense waste sludges and coexisting solutions. Additional phase in SYNROC D are nepheline, the host phase for sodium; and spinel, the host for excess aluminum and iron. Up to 70 wt % of calcined sludge can be incorporated with 30 wt % of SYNROC additives to produce a waste form consisting of 10% nepheline, 30% spinel, and approximately 20% each of the radioactive waste-bearing phases. Urea coprecipitation and spray drying/calcining methods have been used in the laboratory to produce homogeneous, reactive ceramic powders. Hot pressing and sintering at temperatures from 1000 to 1100 0 C result in waste form products with greater than 97% of theoretical density. Hot isostatic pressing has recently been implemented as a processing alternative. Characterization of waste-form mineralogy has been done by means of XRD, SEM, and electron microprobe. Leaching of SYNROC D samples is currently being carried out. Assessment of radiation damage effects and physical properties of SYNROC D will commence in FY81

  20. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  1. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  2. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  3. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  4. Strategic Management of Resource Markets: An Exploratory Study of Department of Defense Contractors.

    Science.gov (United States)

    1982-04-01

    franchising , joint ventures, or technology spin-off in other industries. S’o - 37 - * Financial Resources and Budgets Once resource programs and...0 Go 0 in Go~ 0 w P 1.4 0% 00" v41 00 41 0% 0 Ř Ř 0 i $ 44 ŘŘd0 4 44 u 14 Ř j u V4 w w n 4 1.4 41 re0%oV1 - 0b 0r a 41. 0 :. "Q0 HQ0 V4 vs 0 dQ...Multiple Scenarios and Contingency Planning, The Conference Board, #741, 1978 Quinn, J., "Technological Innovation, Entrepreneurship , and Strategy

  5. Discrete event simulation of the Defense Waste Processing Facility (DWPF) analytical laboratory

    International Nuclear Information System (INIS)

    Shanahan, K.L.

    1992-02-01

    A discrete event simulation of the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) analytical laboratory has been constructed in the GPSS language. It was used to estimate laboratory analysis times at process analytical hold points and to study the effect of sample number on those times. Typical results are presented for three different simultaneous representing increasing levels of complexity, and for different sampling schemes. Example equipment utilization time plots are also included. SRS DWPF laboratory management and chemists found the simulations very useful for resource and schedule planning

  6. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  7. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  8. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  13. The Politics of Defence Budgeting: A Study of Organisation and Resource Allocation in the United Kingdom and the United States,

    Science.gov (United States)

    1983-01-01

    COMM. COMD. ASST SECDEF CNTR & INTEL) (HEALTH AFFAIRS) ASST TO THE SECDEF (ATOMIC ENERGY ) R DEFENSE LLIGENCE SE AGENCIES DEESEDFES)EFENSE DEFENSE...important, but did not directly affect resource allocation procedures, being more concerned with achieving realistic cost estimates, decentralising and...Brown, 1976. Webster. Charles and Frankland, Noble. The Strategic Air Of’ensive Against Germany 1939-45, vol. 3. London: 1961. Wildavsky, Aaron. The

  14. What is the current state of the science of Cyber defense?

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Alan J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-10-09

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward this end are emerging.

  15. The Chinese Defense Economy’s Long March from Imitation to Innovation

    OpenAIRE

    Cheung, Tai Ming

    2010-01-01

    Since the beginning of the twenty-first century, China’s defense science, technology, and innovation (DSTI) system has been vigorously developing a comprehensive set of innovation capabilities that will eventually allow it to join the world’s top tier of military technological powers. Ample access to financial, human, and research resources; strong political support; inflows of foreign technologies and know-how; and the introduction of advanced modes of governance, market competition, and...

  16. Impact of defense conversion and US response

    International Nuclear Information System (INIS)

    Montanarelli, N.

    1994-01-01

    Conversion from military to civilian products due to defense conversion after the end of the Cold War takes a long as 20 years. In USA there are over 50 government programs funded to assist in defence conversion. This paper concentrates on the three major programs that will have the greatest impact on the economy, in the framework of the issues and needs of American industry. Federal government and US industry are making a considerable effort to transform how to do business today. One of the most important emerging themes in the federal program is international competitiveness. Large federal expenditures are made to support research and development that will increase productivity, thereby helping industry in global economic competition. This, in turn will play a key role in absorbing a large quantity od resources affected by the end of the Cold War

  17. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  18. Library usage patterns in the electronic information environment. Electronic journals, Use studies, Libraries, Medical libraries

    Directory of Open Access Journals (Sweden)

    B. Franklin

    2004-01-01

    Full Text Available This paper examines the methodology and results from Web-based surveys of more than 15,000 networked electronic services users in the United States between July 1998 and June 2003 at four academic health sciences libraries and two large main campus libraries serving a variety of disciplines. A statistically valid methodology for administering simultaneous Web-based and print-based surveys using the random moments sampling technique is discussed and implemented. Results from the Web-based surveys showed that at the four academic health sciences libraries, there were approximately four remote networked electronic services users for each in-house user. This ratio was even higher for faculty, staff, and research fellows at the academic health sciences libraries, where more than five remote users for each in-house user were recorded. At the two main libraries, there were approximately 1.3 remote users for each in-house user of electronic information. Sponsored research (grant funded research accounted for approximately 32% of the networked electronic services activity at the health sciences libraries and 16% at the main campus libraries. Sponsored researchers at the health sciences libraries appeared to use networked electronic services most intensively from on-campus, but not from in the library. The purpose of use for networked electronic resources by patrons within the library is different from the purpose of use of those resources by patrons using the resources remotely. The implications of these results on how librarians reach decisions about networked electronic resources and services are discussed.

  19. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  20. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  1. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  2. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  3. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  4. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  5. Electronic resources of the rare books and valuable editions department of the Central Scientific Library of the V.N. Karazin Kharkiv National University: open access for research

    Directory of Open Access Journals (Sweden)

    І. К. Журавльова

    2014-12-01

    Full Text Available The article describes tasks that electronic collections of rare books fulfill: broad access for readers to rare and valuable editions providing, preservation of ensuring of the original. On the example of the electronic collection of the Central Scientific Library of the V.N. Karazin Kharkiv National University – «eScriptorium: electronic archive of rare books and manuscripts for research and education» the possibility of the full-text resources of the valuable editions using is shown. The principles of creation, structure, chronological frameworks, directions of adding the documents to the archive are represented. The perspectives of the project development are outlined as well as examples of the digital libraries of the European countries and Ukraine are provided, the actual task of preserving the originals of the rare books of the country is raised, the innovative approaches to serving users with electronic resources are considered. The evidences of cooperation of the Central Scientific Library of the V.N. Karazin Kharkiv National University with the largest world digital libraries: World Digital Library and Europeana are provided.

  6. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  7. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  8. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  9. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  10. Electronic tracking of human resource skills and knowledge, just in time training, manageable due diligence

    Energy Technology Data Exchange (ETDEWEB)

    Kolodziej, M.A. [Quick Test International Inc., (Canada). Canadian Technology Human Resource Board; Baker, O. [KeySpan Energy Canada, Calgary, AB (Canada)

    2001-06-01

    KeySpan Energy Canada is in the process of obtaining recognition of various occupational profiles including pipeline operators, inspectors, and field and plant operators from various certifying organizations. The process of allowing individuals to obtain certification is recognized by Canadian Technology Human Resources Board as a step towards national standards for technologists and technicians. Proven competency is a must for workers in todays oil industry in response to increasingly stringent government safety regulations, environmental concerns and high public scrutiny. Quick Test international Inc. has developed a management tool in collaboration with end users at KeySpan Energy Canada. It is an electronic, Internet based competency tool for tracking personal competencies and maintaining continued competency. Response to the tool has been favourable. 2 refs., 4 figs.

  11. Response of sunflower (Helianthus annuus L.) leaf surface defenses to exogenous methyl jasmonate.

    Science.gov (United States)

    Rowe, Heather C; Ro, Dae-kyun; Rieseberg, Loren H

    2012-01-01

    Helianthus annuus, the common sunflower, produces a complex array of secondary compounds that are secreted into glandular trichomes, specialized structures found on leaf surfaces and anther appendages of flowers. The primary components of these trichome secretions are sesquiterpene lactones (STL), a diverse class of compounds produced abundantly by the plant family Compositae and believed to contribute to plant defense against herbivory. We treated wild and cultivated H. annuus accessions with exogenous methyl jasmonate, a plant hormone that mediates plant defense against insect herbivores and certain classes of fungal pathogens. The wild sunflower produced a higher density of glandular trichomes on its leaves than the cultivar. Comparison of the profiles of glandular trichome extracts obtained by liquid chromatography-mass spectroscopy (LC-MS) showed that wild and cultivated H. annuus were qualitatively similar in surface chemistry, although differing in the relative size and proportion of various compounds detected. Despite observing consistent transcriptional responses to methyl jasmonate treatment, we detected no significant effect on glandular trichome density or LC-MS profile in cultivated or wild sunflower, with wild sunflower exhibiting a declining trend in overall STL production and foliar glandular trichome density of jasmonate-treated plants. These results suggest that glandular trichomes and associated compounds may act as constitutive defenses or require greater levels of stimulus for induction than the observed transcriptional responses to exogenous jasmonate. Reduced defense investment in domesticated lines is consistent with predicted tradeoffs caused by selection for increased yield; future research will focus on the development of genetic resources to explicitly test the ecological roles of glandular trichomes and associated effects on plant growth and fitness.

  12. Changes in plant defense chemistry (pyrrolizidine alkaloids) revealed through high-resolution spectroscopy

    Science.gov (United States)

    Carvalho, Sabrina; Macel, Mirka; Schlerf, Martin; Moghaddam, Fatemeh Eghbali; Mulder, Patrick P. J.; Skidmore, Andrew K.; van der Putten, Wim H.

    2013-06-01

    Plant toxic biochemicals play an important role in defense against natural enemies and often are toxic to humans and livestock. Hyperspectral reflectance is an established method for primary chemical detection and could be further used to determine plant toxicity in the field. In order to make a first step for pyrrolizidine alkaloids detection (toxic defense compound against mammals and many insects) we studied how such spectral data can estimate plant defense chemistry under controlled conditions. In a greenhouse, we grew three related plant species that defend against generalist herbivores through pyrrolizidine alkaloids: Jacobaea vulgaris, Jacobaea erucifolia and Senecio inaequidens, and analyzed the relation between spectral measurements and chemical concentrations using multivariate statistics. Nutrient addition enhanced tertiary-amine pyrrolizidine alkaloids contents of J. vulgaris and J. erucifolia and decreased N-oxide contents in S. inaequidens and J. vulgaris. Pyrrolizidine alkaloids could be predicted with a moderate accuracy. Pyrrolizidine alkaloid forms tertiary-amines and epoxides were predicted with 63% and 56% of the variation explained, respectively. The most relevant spectral regions selected for prediction were associated with electron transitions and Csbnd H, Osbnd H, and Nsbnd H bonds in the 1530 and 2100 nm regions. Given the relatively low concentration in pyrrolizidine alkaloids concentration (in the order of mg g-1) and resultant predictions, it is promising that pyrrolizidine alkaloids interact with incident light. Further studies should be considered to determine if such a non-destructive method may predict changes in PA concentration in relation to plant natural enemies. Spectroscopy may be used to study plant defenses in intact plant tissues, and may provide managers of toxic plants, food industry and multitrophic-interaction researchers with faster and larger monitoring possibilities.

  13. Dangers in the practice of defensive medicine in hemostasis testing for investigation of bleeding or thrombosis: part I--routine coagulation testing.

    Science.gov (United States)

    Lippi, Giuseppe; Favaloro, Emmanuel J; Franchini, Massimo

    2014-10-01

    Defensive medicine is a term conventionally used for defining the medical (mal)practice of ordering medically questionable diagnostic testing, procedures, or visits, or to avoid high-risk patients or procedures. The practice of defensive medicine may primarily be aimed to reduce exposure to malpractice liability, to avoid patient criticism regarding "medical inaction," or to avoid "missing" some otherwise potential identifiable defect(s). Although the precise impact of defensive medicine in the field of laboratory testing is difficult to estimate from the current literature, the overuse or inappropriate use of laboratory resources ranges from 23 to 67%, and a large part of this can be attributed to medical liability concerns, with apparently little clinical awareness of the adverse consequences that may be associated with this practice. Essentially, performing inappropriate testing remarkably increases the risk of obtaining false-positive results due to statistical, preanalytical, and analytical reasons, thus triggering further and potentially even more invasive follow-up testing, inappropriate patient management, along with incremental increases of expenditure due to misuse of health care resources. As routine coagulation testing is commonly performed for the screening of patients with bleeding or thrombotic disorders, either a false-negative or a false-positive result may significantly impact on clinical outcomes and health care resources. The aim of this article is to describe the leading causes of physiological, pathological, therapeutic, and spurious variations of the prothrombin time, activated partial thromboplastin time, and D-dimer, as well as the potential clinical consequences emerging from the generation of false-negative and false-positive results with these tests. Thieme Medical Publishers 333 Seventh Avenue, New York, NY 10001, USA.

  14. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  15. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  16. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  17. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  18. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  19. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  20. The Biomedical Resource Ontology (BRO) to enable resource discovery in clinical and translational research.

    Science.gov (United States)

    Tenenbaum, Jessica D; Whetzel, Patricia L; Anderson, Kent; Borromeo, Charles D; Dinov, Ivo D; Gabriel, Davera; Kirschner, Beth; Mirel, Barbara; Morris, Tim; Noy, Natasha; Nyulas, Csongor; Rubenson, David; Saxman, Paul R; Singh, Harpreet; Whelan, Nancy; Wright, Zach; Athey, Brian D; Becich, Michael J; Ginsburg, Geoffrey S; Musen, Mark A; Smith, Kevin A; Tarantal, Alice F; Rubin, Daniel L; Lyster, Peter

    2011-02-01

    The biomedical research community relies on a diverse set of resources, both within their own institutions and at other research centers. In addition, an increasing number of shared electronic resources have been developed. Without effective means to locate and query these resources, it is challenging, if not impossible, for investigators to be aware of the myriad resources available, or to effectively perform resource discovery when the need arises. In this paper, we describe the development and use of the Biomedical Resource Ontology (BRO) to enable semantic annotation and discovery of biomedical resources. We also describe the Resource Discovery System (RDS) which is a federated, inter-institutional pilot project that uses the BRO to facilitate resource discovery on the Internet. Through the RDS framework and its associated Biositemaps infrastructure, the BRO facilitates semantic search and discovery of biomedical resources, breaking down barriers and streamlining scientific research that will improve human health. Copyright © 2010 Elsevier Inc. All rights reserved.

  1. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  2. Wireless Biological Electronic Sensors.

    Science.gov (United States)

    Cui, Yue

    2017-10-09

    The development of wireless biological electronic sensors could open up significant advances for both fundamental studies and practical applications in a variety of areas, including medical diagnosis, environmental monitoring, and defense applications. One of the major challenges in the development of wireless bioelectronic sensors is the successful integration of biosensing units and wireless signal transducers. In recent years, there are a few types of wireless communication systems that have been integrated with biosensing systems to construct wireless bioelectronic sensors. To successfully construct wireless biological electronic sensors, there are several interesting questions: What types of biosensing transducers can be used in wireless bioelectronic sensors? What types of wireless systems can be integrated with biosensing transducers to construct wireless bioelectronic sensors? How are the electrical sensing signals generated and transmitted? This review will highlight the early attempts to address these questions in the development of wireless biological electronic sensors.

  3. Electronic Recruitment at CERN

    CERN Multimedia

    2004-01-01

    The Human Resources Department switches to electronic recruitment. From now on whenever you are involved in a recruitment action you will receive an e-mail giving you access to a Web folder. Inside you will find a shortlist of applications drawn up by the Human Resources Department. This will allow you to consult the folder, at the same time as everyone else involved in the recruitment process, for the vacancy you are interested in. This new electronic recruitment system, known as e-RT, will be introduced in a presentation given at 10 a.m. on 11 February in the Main Auditorium. Implemented by AIS (Administrative Information Services) and the Human Resources Department, e-RT will cover vacancies open in all of CERN's recruitment programmes. The electronic application system was initially made available to technical students in July 2003. By December it was extended to summer students, fellows, associates and Local Staff. Geraldine Ballet from the Recruitment Service prefers e-RT to mountains of paper! The Hu...

  4. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  5. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  6. Plastics disassembly versus bulk recycling: engineering design for end-of-life electronics resource recovery.

    Science.gov (United States)

    Rios, Pedro; Stuart, Julie Ann; Grant, Ed

    2003-12-01

    Annual plastic flows through the business and consumer electronics manufacturing supply chain include nearly 3 billion lb of high-value engineering plastics derived from petroleum. The recovery of resource value from this stream presents critical challenges in areas of materials identification and recycling process design that demand new green engineering technologies applied together with life cycle assessment and ecological supply chain analysis to create viable plastics-to-plastics supply cycles. The sustainable recovery of potentially high-value engineering plastics streams requires that recyclers either avoid mixing plastic parts or purify later by separating smaller plastic pieces created in volume reduction (shredding) steps. Identification and separation constitute significant barriers in the plastics-to-plastics recycling value proposition. In the present work, we develop a model that accepts randomly arriving electronic products to study scenarios by which a recycler might identify and separate high-value engineering plastics as well as metals. Using discrete eventsimulation,we compare current mixed plastics recovery with spectrochemical plastic resin identification and subsequent sorting. Our results show that limited disassembly with whole-part identification can produce substantial yields in separated streams of recovered engineering thermoplastics. We find that disassembly with identification does not constitute a bottleneck, but rather, with relatively few workers, can be configured to pull the process and thus decrease maximum staging space requirements.

  7. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  8. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  9. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  10. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  11. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  12. Merge of terminological resources

    DEFF Research Database (Denmark)

    Henriksen, Lina; Braasch, Anna

    2012-01-01

    In our globalized world, the amount of cross-national communication increases rapidly, which also calls for easy access to multi-lingual high quality terminological resources. Sharing of terminology resources is currently becoming common practice, and efficient strategies for integration...... – or merging – of terminology resources are strongly needed. This paper discusses prerequisites for successful merging with the focus on identification of candidate duplicates of a subject domain found in the resources to be merged, and it describes automatic merging strategies to be applied to such duplicates...... in electronic terminology resources. Further, some perspectives of manual, supplementary assessment methods supporting the automatic procedures are sketched. Our considerations are primarily based on experience gained in the IATE and EuroTermBank projects, as merging was a much discussed issue in both projects....

  13. Complete electronics self-teaching guide with projects

    CERN Document Server

    Boysen, Earl

    2012-01-01

    An all-in-one resource on everything electronics-related! For almost 30 years, this book has been a classic text for electronics enthusiasts. Now completely updated for today's technology, this latest version combines concepts, self-tests, and hands-on projects to offer you a completely repackaged and revised resource. This unique self-teaching guide features easy-to-understand explanations that are presented in a user-friendly format to help you learn the essentials you need to work with electronic circuits. All you need is a general understanding of electronics concepts such as Oh

  14. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  15. Optimal defense with variable number of overarching and individual protections

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell; Dai, Yuanshun

    2014-01-01

    The article considers a system consisting of identical elements. Each element can be protected individually. The groups of elements can have overarching protection. To destroy an element having both types of protections the attacker must always penetrate/destroy the overarching protection and then destroy the individual protection of the element. Both the attacker and the defender have limited resources. The resources needed to defend and attack the overarching protection are fixed, as is also the number of elements that can be protected by single overarching protection. The defender chooses the number of overarching protections and the number of individual protections within each protected group to minimize the expected damage caused by the attack. The attacker chooses the number of attacked overarching protections and after attacking the overarching protections it chooses the number of attacked elements to maximize the expected damage. The three period minmax game is formulated and an enumerative procedure for its solving is suggested. The influence of the game parameters on the optimal defense and attack strategies is discussed

  16. Defense programs business practices re-engineering QFD exercise

    International Nuclear Information System (INIS)

    Murray, C.; Halbleib, L.

    1996-03-01

    The end of the cold war has resulted in many changes for the Nuclear Weapons Complex (NWC). We now work in a smaller complex, with reduced resources, a smaller stockpile, and no new phase 3 weapons development programs. This new environment demands that we re-evaluate the way we design and produce nuclear weapons. The Defense Program (DP) Business Practices Re-engineering activity was initiated to improve the design and production efficiency of the DP Sector. The activity had six goals: (1) to identify DP business practices that are exercised by the Product Realization Process (PRP); (2) to determine the impact (positive, negative, or none) of these practices on defined, prioritized customer criteria; (3) to identify business practices that are candidates for elimination or re-engineering; (4) to select two or three business practices for re-engineering; (5) to re-engineer the selected business practices; and (6) to exercise the re-engineered practices on three pilot development projects. Business practices include technical and well as administrative procedures that are exercised by the PRP. A QFD exercise was performed to address (1)-(4). The customer that identified, defined, and prioritized the criteria to rate the business practices was the Block Change Advisory Group. Five criteria were identified: cycle time, flexibility, cost, product performance/quality, and best practices. Forty-nine business practices were identified and rated per the criteria. From this analysis, the group made preliminary recommendations as to which practices would be addressed in the re-engineering activity. Sixteen practices will be addressed in the re-engineering activity. These practices will then be piloted on three projects: (1) the Electronic Component Assembly (ECA)/Radar Project, (2) the B61 Mod 11, and (3) Warhead Protection Program (WPP)

  17. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  18. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  19. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  20. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  1. Oscillator clustering in a resource distribution chain

    DEFF Research Database (Denmark)

    Postnov, D.; Sosnovtseva, Olga; Mosekilde, Erik

    2005-01-01

    separate the inherent dynamics of the individual oscillator from the properties of the coupling network. Illustrated by examples from microbiological population dynamics, renal physiology, and electronic oscillator theory, we show how competition for primary resources in a resource distribution chain leads...

  2. Natural resources damage assessments at Department of Energy facilities - using the CERCLA process to minimize natural resources injuries

    International Nuclear Information System (INIS)

    Bascietto, J.J.; Martin, J.F.; Duke, C.S.; Gray, S.I.

    1991-01-01

    Fifty years of research, development and production in support of national defense have left the Department of Energy (DOE) with numerous radioactive, hazardous and mixed waste sites requiring environmental restoration and remediation. The responsibilities for DOE associated with releases of these wastes into the environment are driving major efforts to characterize contamination problems and identify and implement environmental restoration and remediation alternatives. The subject of this paper is the recently issued DOE guidance to minimize the basis for damage claims for injuries to natural resources on, over and under lands owned or controlled by DOE associated with the releases of hazardous substances from DOE facilities. Depending on the regulatory authority governing the facility, the preferred means of evaluating the possibility of injury to natural resources is the preparation of an ecological risk assessment or an environmental evaluation. As both the natural resource trustee and lead agency at facilities under its control, DOE receives dual responsibility requiring site remediation if necessary, and that any injured natural resources be restored, or that compensation for the injuries is made. Several executive and legislative sources of authority and responsibility with regard to lead agencies and trustees of natural resources will be detailed. Also, ongoing remedial investigation/feasibility study work at the DOE Fernald Environmental Management Project near Fernald, Ohio will be described as an example of how this guidance can be applied

  3. Power Electronics

    DEFF Research Database (Denmark)

    Iov, Florin; Ciobotaru, Mihai; Blaabjerg, Frede

    2008-01-01

    is to change the electrical power production sources from the conventional, fossil (and short term) based energy sources to renewable energy resources. The other is to use high efficient power electronics in power generation, power transmission/distribution and end-user application. This paper discuss the most...... emerging renewable energy sources, wind energy, which by means of power electronics are changing from being a minor energy source to be acting as an important power source in the energy system. Power electronics is the enabling technology and the presentation will cover the development in wind turbine...... technology from kW to MW, discuss which power electronic solutions are most feasible and used today....

  4. Special Technology Area Review on Spintronics. Report of Department of Defense Advisory Group on Electron Devices Working Group B (Microelectronics)

    National Research Council Canada - National Science Library

    Dunbridge, Barry; Palkuti, Les; Wolf, Stuart

    2004-01-01

    ...) as it applies to nonvolatile memories and quantum-based logic and computing. In addition, the information provided at the STAR is expected to be of use to the Services and Department of Defense (DoD...

  5. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  6. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  7. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  8. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  9. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network

    Directory of Open Access Journals (Sweden)

    Jun Li

    2017-03-01

    Full Text Available With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  10. 75 FR 30793 - U.S. Court of Appeals for the Armed Forces Proposed Change to Electronic Filing Guidelines

    Science.gov (United States)

    2010-06-02

    ... nature of the pleading will be included in the body of the electronic mail message. c. The pleading shall..., Department of Defense. Proposed New Order for Electronic Filing of Pleadings Effective (date), all pleadings... Electronic Filing of Pleadings 1. Scope. The United States Court of Appeals for the Armed Forces adopts the...

  11. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  12. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  13. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  14. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  15. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  16. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  17. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  18. A Resource Guide for Debunking Astronomical Pseudo-Science

    Science.gov (United States)

    Fraknoi, A.

    2008-11-01

    Many of us who do public programs for the International Year of Astronomy are likely to meet people who have questions or want to challenge us about pseudo-scientific topics related to astronomy. Perhaps they have heard about the claim that the moon landings were a hoax, or have seen a light in the sky which puzzled them. Even those of us who have extensive training in astronomy often are not prepared for tackling such questions. To deal with such situations, here is a concise guide to printed and web resources that offer rational examination of some of these ``fiction science'' claims. This is not a complete list, but a ``first defense'' for beginners. A fuller version can be found at: http://www.astrosociety.org/education/resources/pseudobib.html

  19. Recovery and Resource Allocation Strategies to Maximize Mobile Network Survivability by Using Game Theories and Optimization Techniques

    Directory of Open Access Journals (Sweden)

    Pei-Yu Chen

    2013-01-01

    Full Text Available With more and more mobile device users, an increasingly important and critical issue is how to efficiently evaluate mobile network survivability. In this paper, a novel metric called Average Degree of Disconnectivity (Average DOD is proposed, in which the concept of probability is calculated by the contest success function. The DOD metric is used to evaluate the damage degree of the network, where the larger the value of the Average DOD, the more the damage degree of the network. A multiround network attack-defense scenario as a mathematical model is used to support network operators to predict all the strategies both cyber attacker and network defender would likely take. In addition, the Average DOD would be used to evaluate the damage degree of the network. In each round, the attacker could use the attack resources to launch attacks on the nodes of the target network. Meanwhile, the network defender could reallocate its existing resources to recover compromised nodes and allocate defense resources to protect the survival nodes of the network. In the approach to solving this problem, the “gradient method” and “game theory” are adopted to find the optimal resource allocation strategies for both the cyber attacker and mobile network defender.

  20. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  1. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  2. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  3. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  4. Impact of CALS on Electronic Publishing Systems and Users.

    Science.gov (United States)

    Beazley, William G.

    1990-01-01

    The U.S. Department of Defense has begun using its buying power to enforce standards on the vendors and contractors of automatic data processing hardware and software. An example of this, the Computer-Aided Acquisition and Logistic Support (CALS) program, is described, and how it will affect electronic publishing systems is discussed. (five…

  5. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  6. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  7. Compressive sensing based algorithms for electronic defence

    CERN Document Server

    Mishra, Amit Kumar

    2017-01-01

    This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.

  8. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  9. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  10. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  11. Knowledge, Experience, and Training in Incentive Contracting for the Department of Defense

    Science.gov (United States)

    2016-04-30

    Defense (DoD) Acquisition Workforce (DAW) through the implementation of various incentive arrangements to influence more favorable performance outcomes... etc .? ^Åèìáëáíáçå=oÉëÉ~êÅÜ=mêçÖê~ãW= `êÉ~íáåÖ=póåÉêÖó=Ñçê=fåÑçêãÉÇ=`Ü~åÖÉ= - 423 - Research suggests that as much as 90% of training resources are...Kirkpatrick Evaluation Model, the DoD Acquisition Workforce survey volunteers provided useful information about themselves and their peers. The data

  12. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  13. Resource Assessment for Afghanistan and Alleviation of Terrorism

    Science.gov (United States)

    Shroder, J. F.

    2002-05-01

    Mineral and water resources in Afghanistan may be the best means by which redevelopment of the country can be used to alleviate future terrorism. Remote-sensing analysis of snow, ice, resources, and topography in Afghanistan, and development of digital elevation models with ASTER imagery and previously classified, large scale topographic maps from the Department of Defense enable better assessment and forecasting resources in the country. Adequate resource assessment and planning is viewed as critical to alleviation of one cause of the problems associated with the fertilization of terrorism in Afghanistan. Long-term diminution of meltwater resources in Afghanistan is exemplified by the disastrous and famine-inducing droughts of the present time and three decades prior, as well as by the early Landsat assessment of glacier resources sponsored by USGS and now brought up-to-date with current imagery. Extensive cold-war projects undertaken by both the USSR and USA generated plentiful essential mineral, hydrocarbon, hydrogeological, and hydrological data, including an extensive stream gauging and vital irrigation network now adversly affected or destroyed entirely by decades of war. Analysis, measurement, prediction, rehabilitation, and reconstruction of critical resource projects are regarded as most critical elements in the war on terrorism in this portion of the world. The GLIMS (Global Land Ice Measurements from Space) Project, initially sponsored by USGS, has established our group as the Regional Center for Afghanistan and Pakistan, in which the above concepts serve as guiding research precepts.

  14. Electronic conferencing for continuing medical education: a resource survey.

    Science.gov (United States)

    Sternberg, R J

    1986-10-01

    The use of electronic technologies to link participants for education conferences is an option for providers of Continuing Medical Education. In order to profile the kinds of electronic networks currently offering audio- or videoteleconferences for physician audiences, a survey was done during late 1985. The information collected included range of services, fees, and geographic areas served. The results show a broad diversity of providers providing both interactive and didactic programming to both physicians and other health care professionals.

  15. The topological defense in SIS epidemic models

    International Nuclear Information System (INIS)

    Arbore, Andrea; Fioriti, Vincenzo; Chinnici, Marta

    2016-01-01

    The spreading of dangerous malware or faults in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding software details, in order to generalize to the maximum extent the defensive strategies. For example, it has been suggested that the maximum eigenvalue of the network adjacency matrix could act as a threshold for the malware’s spreading. This leads naturally to use the spectral graph theory to identify the most critical and influential nodes in technological networks. Many well-known graph parameters have been studied in the past years to accomplish the task. In this work, we test our AV11 algorithm showing that outperforms degree, closeness, betweenness centrality and the dynamical importance.

  16. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Hybrid planar lightwave circuits for defense and aerospace applications

    Science.gov (United States)

    Zhang, Hua; Bidnyk, Serge; Yang, Shiquan; Balakrishnan, Ashok; Pearson, Matt; O'Keefe, Sean

    2010-04-01

    We present innovations in Planar Lightwave Circuits (PLCs) that make them ideally suited for use in advanced defense and aerospace applications. We discuss PLCs that contain no micro-optic components, no moving parts, pose no spark or fire hazard, are extremely small and lightweight, and are capable of transporting and processing a range of optical signals with exceptionally high performance. This PLC platform is designed for on-chip integration of active components such as lasers and detectors, along with transimpedance amplifiers and other electronics. These active components are hybridly integrated with our silica-on-silicon PLCs using fully-automated robotics and image recognition technology. This PLC approach has been successfully applied to the design and fabrication of multi-channel transceivers for aerospace applications. The chips contain hybrid DFB lasers and high-efficiency detectors, each capable of running over 10 Gb/s, with mixed digital and analog traffic multiplexed to a single optical fiber. This highlyintegrated functionality is combined onto a silicon chip smaller than 4 x 10 mm, weighing failures after extreme temperature cycling through a range of > 125 degC, and more than 2,000 hours operating at 95 degC ambient air temperature. We believe that these recent advancements in planar lightwave circuits are poised to revolutionize optical communications and interconnects in the aerospace and defense industries.

  18. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  19. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  20. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  1. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  2. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  3. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  4. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  5. Laboratory and field studies related to the Hydrologic Resources Management Program

    International Nuclear Information System (INIS)

    Thompson, J.L.; Hawkins, W.L.; Mathews, M.; Henderson, R.W.; Thompson, J.L.; Maestas, S.

    1994-01-01

    This report describes research done at Los Alamos in FY 1993 for the Hydrologic Resources Management Program. The US Department of Energy funds this research through two programs at the Nevada Test Site (NTS): defense and groundwater characterization. Los Alamos personnel have continued to study the high-pressure zone created in the aquifer under Yucca Flat. We analyzed data from a hole in this area (U-7cd) and drilled another hole and installed a water monitoring tube at U-4t. We analyzed water from a number of locations on the NTS where we know there are radionuclides in the groundwater and critiqued the effectiveness of this monitoring effort. Our program for analyzing postshot debris continued with material from the last nuclear test in September 1992. We supported both the defense program and the groundwater characterization program by analyzing water samples from their wells and by reviewing documents pertaining to future drilling. We helped develop the analytical methodology to be applied to water samples obtained in the environmental restoration and waste management efforts at the NTS. Los Alamos involvement in the Hydrologic Resources Management Program is reflected in the appended list of documents reviewed, presentations given, papers published, and meetings attended

  6. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  7. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  8. Utilization of bio-resources by low energy electron beam

    International Nuclear Information System (INIS)

    Kume, Tamikazu

    2003-01-01

    Utilization of bio-resources by radiation has been investigated for recycling the natural resources and reducing the environmental pollution. Polysaccharides such as chitosan and sodium alginate were easily degraded by irradiation and induced various kinds of biological activities, i.g. anti-microbial activity, promotion of plant growth, suppression of heavy metal stress, phytoalexins induction. Radiation degraded chitosan was effective to enhance the growth of plants in tissue culture. It was demonstrated that the liquid sample irradiation system using low energy EB was effective for the preparation of degraded polysaccharides. Methylcellulose (MC) can be crosslinked under certain radiation condition as same as carboxymethylcellulose (CMC) and produced the biodegradable hydrogel for medical and agricultural use. Treatment of soybean seeds by low energy EB enhanced the growth and the number of rhizobia on the root. (author)

  9. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  10. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  11. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  12. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  13. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  14. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  15. Adaptation of mathematical educational content in e-learning resources

    Directory of Open Access Journals (Sweden)

    Yuliya V. Vainshtein

    2017-01-01

    Full Text Available Modern trends in the world electronic educational system development determine the necessity of adaptive learning intellectual environments and resources’ development and implementation. An upcoming trend in improvement the quality of studying mathematical disciplines is the development and application of adaptive electronic educational resources. However, the development and application experience of adaptive technologies in higher education is currently extremely limited and does not imply the usage flexibility. Adaptive educational resources in the electronic environment are electronic educational resources that provide the student with a personal educational space, filled with educational content that “adapts” to the individual characteristics of the students and provides them with the necessary information.This article focuses on the mathematical educational content adaptation algorithms development and their implementation in the e-learning system. The peculiarity of the proposed algorithms is the possibility of their application and distribution for adaptive e-learning resources construction. The novelty of the proposed approach is the three-step content organization of the adaptive algorithms for the educational content: “introductory adaptation of content”, “the current adaptation of content”, “estimative and a corrective adaptation”. For each stage of the proposed system, mathematical algorithms for educational content adaptation in adaptive e-learning resources are presented.Due to the high level of abstraction and complexity perception of mathematical disciplines, educational content is represented in the various editions of presentation that correspond to the levels of assimilation of the course material. Adaptation consists in the selection of the optimal edition of the material that best matches the individual characteristics of the student. The introduction of a three-step content organization of the adaptive

  16. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  17. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  18. Electronic Health Records: VAs Efforts Raise Concerns about Interoperability Goals and Measures, Duplication with DOD, and Future Plans

    Science.gov (United States)

    2016-07-13

    ELECTRONIC HEALTH RECORDS VA’s Efforts Raise Concerns about Interoperability Goals and Measures, Duplication with DOD...Agencies, Committee on Appropriations, U.S. Senate July 13, 2016 ELECTRONIC HEALTH RECORDS VA’s Efforts Raise Concerns about Interoperability Goals...initiatives with the Department of Defense (DOD) that were intended to advance the ability of the two departments to share electronic health records ,

  19. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  20. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  1. Lipid reserves and immune defense in healthy and diseased migrating monarchs Danaus plexippus

    Directory of Open Access Journals (Sweden)

    Dara A. SATTERFIELD, Amy E. WRIGHT, Sonia ALTIZER

    2013-06-01

    Full Text Available Recent studies suggest that the energetic demands of long-distance migration might lower the pool of resources available for costly immune defenses. Moreover, migration could amplify the costs of parasitism if animals suffering from parasite-induced damage or depleted energy reserves are less able to migrate long distances. We investigated relationships between long-distance migration, infection, and immunity in wild fall-migrating monarch butterflies Danaus plexippus. Monarchs migrate annually from eastern North America to central Mexico, accumulating lipids essential for migration and winter survival as they travel southward. Monarchs are commonly infected by the debilitating protozoan parasite Ophryocystis elektroscirrha (OE. We collected data on lipid reserves, parasite loads, and two immune measures (hemocyte concentration and phenoloxidase activity from wild monarchs migrating through north GA (USA to ask whether (1 parasite infection negatively affects lipid reserves, and (2 greater investment in lipid reserves is associated with lower immune measures. Results showed that monarchs sampled later in the fall migration had lower but not significantly different immune measures and significantly higher lipid reserves than those sampled earlier. Lipid measures correlated negatively but only nearly significantly with one measure of immune defense (phenoloxidase activity in both healthy and infected monarchs, but did not depend on monarch infection status or parasite load. These results provide weak support for a trade-off between energy reserves and immune defense in migrants, and suggest that previously-demonstrated costs of OE infection for monarch migration are not caused by depleted lipid reserves [Current Zoology 59 (3: 393–402, 2013].

  2. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  3. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  4. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  5. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  6. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  7. Internet and Electronic Information Management

    Science.gov (United States)

    2004-12-01

    centers to form consortia and share electronic information sources. Although traditional resource sharing arrangements encouraged competition rather...outside world, through public relations and through marketing information products or services, to its own competitive advantage (Davenport 1997: 193-217... electronic information sources are a challenge for electronic information managers. Libraries and information centers are no longer “the only game in town

  8. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  9. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  10. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  11. The impact of human resource practices on psychological empowerment

    Directory of Open Access Journals (Sweden)

    Fatemeh Moradi

    2016-07-01

    Full Text Available Today, human capital is considered a key factor of achieving the competitive advantage in different industries. The present study, as an applied and descriptive research, aims at providing formulation and evaluation of human resource development of an Iranian Petrochemical Company (APC. The human resource experts and managers of APC together with university professors of human capital and familiar with local conditions of Khuzestan province, Iran, made up the statistical population of this research. In this connection, first the internal factors (including advantages and disadvantages were identified using human resource excellence indicators. Then, the opportunities and threats of human resource system were found via PESTEL approach. In the next step, the primary strategies were formulated using the strength, weakness, opportunities and threats (SWOT Matrix. The next phases of the study were included evaluation and ranking of human resource development strategies based on analytical network process (ANP multi-criteria decision making method and grey systems theory. According to results of the research, defensive strategies (WT are suggested as the best and most appropriate strategies in human resource area. In other words, the internal and external factors of APC are problematic. Accordingly, APC is expected to adopt WT strategy, minimize the weaknesses, and avoid threats. Subsequent to the above policy, the strategies of WO, ST, and SO are advised to employ.

  12. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  13. Electronic Information Access and Utilization by Makerere University Students in Uganda

    Directory of Open Access Journals (Sweden)

    Elisam Magara

    2008-09-01

    Full Text Available Objectives – The objectives of this study were to establish the level of computer utilization skills of Makerere University (Uganda Library and Information Science (LIS students; to determine the use of electronic information resources by LIS students; to determine the attitudes of LIS students towards electronic information resources; and to establish the problems faced by LIS students in accessing electronic information resources.Methods – A questionnaire survey was used for data collection.Results – The majority of Library and Information Science students at Makerere University depend on university computers for their work, and very few of them access the library’s e-resources. The few who access e-resources are self-taught. The majority of students surveyed were unaware of Emerald and EBSCO databases relevant to Library and Information Science students, and they found accessing eresources time-consuming. Conclusion – The study concluded that a concerted effort is needed by both LIS lecturers and university librarians in promoting use of the library’s electronic resources.

  14. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  15. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  16. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  17. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  18. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  19. Dynamic models for distributed generation resources

    Energy Technology Data Exchange (ETDEWEB)

    Morched, A.S. [BPR Energie, Sherbrooke, PQ (Canada)

    2010-07-01

    Distributed resources can impact the performance of host power systems during both normal and abnormal system conditions. This PowerPoint presentation discussed the use of dynamic models for identifying potential interaction problems between interconnected systems. The models were designed to simulate steady state behaviour as well as transient responses to system disturbances. The distributed generators included directly coupled and electronically coupled generators. The directly coupled generator was driven by wind turbines. Simplified models of grid-side inverters, electronically coupled wind generators and doubly-fed induction generators (DFIGs) were presented. The responses of DFIGs to wind variations were evaluated. Synchronous machine and electronically coupled generator responses were compared. The system model components included load models, generators, protection systems, and system equivalents. Frequency responses to islanding events were reviewed. The study demonstrated that accurate simulations are needed to predict the impact of distributed generation resources on the performance of host systems. Advances in distributed generation technology have outpaced the development of models needed for integration studies. tabs., figs.

  20. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...