WorldWideScience

Sample records for insanity defense

  1. Frendak to phenis to breivik: an examination of the imposed insanity defense.

    Science.gov (United States)

    Richie, William Donald; Alam, Farzana; Gazula, Lalitha; Embrack, Harold; Nathani, Milankumar; Bailey, Rahn Kennedy

    2014-01-01

    The imposition of the insanity defense is a complicated psycho-legal scenario. Globally, definitions of insanity differ from country to country. In a multitude of cases, a determination of insanity at the time of a criminal act means the offender will not be considered responsible for his or her action(s). In many jurisdictions, concerns have been raised that the insanity defense has been used to mitigate punishment, usually after a particularly heinous crime. In this review, the authors use three cases - Frendak, Phenis, and Breivik to demonstrate how the imposition of the insanity defense has been used for legal purposes in the past and present. In an effort to give more background to each of the above-mentioned cases, the writers have provided some details to aid comprehension. The authors offer recommendations for the ethical forensic evaluator unburdened by partisan allegiance and invested in the search for truth. This review article relies on peer-reviewed articles available from PubMed, Meharry Online Library, and legal dictionaries. We also cross-referenced reputable news sources to ensure the validity of the facts we present.

  2. FRENDAK to PHENIS to BREIVIK: An Examination of the Imposed Insanity Defense

    Directory of Open Access Journals (Sweden)

    William Donald Richie

    2014-12-01

    Full Text Available The imposition of the insanity defense is a complicated psycho-legal scenario. Globally, definitions of insanity differ from country to country. In a multitude of cases, a determination of insanity at the time of a criminal act means the offender will not be considered responsible for his or her action(s. In many jurisdictions, concerns have been raised that the insanity defense has been used to mitigate punishment, usually after a particularly heinous crime. In this review, the authors use three cases - FRENDAK, PHENIS, and BREIVIK to demonstrate how the imposition of the insanity defense has been used for legal purposes in the past and present. In an effort to give more background to each of the above-mentioned cases, the writers have provided some details to aid comprehension. The authors offer recommendations for the ethical forensic evaluator unburdened by partisan allegiance and invested in the search for truth. This review article relies on peer-reviewed articles available from PubMed, Meharry Online Library and legal dictionaries. We also cross-referenced reputable news sources to ensure the validity of the facts we present.

  3. Do Juries Let Some Defendants Get Away With Murder? Examining the Effect of Pre-Cognitive Decision Making on Insanity Defense Cases

    OpenAIRE

    Resnikoff, Theodore

    2017-01-01

    This research examines the effect of bias on Insanity Defense cases, theorizing that juries treat Insanity Defense cases differently from other types of cases because they are ill equipped to contemplate them. Insanity Defense cases are statistically rare, yet the success rate of such defenses is surprisingly high. This thesis presents a qualitative argument examining reasons for the success of the Insanity Defense, explains the neuroscience, and effect of group dynamics on decision making, a...

  4. Nuclear Disarmament and the Insanity Defense: What Happened to Political Responsiveness?

    Science.gov (United States)

    Fleming, John H.; Shaver, Kelly G.

    A study which explored the degree to which belief in a politically responsive/unresponsive world might be related to opinions concerning nuclear disarmament, the insanity defense, and women's rights is described. A total of 206 male and female undergraduates completed a 63-item questionnaire consisting of 46 Likert-format I-E items and 17 attitude…

  5. Teaching Clinical (and Nonclinical) Psychology through Applications to the Legal System: Violence Risk Assessment and the Insanity Defense

    Science.gov (United States)

    Costanzo, Marina L.; Costanzo, Mark A.

    2013-01-01

    The prediction of dangerousness and the insanity defense are two areas where psychologists provide research-based expertise to the courts. Teachers of psychology can use these topics to capture the attention of students and to show how psychological research and theory can inform and influence the legal system. Specifically, teachers can use the…

  6. Should a personality disorder qualify as a mental disease in insanity adjudication?

    Science.gov (United States)

    Bonnie, Richard J

    2010-01-01

    The determinative issue in applying the insanity defense is whether the defendant experienced a legally relevant functional impairment at the time of the offense. Categorical exclusion of personality disorders from the definition of mental disease is clinically and morally arbitrary because it may lead to unfair conviction of a defendant with a personality disorder who actually experienced severe, legally relevant impairments at the time of the crime. There is no need to consider such a drastic approach in most states and in the federal courts, where the sole test of insanity is whether the defendant was "unable to appreciate the wrongfulness of his conduct at the time of the offense." This is because the only symptoms that are legally relevant in such jurisdictions are those that impair reality-testing and thereby affect the person's capacity to understand the nature and consequences of her actions. However, if the test of insanity includes a "volitional prong" (inability to control one's behavior), some way must be found to limit the scope of the defense to the core cases (involving psychotic conditions) to which it has traditionally been applied, and to prevent a shift toward a deterministic account of criminal conduct - i.e., "people can't help being who they are and doing what they do." The best way of accomplishing this is to limit the definition of mental disease to severe disorders characterized by gross disturbances of the person's capacity to understand reality. © 2010 American Society of Law, Medicine & Ethics, Inc.

  7. 38 CFR 3.354 - Determinations of insanity.

    Science.gov (United States)

    2010-07-01

    ....354 Determinations of insanity. (a) Definition of insanity. An insane person is one who, while not... behavior; or who interferes with the peace of society; or who has so departed (become antisocial) from the... the definition in paragraph (a) of this section. [26 FR 1589, Feb. 24, 1961] ...

  8. Closing Italian Forensic Psychiatry Hospitals in Favor of Treating Insanity Acquittees in the Community.

    Science.gov (United States)

    Carabellese, Felice; Felthous, Alan R

    2016-03-01

    Originally a hedge against the death penalty, the insanity defense came to offer hospitalization as an alternative to imprisonment. In the late 19th century Italy opened inpatient services first for mentally ill prisoners and then for offenders found not guilty by reason of insanity. Within the past decade, a series of decrees has resulted in transferring the responsibility for treating NGRI acquittees and "dangerous" mentally ill prisoners from the Department of Justice to the Department of Health, and their treatment from Italy's high security forensic psychiatric hospitals (OPGs) to community regional facilities (REMSs, Residences for the Execution of Security Measures), community mental health facilities, one of which is located in each region of Italy. Today community REMSs provide the treatment and management of socially dangerous offenders. The dynamic evolution of Italy's progressive mental health system for insanity acquittees, to our knowledge the most libertarian, community oriented approach of any country, is retraced. Discussion includes cautionary concerns as well as potential opportunities for improvements in mental health services. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  9. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  10. "Too stubborn to ever be governed by enforced insanity": Some therapeutic jurisprudence dilemmas in the representation of criminal defendants in incompetency and insanity cases.

    Science.gov (United States)

    Perlin, Michael L

    2010-01-01

    Little attention has been paid to the importance of the relationship between therapeutic jurisprudence (TJ) and the role of criminal defense lawyers in insanity and incompetency-to-stand-trial (IST) cases. That inattention is especially noteworthy in light of the dismal track record of counsel providing services to defendants who are part of this cohort of incompetency-status-raisers and insanity-defense-pleaders. On one hand, this lack of attention is a surprise as TJ scholars have, in recent years, turned their attention to virtually every other aspect of the legal system. On the other hand, it is not a surprise, given the omnipresence of sanism, an irrational prejudice of the same quality and character of other irrational prejudices that cause (and are reflected in) prevailing social attitudes of racism, sexism, homophobia, and ethnic bigotry, that infects both our jurisprudence and our lawyering practices. Sanism is largely invisible and largely socially acceptable, and is based predominantly upon stereotype, myth, superstition, and deindividualization. It is sustained and perpetuated by our use of alleged "ordinary common sense" (OCS) and heuristic reasoning in an unconscious response to events both in everyday life and in the legal process. This paper examines the literature that seeks to apply TJ principles to the criminal law process in general, drawing mostly on the work of Professor David Wexler. It considers why the lack of attention that I have referred to already is surprising (given TJ's mandate and the fact that many TJ issues are inevitably raised in any insanity or IST case). The paper then considers why this lack of attention is not surprising, given the omnipresence of sanism. It will consider some of the actual counseling issues that might arise in these contexts, and offer some suggestions to lawyers representing clients in cases in which mental status issues may be raised. The paper concludes that we must rigorously apply therapeutic

  11. Eliminating mental disability as a legal criterion in deprivation of liberty cases: The impact of the Convention on the Rights of Persons With Disabilities on the insanity defense, civil commitment, and competency law.

    Science.gov (United States)

    Slobogin, Christopher

    2015-01-01

    A number of laws that are associated with deprivations of liberty, including the insanity defense, civil commitment, guardianship of the person and numerous competency doctrines in the criminal context, require proof of mental disability as a predicate. The Convention on the Rights of Persons With Disabilities commands signatory states to eliminate that predicate. Summarizing principles set out in my book Minding Justice: Laws That Deprive People With Mental Disability of Life and Liberty, I explain how this seemingly radical stance can be implemented. Specifically, this article proposes adoption of an "integrationist defense" in the criminal context, an "undeterrability requirement" when the state seeks preventive detention outside of the criminal process, and a "basic rationality and self-regard test" for incompetency determinations. None of these proposals requires proof of a mental disorder as a predicate condition. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Application of Defence of Insanity in Nigerian Courts: The Missing Link

    African Journals Online (AJOL)

    Aim: This paper is aimed at appraising the import of forensic psychology to the legal trials of mentally ill people. Method: Nigeria laws are replete with Criminal Codes and Criminal Procedure Acts but there are numerous failed cases of insanity defences in Nigeria. The research technique of content analysis of insanity ...

  13. From cure to custodianship of the insane poor in nineteenth-century Connecticut.

    Science.gov (United States)

    Goodheart, Lawrence B

    2010-01-01

    Connecticut was the exception among the Northeastern and Middle Atlantic states in not founding a public institution for the insane until after the Civil War when it opened the Hospital for the Insane at Middletown in 1868, a facility previously neglected by scholars. The state had relied on the expedient of subsidizing the impoverished at the private Hartford Retreat for the Insane that overtaxed that institution and left hundreds untreated. Despite abundant evidence to the contrary, well meaning officials oversold the idea that the Middletown site would promote cures and be cost effective. A number of unanticipated consequences occurred that mirrored fundamental changes in nineteenth-century psychiatry. The new hospital swelled by 1900 to over 2,000 patients, the largest in New England. Custodianship at the monolithic hospital became the norm. The hegemony of monopoly capitalism legitimated the ruling idea that bigger institutions were better and was midwife to the birth of eugenic responses. Class based psychiatry--the few rich at the Retreat and the many poor at Middletown--was standard as it was in other aspects of the Gilded Age. Public policy toward the insane poor in Connecticut represents an outstanding example of the transition from antebellum romanticism to fin de siècle fatalism.

  14. ANALISIS MANAJEMEN RISIKO PEMBIAYAAN MUSYARAKAH PADA BAITUL QIRADH BINA INSAN MANDIRI BANDA ACEH

    Directory of Open Access Journals (Sweden)

    Badratun Nisak

    2014-06-01

    Full Text Available Risk management is a set of procedures and methodologies that used to identify, measure, monitor and control of risks that could be aroused from the business of banks. This article aims to analyze the implementation of risk management system at Baitul Qiradh Bina Insan Mandiri and its impact on musharaka financing. The sample for this research is Micro Small Business Group at Kuta Alam’s regency which was financed by the Baitul Qiradh. Data for this research was gathered through interview, observation and documentation study. The findings suggest that there were three risk possibilities could escalate at the financing project, namely business risk, shrinking risk, and character risk. Among these risks, the Baitul Qiradh experiences two of them, which was business and character risks. Therefore, the efforts were made to minimize the risk of Baitul Qiradh Bina Insan Mandiri by applying 5C concept, namely character, capability, capital, condition and collateral. =========================================== Manajemen risiko adalah serangkaian prosedur dan metodologi yang digunakan untuk mengidentifikasi, mengukur, memantau, dan mengendalikan risiko yang timbul dari kegiatan usaha bank. Tujuan penelitian adalah untuk menganalisis sistem manajemen risiko yang diimplementasikan pada Baitul Qiradh Bina Insan Mandiri dan dampaknya terhadap kelancaran pembayaran dalam pembiayaan musyarakah. Pembahasan kajian hanya terfokus ke manajemen risiko pembiayaan musyarakah pada kelompok usaha dalam Rumpun Kuta Alam yang dibina oleh Baitul Qiradh Bina Insan Mandiri Banda Aceh. Pengumpulan data dilakukan dengan wawancara, observasi, dan studi dokumentasi. Hasil penelitian menunjukkan bahwa dalam melakukan pembiayaan tersebut Baitul Qiradh Bina Insan Mandiri tidak terlepas dari kemungkinan terjadinya 3 aspek risiko, yaitu: risiko bisnis yang dibiayai (busness risk, risiko berkurangnya nilai pembiayaan (shrinking risk, dan risiko karakter buruk mudharib (character

  15. Unpacking insanity defence standards: An experimental study of rationality and control tests in criminal law

    Directory of Open Access Journals (Sweden)

    Rebecca K. Helm

    2016-07-01

    Full Text Available The present study investigated the impact of different legal standards on mock juror decisions concerning whether a defendant was guilty or not guilty by reason of insanity. Undergraduate students (N = 477 read a simulated case summary involving a murder case and were asked to make an insanity determination. The cases differed in terms of the condition of the defendant (rationality deficit or control deficit and the legal standard given to the jurors to make the determination (Model Penal Code, McNaughten or McNaughten plus a separate control determination. The effects of these variables on the insanity determination were investigated. Jurors also completed questionnaires measuring individualism and hierarchy attitudes and perceptions of facts in the case. Results indicate that under current insanity standards jurors do not distinguish between defendants with rationality deficits and defendants with control deficits regardless of whether the legal standard requires them to do so. Even defendants who lacked control were found guilty at equal rates under a legal standard excusing rationality deficits only and a legal standard excluding control and rationality deficits. This was improved by adding a control test as a partial defence, to be determined after a rationality determination. Implications for the insanity defence in the Criminal Justice System are discussed.

  16. Insane acquittees and insane convicts: the rationalization of policy in nineteenth-century Connecticut.

    Science.gov (United States)

    Goodheart, Lawrence B

    2017-12-01

    A current situation in Connecticut of whether a violent insane acquittee should be held in a state prison or psychiatric facility raises difficult issues in jurisprudence and medical ethics. Overlooked is that the present case of Francis Anderson reiterates much of the debate over rationalization of policy during the formative nineteenth century. Contrary to theories of social control and state absolutism, governance in Connecticut was largely episodic, indecisive and dilatory over much of the century. The extraordinary urban and industrial transformation at the end of the Gilded Age finally forced a coherent response in keeping with longstanding legal and medical perspectives.

  17. J.H. Pons on 'Sympathetic insanity': With an introduction by GE Berrios.

    Science.gov (United States)

    Berrios, G E; Pons, J H

    2014-09-01

    The ancient concept of 'sympathy' originally referred to a putative affinity or force that linked all natural objects together. This notion was later used to explain the manner in which human beings related and felt for each other. A large literature exists on both the physical and psychological definitions of sympathy. Until the nineteenth century the conceptual apparatus of medicine preserved the view that the organs of the human body had a sympathetic affinity for each other. In addition to these 'physiological' (normal) sympathies there were morbid ones which explained the existence of various diseases. A morbid sympathy link also explained the fact that insanity followed the development of pathological changes in the liver, spleen, stomach and other bodily organs. These cases were classified as 'sympathetic insanities'. After the 1880s, the sympathy narrative was gradually replaced by physiological, endocrinological and psychodynamic explanations. The clinical states involved, however, are often observed in hospital practice and constitute the metier of 'consultation-liaison psychiatry'. Hence, it is surprising that historical work on the development of this discipline has persistently ignored the concept of 'sympathetic insanity'. © The Author(s) 2014.

  18. Means of determining the condition of insanity in administrative proceedings based on the court practice

    Directory of Open Access Journals (Sweden)

    Tatyana Mikhailovna Sekretareva

    2015-06-01

    Full Text Available Objective in the absence in the Russian administrative legislation of the provisions on the procedure and the ways to detect the condition of insanity of a physical person who has committed an administrative wrongful act there is a variety of lawenforcement acts for the resolution of these issues. In order to further systematize the enforcement acts for the resolution of these issues we consider it necessary to assess the practical application of the provisions of Article 2.8 quotInsanityquot of the Administrative Code by the courts in different Russian regions. Methods the methodological basis of research is the general scientific dialectic method of cognition the author used methods such as analysis synthesis description explanation. Results the author has conducted an analysis of practice of application of the provisions of Article 2.8 quotInsanityquot of the Administrative Code by courts of the Russian Federation. On the basis of this analysis it is found that courts use different methods of establishing the state of insanity of the person who committed the violation of the legislation on administrative offences. This is due to the fact that the courts base on a variety of actual data when establishing the state of insanity in the resolution of specific cases. These actual data were combined into 4 groups. Each method for establishing the state of insanity was evaluated which allowed to conclude about the need to organize the actions of individuals considering the cases on administrative offences aimed at defining the state of insanity of the offender and to offer one of the possible options for resolving the identified problems. Scientific novelty for the first time the analysis of practice of application of Article 2.8 quotInsanityquot of the Administrative Code was made and the author39s assessment of its provisions is given. Practical value the results of the study can be used for the generalization of judicial practice at the level of

  19. "On cyclic insanity" by Karl Ludwig Kahlbaum, MD: a translation and commentary.

    Science.gov (United States)

    Baethge, Christopher; Salvatore, Paola; Baldessarini, Ross J

    2003-01-01

    Karl Ludwig Kahlbaum (1828-1899) spent most of his professional career as director of a private psychiatric sanatorium in Germany. He remains influential for introducing his "clinical method" (based on considering the course of an illness as well as the signs and symptoms) of differential diagnosis of specific psychiatric syndromes and urging abandonment of the more unitary views of psychotic disorders favored by the leading German academic theorists of his time. Kahlbaum's approach to nosology, detailed in an 1863 monograph and other works, strongly influenced Kraepelin's views. However, remarkably few of the important writings of this keen clinical observer are available in English translation. His seminal lecture-essay "On Cyclic Insanity" [Uber cyklisches Irresein] of 1882 is translated into English here for the first time, with comments about its place in the history of the evolution of the concept of bipolar disorder, including its position as a link between Falret's folie circulaire and Kraepelin's manic-depressive insanity.

  20. The Gay Panic Defense: Legal Defense Strategy or Reinforcement of Homophobia in Court?

    Science.gov (United States)

    Tomei, Jenna; Cramer, Robert J; Boccaccini, Marcus T; Panza, Nancy Ryba

    2017-06-01

    Gay panic refers to a heterosexual man violently responding to unwanted sexual advances from a gay man. In court, the defendant may argue he was provoked or temporarily insane. This study utilized 352 jury-eligible citizens to assess differences across mediums of gay panic. Participants were asked to read vignettes depicting a control, gay panic as provocation, or gay panic as insanity condition and provide verdicts and ratings of blame and responsibility. Participants also completed measures assessing political orientation and homonegativity. Data were analyzed via a MANCOVA, a chi-square goodness-of-fit test, and general linear modeling. Verdicts, victim blame, and ratings of responsibility differed across vignette conditions, with an observed leniency effect when gay panic was claimed in either context. Homonegativity also exacerbated patterns of prodefendant views, as participants higher in homonegativity assigned higher victim blame, lower defendant responsibility, and more lenient verdicts in the gay panic conditions. The effect of political orientation was nuanced, as only republicans in the provocation condition followed the anticipated pattern in rendering more lenient verdicts. Results provide additional support for the notion gay panic defenses may be, in part, fueled by political beliefs and prejudicial beliefs against persons of sexual minority status. Drawing from a justification-suppression model, it may be that in cases of gay panic, a context is created in which prejudiced ideologies can be openly expressed via leniency on the defendant. Implications may be relevant to future criminal law policies and practices, particularly advocacy and policy efforts, judicial training, and trial consultation to attorneys for juror selection and development of trial strategy.

  1. "Idiots, infants, and the insane": mental illness and legal incompetence

    OpenAIRE

    Szasz, T

    2005-01-01

    Prior to the second world war, most persons confined in insane asylums were regarded as legally incompetent and had guardians appointed for them. Today, most persons confined in mental hospitals (or treated involuntarily, committed to outpatient treatment) are, in law, competent; nevertheless, in fact, they are treated as if they were incompetent. Should the goal of mental health policy be providing better psychiatric services to more and more people, or the reduction and ultimate elimination...

  2. Coverage of Rosenhan's "On Being Sane in Insane Places" in Abnormal Psychology Textbooks

    Science.gov (United States)

    Bartels, Jared M.; Peters, Daniel

    2017-01-01

    The present study examined 12 abnormal psychology textbooks to determine whether Rosenhan's classic study, "Being sane in insane places," was covered, and if so, the nature of that coverage. Only 50% covered the study, with all describing the study as demonstrating the biasing power of psychiatric labels. Two key aspects of the study…

  3. "Idiots, infants, and the insane": mental illness and legal incompetence.

    Science.gov (United States)

    Szasz, T

    2005-02-01

    Prior to the second world war, most persons confined in insane asylums were regarded as legally incompetent and had guardians appointed for them. Today, most persons confined in mental hospitals (or treated involuntarily, committed to outpatient treatment) are, in law, competent; nevertheless, in fact, they are treated as if they were incompetent. Should the goal of mental health policy be providing better psychiatric services to more and more people, or the reduction and ultimate elimination of the number of persons in the population treated as mentally ill?

  4. Mental Insanity Assessment of Pedophilia: The Importance of the Trans-Disciplinary Approach. Reflections on Two Cases

    Directory of Open Access Journals (Sweden)

    Cristina Scarpazza

    2018-05-01

    Full Text Available A 60 plus-year-old male was charged with pedophilia for forcing a child to touch him inappropriately near a primary school fence. In another case, a 70 plus-year-old male was charged with pedophilia for intimately touching a boy in a cinema. What led them to manifest this socially-inappropriate and legally-relevant behavior? Is there an explanation for the sexually-related behavioral changes emerging late in life of these two men? Indeed, a common point exists between the two men: both were found to suffer from highly-disabling neurological conditions, known to have a potential effect on social behavior. Specifically, a large right frontoparietal meningioma was found to have important influence on the first man's cognition and control inhibition, whereas frontotemporal dementia prevented the second man from understanding the moral disvalue of his sexually-inappropriate behavior and controlling his sexual impulses. In the current presentation, particular emphasis is placed on the logical reasoning supporting the conclusions that both the pedophiles should be considered not guilty by reason of insanity. Furthermore, experimental methods have been used to explore both cases, which rely on the existence of cognitive models for the phenomena under study, the integration of insights offered by different disciplines and the application of a variety of tools and approaches that follow the “convergence of evidence” principle, which could be safely used in court to support a mental insanity claim. Here, we describe how the use of the experimental method could become useful to reduce the uncertainty in mental insanity assessments. The use of a transdisciplinary, scientifically-grounded approach can help to change the way legal phenomena are interpreted. For instance, when assessing mental insanity, consultants should not only investigate the eventual existence of a diagnosis, but should assess the cognitive/affective abilities that are necessary to

  5. INSAN KAMIL DALAM PEMIKIRAN MUHAMMAD NAFIS AL-BANJARI DAN ABDUSH-SHAMAD AL-FALIMBÂNÎ DALAM KITAB AD-DURR AN-NAFIS DAN SIYAR AS-SÂLIKÎN (SEBUAH STUDI PERBANDINGAN

    Directory of Open Access Journals (Sweden)

    Rodiah Rodiah

    2015-10-01

    Full Text Available This paper tries to explore the concept of Insan Kamil through two books of Sufism, ad-Durr an-Nafis by Muhammad Nafis al-Banjari and Siyar as-Salikin by Abdush-Shamad al-Falimbânî. The method used in this paper comparative descriptive approach, because the studies referred to in this study aims to look at the similarities and differences of the concept of Insan Kamil contained in both books. These results indicate that the thought of Muhammad Nafis al-Banjari in the book ad-Durr an-Nafis and Abdush-Samad al-Falimbânî in the book Siyar al-Salikin against the concept of Insan Kamil has the same basic concept, in addition to the typical thinking its own distinct between the two.

  6. 'Insane emigrants' in transit: Psychiatric patients' files as a source for the history of return migration, c. 1910

    NARCIS (Netherlands)

    Blok, G.

    2015-01-01

    This article highlights a source that can contribute to the history of migration and mental health: the case records of Eastern European emigrants who tried to enter America at the beginning of the twentieth century, but were refused entrance because of their alleged insanity. Some of these

  7. Insanity and Cinema: Keys to understand a complicated affair

    Directory of Open Access Journals (Sweden)

    Beatriz Vera Poseck

    2008-10-01

    Full Text Available Psychopathology and mental disturbances have always been prevalent in cinema because they add an element of drama and mystery. Films portraying mentally disturbed characters like Dr. Dippy´s Sanitarium (1906 or Das Kabinett des Dr. Caligari (1919 by Robert Wiener were released only a short time after the Lumière brothers had invented the cinematographer. Since then, there are a large number of films whose plot and intrigue are based on insanity and its manifestations. The list grows steadily every year.             This article is a review of some of the mental disturbances that have been portrayed in films. Its main purpose is to establish sensible choices and mistakes that have been committed while attempting to address the bottomless world of madness.

  8. Assessment of causal associations between illness and criminal acts in those who are acquitted by reason of insanity.

    Science.gov (United States)

    Skeie, Christian Aarup; Rasmussen, Kirsten

    2015-02-24

    The court proceedings after the terrorist attacks on 22 July 2011 reignited the debate on the justification for having a rule that regulates the insanity defence exclusively on the basis of a medical condition – the medical principle. The psychological principle represents an alternative that requires a causal relationship between the psychosis and the acts committed. In this article we investigate rulings made by the courts of appeal where the accused have been found legally insane at the time of the act, and elucidate the extent to which a causal relationship between the illness and the act appears to be in evidence. Data have been retrieved from rulings by the courts of appeal published at lovdata.no, which include anonymised rulings. Searches were made for cases under Section 39 (verdict of special sanctions) and Section 44 (acquittal by reason of insanity) of the General Civil Penal Code. Court rulings in which a possible causal relationship could be considered were included. The included rulings were carefully assessed with regard to whether a causal relationship existed between the mental disorder of the accused at the time and the criminal act. The search returned a total of 373 rulings, of which 75 were included. The vast majority of the charges referred to serious crimes. Diagnoses under ICD-10 category codes F20-29 (schizophrenia, schizotypal and delusional disorders) were the most frequently occurring type. In 17 of the 75 rulings (23%), it was judged that no causal relationship between the illness and the act existed. In 25 of 26 cases that involved homicide, a causal relationship between the illness and the act was judged to be evident. The data may indicate that the medical principle results in impunity in a considerable number of rulings where the illness of the accused apparently has had no effect on the acts committed.

  9. Insane defendants and forensic convicts: before and after the onset of the new forensic psychiatry network and the criminal justice system reform in Chile.

    Science.gov (United States)

    Cid, Rodrigo D

    2010-09-01

    Like other Latin American democratic societies, Chile is supposed to respect legal rights of mentally ill people who are in trouble with the law, and provide them protection, treatment and welfare. Therefore, in this decade, the Chilean Criminal Justice and Mental Health System has undergone significant changes. Because this article is related to the recent social features that involve different areas such as justice, mental health assistance and forensic psychiatry systems, and thereby the nonexistence of current literature that reviews this matter from a global perspective and its implications for the mental health population involved in the justice system, its review and analysis seems to be interesting. The 'New Forensic Psychiatry Network' (NFPN) has been putting in relevant efforts to offer proper treatment and forensic assessment taking into account the civil rights of mentally insane people, and the 'Criminal Justice System Reform' (CJSR) is making possible legal conditions for better justice ensuring a more just resolution of insane defendants' and mentally ill convicts' lawsuits. From the author's viewpoint, all these changes are leading to a deep cultural impact on a Chilean's mind, changing their vision of justice and how society should respect insane defendants' and mentally ill convicts' legal rights.

  10. Transformation of a metaphor: semantic shift in a Cantonese term 'Chi Sin' denoting insanity.

    Science.gov (United States)

    Ng, J Y W; Chen, E Y H

    2015-03-01

    The historical evolution of the existing terms used to describe insanity may be able to shed light on the formation of stigma towards psychosis patients. In Hong Kong, a widely used Cantonese term for insanity 'Chi Sin' provides a unique example because of its neutral original sense, as it literally means misconnection in a network circuit. We attempt to trace the origin and subsequent evolution of the term 'Chi Sin' from its early use to the present day to understand how local Hong Kong people have attached increasingly negative connotations to this scientific term since the mid-20th century. We sampled as many newspapers and magazines published in Hong Kong from 1939 to June 2014 as possible, and sampled 7 popular local movies from the 1950s and 1960s. We also searched all the newspapers published in Hong Kong, Macau, Taiwan, and Mainland China from January 1998 to June 2014, and searched several other local historical resources. In one early use of 'Chi Sin' in 1939, the term was only used in a technical sense to describe 'short circuiting'. We found that the development of the telephone system, the Strowger system, in Hong Kong is closely related to the evolution of the semantics of the term 'Chi Sin'. The original meaning of short circuitry of the term 'Chi Sin' is no longer used, and it has become a dead metaphor through repeated use with negative emotional connotations. This illustrates some of the factors facilitating the emergence of a metaphor with subsequent semantic drift.

  11. The shadow, the tyrant and the insane: the east and west dualism in the visual journalism

    Directory of Open Access Journals (Sweden)

    Alberto Klein

    2014-07-01

    Full Text Available This paper explores the East and West dualism considering three images: the shadow, the tyrant and the insane, respectively linked to Osama Bin Laden, Saddam Hussein and Mahmoud Ahmadinejad. These representations, given their occurrence in the media, appear as stereotypes in the visual journalism, being in total opposition to western values, such as illuminism, democracy and reason. From the perspective of the concept of Orientalism, the text also analyzes semiotic procedures which constitute the process of demonization, according to the contribuitions of Ivan Bystrina, Gilbert Durand and Stuart Clark.

  12. Penggunaan Incoterms dalam Perjanjian Perdagangan Internasional (Studi Pada Pt. Insan Bonafide di Banjarmasin

    Directory of Open Access Journals (Sweden)

    Adhitya Christanto Henry Dalim

    2016-09-01

    Full Text Available Tujuan penelitian ini untuk mengetahui dan menganalisis kedudukan incoterms selaku hukum kebiasaan internasional dalan perjanjian perdagangan internasional serta untuk mengetahui dan menganalisis hak dan kewajiban pengusaha eksportir dan importir sehubungan dengan penggunaan Incoterms dalam perjanjian perdagangan internasional (Studi pada PT. Insan Bonafide di Banjarmasin. Kegunaan yang di harapakan dari hasil penelitian Sebagai sumbangan pemikiran dalam bidang ilmu hukum khususnya terkait dengan hukum perdagangan internasional, bagi pelaku usaha di bidang perdagangan internasional dan bagi pemerintah dalam membuat peraturan perundang-undangan (legislasi berkenaan dengan perdagangan internasional. Metode penelitian ini menggunakan jenis penelitian hukum normatif,yaitu penelitian hukum yang dilakukan dengan cara meneliti bahan hukum(bahan hukum primer, bahan hukum sekunder, dan bahan hukum tersier, yang relevan dengan judul yang di angkat penulis. Ada pun tipe penelitianadalah penelitian dengan menitikberatkan permasalahan yang sering timbul berkaitan dengan kekaburan hukum (vage norm berkenaan dengan makna dan ruang lingkup dari Incoterms tersebut. Pendekatan penelitian menggunakan pendekatan analitis (analytical approach.Menurut hasil dari penelitian tesis ini menunjukan bahwa : Pertama, mengenai kekuatan hukum Incoterms dalam perjanjian perdagangan internasional, Incoterms yang lahir dari hukum kebiasaan dan sebagai suatu kebiasaan internasional yang berkedudukan hukum yang merupakan sumber hukum perdagangan internasional. namun demikian kekuatan hukum Incoterms selaku hukum kebiasaan internasional tidak sama dengan kekuatan hukum dari Perjanjian Internasional seperti Konvensi, Traktat, Piagam, Agreement, Covenant, Protocol, Pacta, dan lain-lain. Kedua, hak dan kewajiban pengusaha eksportir dan importir sehubungan dengan penggunaan Incoterms dalam perjanjian perdagangan internasional khususnya pada PT. Insan Bonafide dengan menggunakan

  13. Evaluating conditional release in not guilty by reason of insanity acquittees: a prospective follow-up study in Virginia.

    Science.gov (United States)

    Vitacco, Michael J; Vauter, Rebecca; Erickson, Steven K; Ragatz, Laurie

    2014-08-01

    Detailed research on treatment and risk management approaches with not guilty by reason of insanity acquittees (NGRI) during their conditional release is needed as states increasingly use community-based services for these individuals. Grounded in case law, and supported by follow-up studies demonstrating low recidivism rates, states have been encouraged in their efforts to conditionally release NGRI acquittees. The authors evaluated a state-wide sample of 127 NGRI acquittees released into the community after spending a mean of 61.63 months (SD = 76.54) in the hospital. One hundred individuals were committed to the hospital for lengthier treatment (M hospital time = 77.23 months, SD = 79.84), but 27 individuals were released to the community after a relatively short hospital stay (M hospital time = 5.60 months, SD = 3.01). Regarding release, 96 individuals (75.6%) maintained their conditional release. After evaluating a host of demographic and standardized risk data, the following variables predicted revocation on conditional release: previous failure on conditional release, nonadherence with hospital treatment, dangerousness to others, and previous violent charges. A multivariate survival analysis determined criminal behavior and previous failure on conditional release predicted time to revocation. The results of this study demonstrate the importance of considering standardized risk variables in the community-based management of forensic patients. In addition, the data are supportive of continued attempts at moving insanity acquittees from the hospital to the community via conditional release.

  14. Race, Apology, and Public Memory at Maryland's Hospital for the 'Negro' Insane

    Directory of Open Access Journals (Sweden)

    Zosha Stuckey

    2017-03-01

    Full Text Available To respond to a recent demand of the ACLU of Maryland, and to augment theories from Disability Incarcerated (2014 about the convergence of race, disability, and due process (or lack thereof, this essay analyzes the extent to which racism informed the creation of Maryland's Hospital for the 'Negro' Insane (Crownsville Hospital. In order to understand the extent of racism in Crownsville's earlier years, I will take into account 14 categories within conditions of confinement from 1921-1928 and compare them to the nearby, white asylum. Ultimately, the hospital joins the ranks of separate and unequal (Plessy vs. Ferguson institutions founded alongside a rhetoric of fear that the Baltimore Sun daily paper deemed "a Black invasion" of the city of Baltimore. Even more, I add to public memory of this racialized space invoking the rhetorical frame, as Kendall Phillips advises, of responsibility and apology (versus absolution within the context of present-day racial justice movements.

  15. Psychiatric monitoring of not guilty by reason of insanity outpatients.

    Science.gov (United States)

    Almeida, Fernando; Moreira, Diana; Moura, Helena; Mota, Victor

    2016-02-01

    Individuals deemed Not Guilty by Reason of Insanity (NGRI) by the courts, under Article 20 of the Portuguese Criminal Code, have often committed very serious crimes. It is unreasonable to consider that these patients were usually kept without adequate supervision after the security measure had been declared extinct. They often decompensated after leaving the institution where they complied with the security measure, and/or relapsed to alcohol and drug abuse. Very often, severe repeated crime erupted again. Considering this, there was an urgent need to keep a follow-up assessment of these patients in order to prevent them from relapsing in crime. This work presents the results of a psychiatric follow-up project with NGRI outpatients. The main goals of the project were: ensuring follow-up and appropriate therapeutic responses for these patients, maintaining all individuals in a care network, and preventing them from decompensating. The team consisted of a psychiatrist, a nurse, and a psychologist. Seventy-two patients were monitored during two years. Results demonstrated the unequivocal need to follow up decompensated patients after the court order is extinguished. Suggestions are presented for a better framing and psychiatric follow-up of these patients. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  16. Food refusal and insanity: sitophobia and anorexia nervosa in Victorian asylums.

    Science.gov (United States)

    van Deth, R; Vandereycken, W

    2000-05-01

    Although anorexia nervosa emerged as a new syndrome in the second half of the 19th century, this clinical picture seemed to be unknown in the psychiatric hospitals or asylums. In asylum medicine, the commonly used concept of sitophobia to designate food refusal in the insane covered a wide variety of mental disturbances and cannot be plainly equated with anorexia nervosa. A major difference is the occurrence of hallucinations and delusions specifically centered around religion and digestion. Most probably, anorectic patients were not treated in asylums, but at home, in the doctor's office, or in general hospitals. This pattern may be partly attributed to the fact that both patients and doctors were focusing on symptoms of self-starvation like emaciation, constipation, and amenorrhea, which were primarily interpreted as referring to somatic diseases. Additionally, wealthy families probably preferred private care in water-cure establishments, sanatoria, and rest homes to the stigmatizing referral of their anorectic daughter to an asylum. Hence, the fact that late 19th-century institutionalized psychiatry was only incidentally confronted with anorexia nervosa may explain its lack of interest in the emerging syndrome. Copyright 2000 by John Wiley & Sons, Inc.

  17. Insanity and ethnicity in New Zealand: Māori encounters with the Auckland Mental Hospital, 1860-1900.

    Science.gov (United States)

    Barry, Lorelle; Coleborne, Catharine

    2011-09-01

    This article examines Māori patients at the Auckland Mental Hospital between 1860 and 1900.We argue that the patient case notes reveal 'European' categories in which Māori were situated, and demonstrate the extent to which the authorities at the hospital grappled with their appearance, their language and their culture, all of which were elements of their ethnicity. We argue that the use of institutional case records is highly suggestive of some of the historical meanings of insanity for Māori, including the lack of detailed or sustained collection of information about patients' tribal affiliations, the interest shown in their rights to land in maintenance payment inquiries, the experiences of cultural alienation or mate Māori, and the sad outcomes for Māori.

  18. Defying the Definition of Insanity: Assessing the Robust Nature of University Outreach in the Community Using Carnegie Community Engagement Classification and Lynch Outreach Assessment Model (LOAM)

    Science.gov (United States)

    Lynch-Alexander, Erin

    2017-01-01

    Duplicating processes and procedure with anticipation of deviating outcomes is the defining trait of insanity as attributed to a quote by Albert Einstein. It is the antithesis to innovation, which is what is needed in higher education to create impactful changes in the outreach we should be providing to the community. What is important for those…

  19. Pavel Ivanovich Karpov (1873-1932?)--the Russian Prinzhorn: art of the insane in Russia.

    Science.gov (United States)

    Lerner, Vladimir; Podolsky, Grigory; Witztum, Eliezer

    2016-03-01

    The complicated relationship between the discipline of mental health and the arts has barely been studied systematically. Mental hospitals, shelters and prisons--institutions that accommodate the mentally ill--sometimes promote but often discourage and disrupt the patients' artistic creativity and the images created. In psychiatric circles, the recognition of patient art was a long, slow and frustrating process. Among the Western psychiatrists who studied the creative activity of the mentally ill, researchers usually mention such names as C. Lombroso, M. Shearing, V. Morgentaller, H. Prinzhorn and others, but rarely refer to their Russian colleagues and contemporaries. Pavel Ivanovich Karpov (1873-1932?), a Russian psychiatrist, was one of the most extensive researchers in the field of the art of the insane, but unfortunately his name is little known among modern psychiatrists. For his clinical and scientific contributions, he deserves to be remembered in the history of psychiatry. © The Author(s) 2016.

  20. Approach to the notice of insanity. Symptom - mental health and clinical structures. Psychology and psychoanalysis

    Directory of Open Access Journals (Sweden)

    Jorge Enrique Chacón-Afanador

    2017-09-01

    Full Text Available The present work of reflection proposes the approach of the concepts of clinical structures and mental health, starting from the position of psychoanalysis and the question is asked if it is possible to think the madness within them. To do this, it starts from an approach to training and symptom in psychoanalysis and psychology, pointing out the importance of differentiating the psychic from the organic, as well as the psychic from the mental. In this sense, the concept of mental health proposed by WHO is addressed and the place of psychology and psychoanalysis in this concept is questioned. In the same way a reflection is made around the questions: Is it possible to speak of madness in the XXI century, when psychiatry has tried to eradicate this term? To talk about crazy again is to return to a debate that has somehow been left out of the scientific debate? Is it possible to think nowadays the importance of elaborating a nosography that includes Insanity?

  1. Fake insanes and fools: another way of playing (without disguise in Lope de Vega's theatre

    Directory of Open Access Journals (Sweden)

    José Enrique López Martínez

    2014-05-01

    Full Text Available Abstract:In this work I study the theme of fake insanity and foolishness in Spanish Baroque Drama, starting with the work of Lope de Vega. In the first place, I consider some important sources in Italian Drama, specially Grazzini’s La Spiritata and Girolamo Bargagli’s La Pellegrina. Afterwards, I analyse in chronological order some of Lope’s plays that introduce this theme in Hispanic Theater, written at the turn of the XVIIth Century, such as Los locos de Valencia and El mármol de Felisardo; until many late plays by Lope and other playwrights that kept on reproducing the literary elements of those early comedias. In this survey, I examine the metatheatrical sense of fake insanity, the dramatic subgenres where it was featured, its importance for the plots, and its relation to other forms of dramatic deception, like the woman in male disguise and the nobleman as servant; as well as some dramatic and literary devices it relied on: the different kinds of simulated madness, its discoursive features, and the motif of the fake wedding. Resumen:En este trabajo se analiza el desarrollo del tema de la locura y la simpleza fingida en el teatro barroco español, a partir de la obra de Lope de Vega. Primero, se consideran algunos importantes antecedentes italianos, especialmente las obras La Spiritata, de Grazzini, y La Pellegrina, de Girolamo Bargagli. Después, se analizan con detalle y en orden cronológico algunas comedias del Fénix escritas en la última década del siglo XVI y primera del XVII en que introduce este tema en el teatro hispánico, como Los locos de Valencia o El mármol de Felisardo, hasta mencionar varias obras tardías del propio Lope y otros autores que continuaron reproduciendo los recursos de aquellas comedias tempranas. En este recorrido, se hace énfasis en el carácter metateatral de la locura fingida, los subgéneros dramáticos en la que fue incluida, importancia argumental, formas de caracterización y relación con

  2. The importance of the patients deemed not guilty by reason of insanity for the psychiatric reform.

    Science.gov (United States)

    Douzenis, Athanasios

    2016-01-01

    According to the Greek Penal Law if someone "because of a morbid disturbance of his mental functioning" (article 34) is acquitted of a crime or misdemeanour that the law punishes with more than 6 months imprisonment, then the court orders that this individual should be kept in a public psychiatric institution if the court reaches the conclusion that this person poses a threat to public safety.1 Individuals who have broken the law and deemed "not guilty by reason of insanity" are treated in psychiatric units of Psychiatric Hospitals according to the article 69 of the Penal Code. In Athens, in the Psychiatric Hospital of Athens and the Dromokaiteion Psychiatric Hospital, and in Thessaloniki in the Unit for "Not guilty by reason of insanity (NGRI)". The person who is deemed not guilty by reason of insanity following a crime is facing double stigmatisation and marginalisation from both the legal and the health system. He/she is usually treated initially with fear and later since there is no therapeutic aim but only the court instruction for "guardianship", with indifference. The patient who is committed by the courts in a psychiatric unit for being "NGRI" is facing a unique legal and psychiatric status.2 In this respect he/she is disadvantaged when compared to either convicted criminals or psychiatric inpatients. If the patient was not found "NGRI" (ie innocent as far as sentencing is concerned) he would have been punished with loss of liberty for a certain (specific) amount of time, and like all individuals convicted in court he/she would have the right to appeal and reduce his/her sentence in a higher court and maybe released from prison earlier for good behaviour etc. In this respect the individual found to be "NGRI" is disadvantaged when compared to a convicted felon since he/she is kept for an undefined period of time. Additionally, he/she will be allowed to leave the psychiatric unit following a subjective assessment of a judge with no psychiatric knowledge who

  3. Competency to stand trial and defendants who lack insight into their mental illness.

    Science.gov (United States)

    Reisner, Andrew D; Piel, Jennifer; Makey, Miller

    2013-01-01

    Forensic evaluators often assess patients who lack insight into their mental illnesses. This lack of insight can have a significant impact on the defendant's ability to make legal strategy decisions that rely on their acceptance of their mental illness. In this article, the relationship between refusing an insanity plea and competency to stand trial will be explored in the context of defendants who lack insight into their mental illness. The authors argue that an adequate competency assessment should take into account the defendant's ability to consider his available pleas rationally. Such evaluations may have the effect of negating the necessity of a Frendak inquiry in those jurisdictions that can impose the insanity defense on defendants.

  4. PENINGKATAN AKTIFITAS DAN HASIL BELAJAR DENGAN METODE PROBLEM BASIC LEARNING (PBL PADA MATA PELAJARAN TUNE UP MOTOR BENSIN SISWA KELAS XI DI SMK INSAN CENDEKIA TURI SLEMAN TAHUN AJARAN 2015/2016

    Directory of Open Access Journals (Sweden)

    Hermawan Budi Santoso

    2017-06-01

    Full Text Available The aim of this research is to know the increase of learning activityand result using Problem Based Learning in motorbike gasoline Tune-up lesson for students in grade XI SMK Insan Cendekia Sleman. This research is a kind of action research, which in the process applying the PBL method. This research has 4 steps, which are planning, application, observation and reflection. The observation of students activity in applying PBL learning is done by going to the class directly while the learning process is still ongoing. While, the result of student learning is measured by first assessment and final assessment. The result shows that after PBL method which is given to the students there is an increase of learning activity in amount 60%, while the increase of learning result in time of observation is approximately getting 6,5 for average mark First cycle, the average mark is 6,5, while for the second cycle 6,8 and 7,3 for third cycle. These evidences show PBL method application can increase the learning activity and result using Problem Based Learning in motorbike gasoline Tune-up lesson for students in grade XI SMK Insan Cendekia Sleman

  5. Determining criminal responsibility: How relevant are insight and personal attitudes to mock jurors?

    Science.gov (United States)

    Jung, Sandy

    2015-01-01

    High levels of insight are interpreted as indications of a treatment compliance and good outcome by clinical professionals. However, it is unclear whether a defendant's insight plays a role in the decision-making of jurors when determining criminal responsibility. It may be the case that personal biases and attitudes toward the mentally ill and the insanity defense are more relevant in such decisions. This study examines the influence of two core dimensions of insight and personal attitudes on juror decision-making. Participants read trial scenarios describing a defendant who is accused of a violent crime and is diagnosed with schizophrenia. Assigning a verdict of not criminally responsible to the defendant was not influenced by insight, but instead, by supportive attitudes of the insanity defense and higher attributions of blame to external factors and to psychological factors. These findings highlight the need for continued investigation in the area of extra-legal factors that guide legal decision-making when defendants have a mental disorder. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Mental Health Professionals' Attitudes Toward Offenders With Mental Illness (Insanity Acquittees) in Ghana.

    Science.gov (United States)

    Adjorlolo, Samuel; Abdul-Nasiru, Inusah; Chan, Heng Choon Oliver; Bambi, Laryea Efua

    2018-02-01

    Mental health professionals' attitudes toward offenders with mental illness have significant implications for the quality of care and treatment rendered, making it imperative for these professionals to be aware of their attitudes. Yet, this topical issue has received little research attention. Consequently, the present study investigates attitudes toward offenders with mental illness (insanity acquittees) in a sample of 113 registered mental health nurses in Ghana. Using a cross-sectional survey and self-report methodology, the participants respond to measures of attitudes toward offenders with mental illness, attitudes toward mental illness, conviction proneness, and criminal blameworthiness. The results show that mental health nurses who reportedly practiced for a longer duration (6 years and above) were more likely to be unsympathetic, while the male nurses who were aged 30 years and above were more likely to hold offenders with mental illness strictly liable for their offenses. Importantly, the nurses' scores in conviction proneness and criminal blameworthiness significantly predict negative attitudes toward the offenders even after controlling for their attitudes toward mental illness. Yet, when the nurses' conviction proneness and criminal blameworthiness were held constant, their attitudes toward mental illness failed to predict attitudes toward the offenders. This initial finding implies that the nurses' views regarding criminal blameworthiness and conviction may be more influential in understanding their attitudes toward offenders with mental illness relative to their attitudes toward mental illness.

  7. “Dead Souls”: Gogol’s Interpretation of the State of Insanity

    Directory of Open Access Journals (Sweden)

    Olha Chervinska

    2013-12-01

    Full Text Available Actual outline of creating the concept of literary insanity (in the aspect of poetics of dialogue, narrative, motif of duality, etc. is overviewed. The article states that in the fiction by Nicolai Gogol a graduated sequence of various states and degrees of madness is fully represented in “The Collected Petersburg Tales”. Here, this paradigm is considered to be the principle of graduation in all levels of manner as a key suggestive genre construct of “Dead Souls”. The mental isomorphism of the paradigm meaning content, associated with the peculiarities of the religious, as well as the verbal, consciousness is emphasized in the article. The author stresses that the anthropological vector of Gogol's attention is directed towards the ordinary “despicable and stupid in the life”. The ironic example of the discursive metaphor of a pendulum of history (the philosophical background of the text is the slip-in parable of Kif Mokievich and his son Mokii Kifovich. Both characters are at opposite sides of the proper. The world of human relations in “Dead Souls” is reflected in the most straightforward analogies with constant teeming world of different microscopic creatures. To give prominence to the human image Gogol refers to the colourful ontological metaphor, ultimately identifying and equating the person with ordinary fly, which in this text is a significant element of the whole hyper-realistic person-sphere. Conversion of large to small or small to large is the dimensioned game of the author’s strategy in the literal sense. In “Dead Souls” the denoted topic decisively grounds for the genre of the poem.

  8. STRATEGI PENINGKATAN ASET PT BPR SYARIAH HARTA INSAN KARIMAH (HIK CILEDUG

    Directory of Open Access Journals (Sweden)

    Fajri Ryan Isnandar

    2016-01-01

    Full Text Available The objectives of this study were 1 to analyze the conditions of the performance competition on the financial aspect of BPRS HIK Ciledug and the market leader in BPRS industry; 2 to identify the internal and external factors affecting the corporate development and strategic position of BPRS HIK Ciledug based on these factors; and 3 to formulate an accurate alternative strategy and a priority that can be recommended to the company in achieving its goals. Analysis of the evaluation of internal and external factors based on the components contained in the Shari'ah Maqashid and based on the components on The Porter's Five Forces. The analysis of the company's strategic position based on the market growth rate and relative market share on the internal strength was conducted by using BCG matrix (Boston Consulting Group, and the analysis on the alternative strategy formulation was conducted by using IE matrix (Internal-External Matrix, and the QSPM analysis served to determine the priority strategies to increase the assets of BPRS HIK Ciledug. The main weaknesses that should be handled is the lack of scoring systems of financing and the main opportunity is the great number of written requirements for obtaining the financing provided by its competitors. The prioritized strategies of SRB HIK Ciledug include: 1 product development strategy to create innovative products, 2 Market penetration strategy by changing the amount of share returns, 3 Market development strategy by opening new branches, and 4 Backward, forward and horizontal integration strategies by introducing products to various industries.Keywords:  strategies in increasing assets, sharia community financing bank, BPRS Harta Insan Karimah, QSPM

  9. Direitos das pessoas com transtorno mental autoras de delitos The rights of criminally insane individuals

    Directory of Open Access Journals (Sweden)

    Ludmila Cerqueira Correia

    2007-09-01

    Full Text Available O Movimento pela Reforma Psiquiátrica tem subsidiado propostas de reorientação do modelo assistencial hegemônico em saúde mental. Para a assistência às pessoas com transtorno mental autoras de delitos instituiu-se o manicômio judiciário, atualmente denominado Hospital de Custódia e Tratamento Psiquiátrico (HCTP. A manutenção dessa estrutura, reconhecida como instituição total, tem reforçado a exclusão individual, limitando a reinserção social dos internos. Este artigo discute o direito à saúde nos HCTP na perspectiva dos direitos humanos. Os avanços conferidos pela Política Nacional de Saúde Mental não têm contemplado a reorientação da prática assistencial desenvolvida no âmbito do HCTP. Essa instituição tem preservado o seu caráter asilar/segregacionista, evidenciando uma tradição fundada na negação dos direitos humanos. O avanço normativo não consolida, de per si, a materialização das recentes conquistas advindas a partir da Reforma Psiquiátrica, particularmente quanto ao segmento das pessoas com transtorno mental autoras de delitos. O Estado, em co-responsabilidade com a sociedade, deve promover a efetiva reorientação do modelo de atenção à saúde dessas pessoas, cuja responsabilidade penal deverá ser reconhecida ao tempo em que se propicie o tratamento especializado. O respeito aos direitos humanos não implica a inimputabilidade.The Psychiatric Reform Movement has supported proposals to reorient the hegemonic mental health care model. In Brazil, a facility for the criminally insane was created, called the Custody and Psychiatric Treatment Hospital (CPTH. The maintenance of such a structure, known as total institutionalization, has reinforced individual exclusion, limiting the patients' social rehabilitation. This article discusses the right to health in the CPTH from a human rights perspective. The advances achieved in Brazil under the National Mental Health Policy have failed to include

  10. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  11. 'Shrouded in a dark fog': comparison of the diagnosis of pellagra in Venice and general paralysis of the insane in the United Kingdom, 1840-1900.

    Science.gov (United States)

    Priani, Egidio

    2017-06-01

    The debate on the causes and the nature of pellagra in Italy during the nineteenth century resembles and evokes the similar debate on General Paralysis of the Insane (GPI) that was growing at the same time in the United Kingdom. Pellagra and GPI had a massive and virulent impact on the populations of Italy and the UK, respectively, and contributed to a great extent to the increase and overcrowding of the asylum populations in these countries. This article compares the two illnesses by examining the features of their nosographic positioning, aetiology and pathogenesis. It also documents how doctors arrived at the diagnoses of the two diseases and how this affected their treatment.

  12. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  13. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  14. Secular humanism and "scientific psychiatry"

    OpenAIRE

    Szasz, Thomas

    2006-01-01

    Abstract The Council for Secular Humanism identifies Secular Humanism as a "way of thinking and living" committed to rejecting authoritarian beliefs and embracing "individual freedom and responsibility ... and cooperation." The paradigmatic practices of psychiatry are civil commitment and insanity defense, that is, depriving innocent persons of liberty and excusing guilty persons of their crimes: the consequences of both are confinement in institutions ostensibly devoted to the treatment of m...

  15. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  16. K-3 vitamininin sıçan glioma (C6) ve insan glioblastomamultiforme hücre çoğalmasına invitro etkileri

    OpenAIRE

    Öztopçu, Pınar; Kabadere, Selda; Uyar, Ruhi

    2005-01-01

    Amaç: Glioblastoma multiforme beyin dokusu içerisine hızla yayılan ve onu yıkıma ugratan, sinir sisteminde görülme sıklıgı yüksek oldukça tehlikeli bir tümör çesididir. K-3 vitamininin çesitli kanser hücre dizileri üzerinde hücre çogalmasını baskılayıcı etkisi oldugu bildirilmektedir. Çalısmamızda K-3 vitamininin, sıçan glioma (C6) ve insan glioblastoma multiforme hücrelerinin çogalması üzerindeki baskılayıcı etkilerini karsılastırarak belirlemeyi amaçladık. Yöntem: K-3 vitamin...

  17. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  18. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  19. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  20. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  1. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  2. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  3. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  4. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  5. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  6. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  7. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  8. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  9. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  10. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  11. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  12. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  13. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  14. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  15. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  16. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  17. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  18. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  19. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  20. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  1. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  2. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  3. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  4. Ernst Rüdin's Unpublished 1922-1925 Study "Inheritance of Manic-Depressive Insanity": Genetic Research Findings Subordinated to Eugenic Ideology.

    Science.gov (United States)

    Kösters, Gundula; Steinberg, Holger; Kirkby, Kenneth Clifford; Himmerich, Hubertus

    2015-11-01

    In the early 20th century, there were few therapeutic options for mental illness and asylum numbers were rising. This pessimistic outlook favoured the rise of the eugenics movement. Heredity was assumed to be the principal cause of mental illness. Politicians, scientists and clinicians in North America and Europe called for compulsory sterilisation of the mentally ill. Psychiatric genetic research aimed to prove a Mendelian mode of inheritance as a scientific justification for these measures. Ernst Rüdin's seminal 1916 epidemiological study on inheritance of dementia praecox featured large, systematically ascertained samples and statistical analyses. Rüdin's 1922-1925 study on the inheritance of "manic-depressive insanity" was completed in manuscript form, but never published. It failed to prove a pattern of Mendelian inheritance, counter to the tenets of eugenics of which Rüdin was a prominent proponent. It appears he withheld the study from publication, unable to reconcile this contradiction, thus subordinating his carefully derived scientific findings to his ideological preoccupations. Instead, Rüdin continued to promote prevention of assumed hereditary mental illnesses by prohibition of marriage or sterilisation and was influential in the introduction by the National Socialist regime of the 1933 "Law for the Prevention of Hereditarily Diseased Offspring" (Gesetz zur Verhütung erbkranken Nachwuchses).

  5. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  6. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  7. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  8. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  9. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  10. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  11. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  13. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  14. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  15. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  16. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  17. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  18. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  19. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  20. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  1. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  2. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  3. Breivik--the Norwegian terrorist case.

    Science.gov (United States)

    Syse, Aslak

    2014-01-01

    On July 22, 2011, there were two murderous attacks in Norway. Both assaults - the bombing of governmental buildings in Oslo City center and the lethal shooting down of young members of the Labour Party on an island - were planned and accomplished by a lone perpetrator. These episodes give rise to several interesting questions. What happened really, and how could it happen? Was the perpetrator sane or insane? What was the ideological background for the attacks? It is unnecessary to discuss in any detail whether or not these acts should be categorized as terrorism. However, there is good reason to consider what these terror attacks imply for Norwegian society at large. What significance did the attacks have for Norwegian democracy, and did they have any impact on the 2013 parliamentary elections? What will be the future for the offender, both in the short term and in years to come? What will happen to the Norwegian insanity defense? These questions are addressed in this article. Copyright © 2014 John Wiley & Sons, Ltd.

  4. Dissociative identity disorder: Medicolegal challenges.

    Science.gov (United States)

    Farrell, Helen M

    2011-01-01

    Persons with dissociative identity disorder (DID) often present in the criminal justice system rather than the mental health system and perplex experts in both professions. DID is a controversial diagnosis with important medicolegal implications. Defendants have claimed that they committed serious crimes, including rape or murder, while they were in a dissociated state. Asserting that their alter personality committed the bad act, defendants have pleaded not guilty by reason of insanity (NGRI). In such instances, forensic experts are asked to assess the defendant for DID and provide testimony in court. Debate continues over whether DID truly exists, whether expert testimony should be allowed into evidence, and whether it should exculpate defendants for their criminal acts. This article reviews historical and theoretical perspectives on DID, presents cases that illustrate the legal implications and controversies of raising an insanity defense based on multiple personalities, and examines the role of forensic experts asked to comment on DID with the goal of assisting clinicians in the medicolegal assessment of DID in relation to crimes.

  5. Review of psychiatric services to mentally disordered offenders around the Pacific Rim.

    Science.gov (United States)

    Every-Palmer, Susanna; Brink, Johann; Chern, Tor P; Choi, Wing-Kit; Hern-Yee, Jerome Goh; Green, Bob; Heffernan, Ed; Johnson, Sarah B; Kachaeva, Margarita; Shiina, Akihiro; Walker, David; Wu, Kevin; Wang, Xiaoping; Mellsop, Graham

    2014-03-01

    This article was commissioned to collate and review forensic psychiatric services provided in a number of key Pacific Rim locations in the hope that it will assist in future dialogue about service development. The Board of the Pacific Rim College of Psychiatrists identified experts in forensic psychiatry from Australia, Canada, China, Hong Kong, Japan, Russia, Singapore, Taiwan, and the US. Each contributor provided an account of issues in their jurisdiction, including mental health services to mentally disordered offenders in prison, competence or fitness to stand trial, legal insanity as a defense at trial, diminished responsibility, and special forensic services available, including forensic hospitals and community forensic mental health services. Responses have been collated and are presented topic by topic and country by country within the body of this review. The availability of mental health screening and psychiatric in-reach or forensic liaison services within prisons differed considerably between countries, as did provisioning of community forensic mental health and rehabilitation services. Diversion of mentally disordered offenders to forensic, state, or hybrid hospitals was common. Legal constructs of criminal responsibility (insanity defense) and fitness to stand trial ("disability") are almost universally recognized, although variably used. Disparities between unmet needs and resourcing available were common themes. The legislative differences between contributing countries with respect to the mental health law and criminal law relating to mentally disordered offenders are relatively subtle. The major differences lie in operationalizing and resourcing forensic services. Copyright © 2013 Wiley Publishing Asia Pty Ltd.

  6. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  7. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  8. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  9. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  10. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  11. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  12. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  13. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  14. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  15. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  16. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  17. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  18. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  19. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  20. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  1. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  2. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  3. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  4. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  5. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  6. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  7. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  8. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  9. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  10. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  11. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  12. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  13. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  14. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  15. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  16. Combined evaluations of competency to stand trial and mental state at the time of the offense: An overlooked methodological consideration?

    Science.gov (United States)

    Kois, Lauren; Wellbeloved-Stone, James M; Chauhan, Preeti; Warren, Janet I

    2017-06-01

    Combined evaluations of competency to stand trial (CST; competency) and mental state at the time of the offense (MSO; sanity) frequently co-occur. However, most research examines the 2 as discrete constructs without considering 4 potential combined evaluation outcomes: competent-sane, incompetent-sane, competent-insane, and incompetent-insane. External validity can be improved if research more closely mirrored practice. It may be incorrect to assume incompetent defendants are similar across CST-only and combined evaluations, and insane defendants are similar across MSO-only and combined evaluations. Using a sample of 2,751 combined evaluations, we examined demographic, clinical, offense, evaluation, and psycholegal characteristics associated with evaluators' combined evaluation opinions. Multinomial regression analyses revealed older defendants were more likely to be opined incompetent-insane. Defendants with psychotic disorders were more often opined insane, regardless of competency status. Affective diagnoses predicted competent-insane opinions. Developmental disorders were closely related to incompetence, regardless of sanity status. Defendants with organic disorders tended to have global psycholegal impairment, in that they were more often opined incompetent-insane, incompetent-sane, or competent-insane, relative to competent-sane. Prior hospitalization predicted competent-insane relative to competent-sane opinions. Defendants not under the influence of a substance during the offense or with no prior convictions were more likely to be opined insane, regardless of competency status. We interpret these findings in light of psycholegal theory and provide recommendations for research and practice. Collectively, results suggest incorporation of combined evaluations into CST and MSO research is an important methodological consideration not to be overlooked. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  18. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  19. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  20. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  1. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  2. Forensic psychiatry in Singapore.

    Science.gov (United States)

    Chan, Lai Gwen; Tomita, Todd

    2013-12-01

    Singapore is a geographically small nation-state that has transformed itself from a third-world country to a developed nation after attaining political independence 46 years ago. The pace of change has been tremendous and mental health care is no exception. This paper provides an overview of mental health care and a review of key mental health legislation, including a National Mental Health Blueprint that was rolled out in 2007. On this background, the paper focuses on a description of forensic psychiatric services in Singapore. The role of the Department of Forensic Psychiatry at the Institute of Mental Health, which is the only forensic psychiatry department in the country, will be highlighted. Civil commitment and the treatment of unfit accused persons and insanity acquittees is reviewed. The role of forensic psychiatric assessments in the Singapore courts is examined. The application of the insanity and diminished responsibility defenses are reviewed. A trend is identified in the Singapore courts towards a more rehabilitation-focused sentencing approach and the role that forensic psychiatric assessments play in cases involving mentally disordered offenders is highlighted. Copyright © 2013 Wiley Publishing Asia Pty Ltd.

  3. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  4. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  5. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  6. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  7. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  8. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  9. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  10. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  11. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  12. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  13. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  14. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  15. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  16. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  17. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  18. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  19. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  20. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  1. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  2. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  3. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  4. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  5. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  6. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  7. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  8. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  9. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  10. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  11. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  12. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  13. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  14. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  15. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  16. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  17. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  18. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  19. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  20. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  1. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  2. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  3. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  4. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  5. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  6. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  7. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  8. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  9. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  10. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  11. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  12. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  13. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  14. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  15. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  16. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  17. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  18. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  19. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  20. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  1. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  2. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  3. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  4. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  5. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  6. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  7. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  8. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  9. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  10. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  11. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  12. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  13. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  14. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  15. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  16. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  17. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  18. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  19. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  20. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  1. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  2. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  3. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  4. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  5. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  6. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  7. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  8. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  9. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  10. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  11. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  12. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  13. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  14. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  15. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  16. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  17. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  18. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  19. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  20. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  1. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  2. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  3. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  4. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  5. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  6. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  7. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  8. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  9. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  10. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  11. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  12. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  13. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  14. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  15. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  16. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  17. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  18. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  19. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  20. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  1. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  2. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  4. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  5. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  6. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  7. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  8. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  9. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  10. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  11. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  12. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  13. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  14. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  15. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  16. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  17. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  18. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  19. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  20. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  1. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  2. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  3. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  4. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  5. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  6. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  7. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  8. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  9. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  10. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  11. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  12. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  13. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  14. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  15. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  16. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  17. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  18. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  19. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  20. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  1. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  2. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  3. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  4. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  5. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  6. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  7. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  8. The effects of rehabilitative voir dire on juror bias and decision making.

    Science.gov (United States)

    Crocker, Caroline B; Kovera, Margaret Bull

    2010-06-01

    During voir dire, judges frequently attempt to "rehabilitate" venirepersons who express an inability to be impartial. Venirepersons who agree to ignore their biases and base their verdict on the evidence and the law are eligible for jury service. In Experiment 1, biased and unbiased mock jurors participated in either a standard or rehabilitative voir dire conducted by a judge and watched a trial video. Rehabilitation influenced insanity defense attitudes and perceptions of the defendant's mental state, and decreased scaled guilt judgments compared to standard questioning. Although rehabilitation is intended to correct for partiality among biased jurors, rehabilitation similarly influenced biased and unbiased jurors. Experiment 2 found that watching rehabilitation did not influence jurors' perceptions of the judge's personal beliefs about the case.

  9. Secular humanism and "scientific psychiatry"

    Directory of Open Access Journals (Sweden)

    Szasz Thomas

    2006-04-01

    Full Text Available Abstract The Council for Secular Humanism identifies Secular Humanism as a "way of thinking and living" committed to rejecting authoritarian beliefs and embracing "individual freedom and responsibility ... and cooperation." The paradigmatic practices of psychiatry are civil commitment and insanity defense, that is, depriving innocent persons of liberty and excusing guilty persons of their crimes: the consequences of both are confinement in institutions ostensibly devoted to the treatment of mental diseases. Black's Law Dictionary states: "Every confinement of the person is an 'imprisonment,' whether it be in a common prison, or in private house, or in the stocks, or even by forcibly detaining one in the public streets." Accordingly, I maintain that Secular Humanism is incompatible with the principles and practices of psychiatry.

  10. Secular humanism and "scientific psychiatry".

    Science.gov (United States)

    Szasz, Thomas

    2006-04-25

    The Council for Secular Humanism identifies Secular Humanism as a "way of thinking and living" committed to rejecting authoritarian beliefs and embracing "individual freedom and responsibility ... and cooperation." The paradigmatic practices of psychiatry are civil commitment and insanity defense, that is, depriving innocent persons of liberty and excusing guilty persons of their crimes: the consequences of both are confinement in institutions ostensibly devoted to the treatment of mental diseases. Black's Law Dictionary states: "Every confinement of the person is an 'imprisonment,' whether it be in a common prison, or in private house, or in the stocks, or even by forcibly detaining one in the public streets." Accordingly, I maintain that Secular Humanism is incompatible with the principles and practices of psychiatry.

  11. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  12. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  13. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  14. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  15. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  16. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    Science.gov (United States)

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  17. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  18. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  19. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  20. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  1. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  2. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  3. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  4. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  5. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  6. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  7. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  8. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  9. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  10. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  11. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  12. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  13. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  14. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  15. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  16. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  17. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  18. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  19. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  20. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  1. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  2. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  3. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  4. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  5. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  6. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  7. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  8. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  9. The role of defensive ecological interactions in the evolution of conotoxins.

    Science.gov (United States)

    Prashanth, J R; Dutertre, S; Jin, A H; Lavergne, V; Hamilton, B; Cardoso, F C; Griffin, J; Venter, D J; Alewood, P F; Lewis, R J

    2016-01-01

    Venoms comprise of complex mixtures of peptides evolved for predation and defensive purposes. Remarkably, some carnivorous cone snails can inject two distinct venoms in response to predatory or defensive stimuli, providing a unique opportunity to study separately how different ecological pressures contribute to toxin diversification. Here, we report the extraordinary defensive strategy of the Rhizoconus subgenus of cone snails. The defensive venom from this worm-hunting subgenus is unusually simple, almost exclusively composed of αD-conotoxins instead of the ubiquitous αA-conotoxins found in the more complex defensive venom of mollusc- and fish-hunting cone snails. A similarly compartmentalized venom gland as those observed in the other dietary groups facilitates the deployment of this defensive venom. Transcriptomic analysis of a Conus vexillum venom gland revealed the αD-conotoxins as the major transcripts, with lower amounts of 15 known and four new conotoxin superfamilies also detected with likely roles in prey capture. Our phylogenetic and molecular evolution analysis of the αD-conotoxins from five subgenera of cone snails suggests they evolved episodically as part of a defensive strategy in the Rhizoconus subgenus. Thus, our results demonstrate an important role for defence in the evolution of conotoxins. © 2015 John Wiley & Sons Ltd.

  10. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  11. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  12. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  13. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  14. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  15. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  16. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  17. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  18. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  19. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  20. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  1. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  2. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  3. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  4. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  5. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  6. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  7. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News

  8. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  9. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  10. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  11. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  12. Message framing and defensive processing: a cultural examination.

    Science.gov (United States)

    Ko, Deborah M; Kim, Heejung S

    2010-01-01

    Past research has shown that health messages on safer sexual practices that focus on relational consequences are more persuasive than messages that focus on personal consequences. However, we theorize that it is defensiveness against personal risk framing that threatens the self among people from more individualistic cultures. Two studies tested this idea. Study 1 showed that European Americans were less persuaded by personal framing than by relational framing but that this pattern was not found for Asian Americans, who are more collectivistic. Study 2 showed that these defensive patterns were eliminated among European American participants when a person's self-image was affirmed. These results suggest defensive processes as the mechanism behind the differences in message framing effectiveness and motivate a closer look at cultural patterns.

  13. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  14. CXCR1 regulates pulmonary anti-Pseudomonas host defense

    Science.gov (United States)

    Carevic, M.; Öz, H.; Fuchs, K.; Laval, J.; Schroth, C.; Frey, N.; Hector, A.; Bilich, T.; Haug, M.; Schmidt, A.; Autenrieth, S. E.; Bucher, K.; Beer-Hammer, S.; Gaggar, A.; Kneilling, M.; Benarafa, C.; Gao, J.; Murphy, P.; Schwarz, S.; Moepps, B.; Hartl, D.

    2016-01-01

    Pseudomonas aeruginosa is a key opportunistic pathogen causing disease in cystic fibrosis (CF) and other lung diseases such as chronic obstructive pulmonary disease (COPD). However, the pulmonary host defense mechanisms regulating anti-Pseudomonas aeruginosa immunity remain incompletely understood. Here we demonstrate, by studying an airway Pseudomonas aeruginosa infection model, in vivo bioluminescence imaging, neutrophil effector responses and human airway samples, that the chemokine receptor CXCR1 regulates pulmonary host defense against Pseudomonas aeruginosa. Mechanistically, CXCR1 regulated anti-Pseudomonas neutrophil responses through modulation of reactive oxygen species and interference with toll-like receptor 5 expression. These studies define CXCR1 as a novel non-canonical chemokine receptor that regulates pulmonary anti-Pseudomonas host defense with broad implications for CF, COPD and other infectious lung diseases. PMID:26950764

  15. Study of General health, resiliency, and defense mechanisms in patients with migraine headache

    Directory of Open Access Journals (Sweden)

    Alireza Aghayusefi

    2013-06-01

    Full Text Available Background: Migraine is a neurological disease that the etiology, several factors affect its onset or its exacerbation. One of the factors affecting disease is psychological factors such as defense mechanisms, resiliency, and general health. This study assessed the relationship between general health, resiliency, and general defense mechanisms, and also predicts the general health of people with migraine headaches that have a high resiliency and use mature defense mechanisms. Material and Methods: 50 women with migraine headache in the city of Bushehr using defense mechanisms, resiliency, and general health questionnaires were studied. For statistical analysis, Pearson correlation and multiple regression tests were used by SPSS 17 software. Results: The results showed that most of the defense mechanisms of migraine sufferers are Immature and Neuroticism. There is significant negative correlation between the deterioration of general health and resiliency as well as the mature defense mechanism (p=0/003, and also there is a significant positive correlation between this deterioration with neuroticism (p=0/040 and immature defense mechanisms (p=0/041. On the other hand there is significant negative correlation between resiliencies with immature (p=0/009 and neuroticism defense mechanisms (p=0/04, and also with mature defense mechanism has a significant positive correlation (p=0/003. Also, as more people use the mature defense mechanism, their deterioration of general health will be reduced, but this relationship will be stronger with the presence of resiliency. So migraine people use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health. Conclusion: This study showed that migraine patients use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health.

  16. Defense AT&L (Volume 37, Number 1, January-February 2008)

    Science.gov (United States)

    2008-02-01

    Senate, he serves as the senior advisor to the secretary of defense on testing Department of Defense weapon systems, and prescribing policies and...including several commands. As general, his final assign- ment was the senior air defense advisor to the chief of staff of the Army. His awards...by going to <www. usajobs.gov>. For more details, see the USA Staffing Ap- plication Manager’s online help at <http://eshelp.opm. gov/ robo /projects

  17. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  18. Light-dependent expression of flg22-induced defense genes in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Satoshi eSano

    2014-10-01

    Full Text Available Chloroplasts have been reported to generate retrograde immune signals that activate defense gene expression in the nucleus. However, the roles of light and photosynthesis in plant immunity remain largely elusive. In this study, we evaluated the effects of light on the expression of defense genes induced by flg22, a peptide derived from bacterial flagellins which acts as a potent elicitor in plants. Whole-transcriptome analysis of flg22-treated Arabidopsis thaliana seedlings under light and dark conditions for 30 min revealed that a number of (30% genes strongly induced by flg22 (>4.0 require light for their rapid expression, whereas flg22-repressed genes include a significant number of genes that are down-regulated by light. Furthermore, light is responsible for the flg22-induced accumulation of salicylic acid, indicating that light is indispensable for basal defense responses in plants. To elucidate the role of photosynthesis in defense, we further examined flg22-induced defense gene expression in the presence of specific inhibitors of photosynthetic electron transport: 3-(3,4-dichlorophenyl-1,1-dimethylurea (DCMU and 2,5-dibromo-3-methyl-6-isopropyl-benzoquinone (DBMIB. Light-dependent expression of defense genes was largely suppressed by DBMIB, but only partially suppressed by DCMU. These findings suggest that photosynthetic electron flow plays a role in controling the light-dependent expression of flg22-inducible defense genes.

  19. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  20. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  1. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  2. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  3. Vaginal orgasm is associated with less use of immature psychological defense mechanisms.

    Science.gov (United States)

    Brody, Stuart; Costa, Rui Miguel

    2008-05-01

    Freud implied a link between inability to have a vaginal orgasm and psychosexual immaturity. Since Kinsey, many sexologists have asserted that no such link exists. However, empirical testing of the issue has been lacking. The objective was to determine the relationship between different sexual behavior triggers of female orgasm and use of immature psychological defense mechanisms. Women reported their past month frequency of different sexual behaviors and corresponding orgasm rates and completed the Defense Style Questionnaire (DSQ-40). The association between ability to have vaginal intercourse orgasm (versus clitoral orgasm) and the use of DSQ-40 immature psychological defense mechanisms (associated with various psychopathologies) was examined. In a sample of 94 healthy Portuguese women, vaginal orgasm (triggered solely by penile-vaginal intercourse) was associated with less use of DSQ-40 immature defenses. Vaginal orgasm was associated with less somatization, dissociation, displacement, autistic fantasy, devaluation, and isolation of affect. Orgasm from clitoral stimulation or combined clitoral-intercourse stimulation was not associated with less use of immature defenses, and was associated with more use of some immature defenses. In one regression analysis, more masturbation and less vaginal orgasm consistency made independent contributions to the statistical prediction of immature defenses. In another regression analysis, any use of extrinsic clitoral stimulation for intercourse orgasm, and lack of any vaginal orgasm, made independent contributions to the statistical prediction of immature defenses. Vaginally anorgasmic women had immature defenses scores comparable to those of established (depression, social anxiety disorder, panic disorder, and obsessive-compulsive disorder) outpatient psychiatric groups. Results were not confounded by social desirability responding or relationship quality. The results linking penile-vaginal orgasm with less use of immature

  4. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  5. 48 CFR 225.7016 - Restriction on Ballistic Missile Defense research, development, test, and evaluation.

    Science.gov (United States)

    2010-10-01

    ... Missile Defense research, development, test, and evaluation. 225.7016 Section 225.7016 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS... Acquisition 225.7016 Restriction on Ballistic Missile Defense research, development, test, and evaluation. [68...

  6. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  7. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    information accurately and in conformance with Generally Accepted Accounting Principles , to comply with Congressional requirements of the Chief Financial ...2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting

  8. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    2000-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials

  9. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  10. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  11. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  12. 76 FR 45543 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of Visitors, Defense Language Institute Foreign Language Center meeting scheduled for August 3 and 4, 2011...

  13. Distinct roles of jasmonates and aldehydes in plant-defense responses.

    Directory of Open Access Journals (Sweden)

    E Wassim Chehab

    Full Text Available BACKGROUND: Many inducible plant-defense responses are activated by jasmonates (JAs, C(6-aldehydes, and their corresponding derivatives, produced by the two main competing branches of the oxylipin pathway, the allene oxide synthase (AOS and hydroperoxide lyase (HPL branches, respectively. In addition to competition for substrates, these branch-pathway-derived metabolites have substantial overlap in regulation of gene expression. Past experiments to define the role of C(6-aldehydes in plant defense responses were biased towards the exogenous application of the synthetic metabolites or the use of genetic manipulation of HPL expression levels in plant genotypes with intact ability to produce the competing AOS-derived metabolites. To uncouple the roles of the C(6-aldehydes and jasmonates in mediating direct and indirect plant-defense responses, we generated Arabidopsis genotypes lacking either one or both of these metabolites. These genotypes were subsequently challenged with a phloem-feeding insect (aphids: Myzus persicae, an insect herbivore (leafminers: Liriomyza trifolii, and two different necrotrophic fungal pathogens (Botrytis cinerea and Alternaria brassicicola. We also characterized the volatiles emitted by these plants upon aphid infestation or mechanical wounding and identified hexenyl acetate as the predominant compound in these volatile blends. Subsequently, we examined the signaling role of this compound in attracting the parasitoid wasp (Aphidius colemani, a natural enemy of aphids. PRINCIPAL FINDINGS: This study conclusively establishes that jasmonates and C(6-aldehydes play distinct roles in plant defense responses. The jasmonates are indispensable metabolites in mediating the activation of direct plant-defense responses, whereas the C(6-aldehyes are not. On the other hand, hexenyl acetate, an acetylated C(6-aldehyde, is the predominant wound-inducible volatile signal that mediates indirect defense responses by directing tritrophic

  14. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior

  15. Adversity Quotient and Defense Mechanism of Secondary School Students

    Science.gov (United States)

    Nikam, Vibhawari B.; Uplane, Megha M.

    2013-01-01

    The present study was conducted to explore the relationship between Adversity Quotient (AQ) and Defense Mechanism (DM) of secondary school students. The aim of the study was to ascertain relationship between Adversity Quotient and Defense mechanism i. e. Turning against object (TAO), Projection (PRO), Turning against self (TAS), Principalisation…

  16. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  17. Peptidoglycan from Fermentation By-Product Triggers Defense Responses in Grapevine

    Science.gov (United States)

    Chen, Yang; Takeda, Taito; Aoki, Yoshinao; Fujita, Keiko; Suzuki, Shunji; Igarashi, Daisuke

    2014-01-01

    Plants are constantly under attack from a variety of microorganisms, and rely on a series of complex detection and response systems to protect themselves from infection. Here, we found that a by-product of glutamate fermentation triggered defense responses in grapevine, increasing the expression of defense response genes in cultured cells, foliar chitinase activity, and resistance to infection by downy mildew in leaf explants. To identify the molecule that triggered this innate immunity, we fractionated and purified candidates extracted from Corynebacterium glutamicum, a bacterium used in the production of amino acids by fermentation. Using hydrolysis by lysozyme, a silkworm larva plasma detection system, and gel filtration analysis, we identified peptidoglycan as inducing the defense responses. Peptidoglycans of Escherichia coli, Bacillus subtilis, and Staphylococcus aureus also generated similar defensive responses. PMID:25427192

  18. Early Family Relationships Predict Children’s Emotion Regulation and Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Jallu Lindblom

    2016-12-01

    Full Text Available Early family relationships have been suggested to influence the development of children’s affect regulation, involving both emotion regulation and defense mechanisms. However, we lack research on the specific family predictors for these two forms of affect regulation, which have been conceptualized to differ in their functions and accessibility to consciousness. Accordingly, we examine how the (a quality and (b timing of family relationships during infancy predict child’s later emotion regulation and defense mechanisms. Parents (N = 703 reported autonomy and intimacy in marital and parenting relationships at the child’s ages of 2 and 12 months, and the child’s use of emotion regulation and immature and neurotic defenses at 7 to 8 years. As hypothesized, the results showed that functional early family relationships predicted children’s efficient emotion regulation, whereas dysfunctional relationships predicted reliance on defense mechanisms in middle childhood. Further, results showed a timing effect for neurotic defenses, partially confirming our hypothesis of early infancy being an especially important period for the development of defense mechanisms. The findings are discussed from the viewpoints of attachment and family dynamics, emotional self-awareness, and sense of security.

  19. SOSYAL MEDYA, İLETİŞİM HAKKI VE İFADE ÖZGÜRLÜĞÜ ÜZERİNE BİR DEĞERLENDİRME

    OpenAIRE

    ŞEN, A. Fulya; ŞEN, Y. Furkan

    2015-01-01

    İletişim, gerekli ve önemli bir insan ihtiyacı olmasının yanı sıra temel bir insan hakkını temsil etmektedir. İletişim hakkı kavramı ise iletişimi bir hak olarak tanımlamakta, ifade özgürlüğü ve çoğulcu demokrasiye gönderme yapmaktadır. İletişim hakkının tanınması insan hakları standartlarının iyileştirilmesi için zorunludur. İletişim hakkı farklı görüşlerin ve anlamların paylaşılmasını sağlamaktadır. Bu çalışmada, insan hakları kavramı içinde iletişim hakkının önemi ele alınacak ve iletişim ...

  20. 76 FR 39076 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-05

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 3 and 4, 2011. Time of Meeting...

  1. 75 FR 43496 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 10 and 11, 2010. Time of Meeting...

  2. 77 FR 62223 - Board of Visitors Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2012-10-12

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: October 31, 2012 and November 1, 2012...

  3. Multiple Identified Neurons and Peripheral Nerves Innervating the Prothoracic Defense Glands in Stick Insects Reveal Evolutionary Conserved and Novel Elements of a Chemical Defense System

    Directory of Open Access Journals (Sweden)

    Johannes Strauß

    2017-11-01

    Full Text Available The defense glands in the dorsal prothorax are an important autapomorphic trait of stick insects (Phasmatodea. Here, we study the functional anatomy and neuronal innervation of the defense glands in Anisomorpha paromalus (Westwood, 1859 (Pseudophasmatinae, a species which sprays its defense secretions when disturbed or attacked. We use a neuroanatomical approach to identify the nerves innervating the gland muscles and the motoneurons with axons in the different nerves. The defense gland is innervated by nerves originating from two segments, the subesophageal ganglion (SOG, and the prothoracic ganglion. Axonal tracing confirms the gland innervation via the anterior subesophageal nerve, and two intersegmental nerves, the posterior subesophageal nerve, and the anterior prothoracic nerve. Axonal tracing of individual nerves reveals eight identified neuron types in the subesophageal or prothoracic ganglion. The strongest innervating nerve of the gland is the anterior subesophageal nerve, which also supplies dorsal longitudinal thorax muscles (neck muscles by separate nerve branches. Tracing of individual nerve branches reveals different sets of motoneurons innervating the defense gland (one ipsilateral and one contralateral subesophageal neuron or the neck muscle (ventral median neurons. The ipsilateral and contralateral subesophageal neurons have no homologs in related taxa like locusts and crickets, and thus evolved within stick insects with the differentiation of the defense glands. The overall innervation pattern suggests that the longitudinal gland muscles derived from dorsal longitudinal neck muscles. In sum, the innervating nerves for dorsal longitudinal muscles are conserved in stick insects, while the neuronal control system was specialized with conserved motoneurons for the persisting neck muscles, and evolutionarily novel subesophageal and prothoracic motoneurons innervating the defense gland.

  4. Mises’s Defense of Liberty: A Critique

    Directory of Open Access Journals (Sweden)

    Sean Parr

    2010-11-01

    Full Text Available What this paper attempts to demonstrate is that, in his treatise Liberalism, Mises’s defense of liberty is incomplete because his reasoning in favor of liberty for all is–not of a moral, but–exclusively of an economic kind. Without a moral justification, Mises’s defense–once the aim of productivity has been abandoned–is forced to affirm with cold indifference that a society of slaves is no better or worse than one of free men. There exists a more comprehensive defense

  5. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  6. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli

    2012-01-01

    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources...... of Arabidopsis thaliana, coupled with 39 years of field data on aphid abundance, to (i) demonstrate that geographic patterns in a polymorphic defense locus (GS-ELONG) are strongly correlated with changes in the relative abundance of two specialist aphids; and (ii) demonstrate differential selection by the two...... aphids on GS-ELONG, using a multigeneration selection experiment. We thereby show a causal link between variation in abundance of the two specialist aphids and the geographic pattern at GS-ELONG, which highlights the potency of natural enemies as selective forces....

  7. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  8. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  9. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  10. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  11. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  12. 76 FR 21705 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-04-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... that closed meetings of the Department of Defense Wage Committee will be held on Tuesday, May 3, 2011... detailed wage data to be considered were obtained from officials of private establishments with a guarantee...

  13. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  14. INSTITUTIONAL BASIS OF MANAGEMENT AND EVALUATION OF UKRAINIAN DEFENSE LANDS

    Directory of Open Access Journals (Sweden)

    Garazhа Y.P

    2017-02-01

    Full Text Available The management and evaluation of defense land was revealed in the article. Specific institution is the military institutе in the institutional framework for defense land. A special regime and zoning, evaluation, payment and exclusion conditions were established for these lands. The market economy has changed the land-property relations in the country. Lands for defense used only in the framework that established the state. Recently there was a tendency of land release this subcategory. This has led to their misuse, belonging to other owners. The research problem consists of the setting clear boundaries of defense land and legal regulation mechanisms of land relations. Public ownership rights applies only to the defense lands. They are located only in the state ownership. The subject is the state that implements ownership (right to possess, use and dispose of the lands of Defense. It ensures the defense of the country and territory for military sites, airfields, parts, ammunition depots. Functional use of defense land is divided into public (military schools, socio-cultural (health centers, recreation centers, industrial (military and industrial objects, residential (cantonment, commercial (commissary, special (military installations, transport ( carpark, bridges, engineering (antennas, radars, storage (defense deport. The land for military unit were given for permanent use with the justification of the project design documentation sizes. The military part of the land for permanent use with the justification sizes by the project design documentation. Safety, security and other areas are created around military and other defense installations. There are restricted areas, prohibited areas. They have a special regime. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real estate. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real

  15. 75 FR 47797 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-08-09

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of... be held on September 13 & 14, 2010 from 8 a.m. to 5 p.m. at the Defense Language Institute Foreign...

  16. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  17. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  18. Insane anti-Membranes?

    International Nuclear Information System (INIS)

    Giecold, Gregory; Orsi, Francesco; Puhm, Andrea

    2014-01-01

    The backreactions of anti-branes on a variety of supergravity backgrounds have been shown in a recent series of papers to be riled by some unexplained flux singularities. All of the situations studied so far involve backgrounds with (close to) AdS-asymptotics. It is the purpose of this work to study the backreaction of anti-M2 branes on a background exhibiting a different UV behavior: the so-called A 8 regular solution of eleven-dimensional supergravity that we consider has “Taub-NUT type' asymptotics. As it turns out, some subleading infrared singularities are inevitable; they cannot be naturally ascribed to the anti-branes backreacting on this background. Moreover, our configuration does not involve smeared branes. This lends further credence to the work of Bena et al. http://dx.doi.org/10.1007/JHEP09(2013)142 suggesting that the singularities encountered are in no way remnants of smearing that would wash away once brane polarization is taken into account

  19. [An insane dialogue].

    Science.gov (United States)

    Boer, Max; Brignole, Éric

    2015-01-01

    How should madness and in particular delusional manifestations be considered? The caregiver's perception of delirium has an impact on how they view the function of the caregiver in psychiatry. Should delirium be suppressed? Delirium is an individual phenomenon but the themes are linked to social issues. Must we not take into account everyone's "thresholds" with regard to the place of delirium, in order to make it part of "living together". Two patients of a psychiatric care system discuss these issues. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  20. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  1. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  2. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  3. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  4. Jasmonate is essential for insect defense in Arabidopsis.

    Science.gov (United States)

    McConn, M; Creelman, R A; Bell, E; Mullet, J E; Browse, J

    1997-05-13

    The signaling pathways that allow plants to mount defenses against chewing insects are known to be complex. To investigate the role of jasmonate in wound signaling in Arabidopsis and to test whether parallel or redundant pathways exist for insect defense, we have studied a mutant (fad3-2 fad7-2 fad8) that is deficient in the jasmonate precursor linolenic acid. Mutant plants contained negligible levels of jasmonate and showed extremely high mortality ( approximately 80%) from attack by larvae of a common saprophagous fungal gnat, Bradysia impatiens (Diptera: Sciaridae), even though neighboring wild-type plants were largely unaffected. Application of exogenous methyl jasmonate substantially protected the mutant plants and reduced mortality to approximately 12%. These experiments precisely define the role of jasmonate as being essential for the induction of biologically effective defense in this plant-insect interaction. The transcripts of three wound-responsive genes were shown not to be induced by wounding of mutant plants but the same transcripts could be induced by application of methyl jasmonate. By contrast, measurements of transcript levels for a gene encoding glutathione S-transferase demonstrated that wound induction of this gene is independent of jasmonate synthesis. These results indicate that the mutant will be a good genetic model for testing the practical effectiveness of candidate defense genes.

  5. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  6. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  7. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  8. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  9. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  10. How to optimize joint theater ballistic missile defense

    OpenAIRE

    Diehl, Douglas D.

    2004-01-01

    Approved for public release, distribution is unlimited Many potential adversaries seek, or already have theater ballistic missiles capable of threatening targets of interest to the United States. The U.S. Missile Defense Agency and armed forces are developing and fielding missile interceptors carried by many different platforms, including ships, aircraft, and ground units. Given some exigent threat, the U.S. must decide where to position defensive platforms and how they should engage poten...

  11. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  12. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  13. Incapacity of the Mind Secondary to Medication Misuse as a Not Criminally Responsible Defense.

    Science.gov (United States)

    Prat, Sebastien S; Losier, Bruno J; Moulden, Heather M; Chaimowitz, Gary A

    2017-01-01

    The manifestations of disorders of the mind may play a role in the occurrence of criminal behavior. In the majority of the cases, the presence of a psychiatric disorder is cited as the reason that an individual was not fully aware of his behavior. However, other conditions, such as seizure disorders or hypoglycemia, have also been linked to an inability to understand the nature and consequences of one's actions. On occasion, these situations can be explained by a state of automatism that may be described as insane or noninsane. In this article, we describe the case of a 77-year-old man, suffering from Parkinson's disease, where the issue of criminal responsibility associated with incapacity of the mind secondary to medication misuse was raised. We elaborate on the thinking behind this opinion and the implications according to Canadian law. Although the legal outcome of this case is specific to our jurisdiction, the clinical implication may be common to any patient suffering from a similar condition and may inform physicians, families, and lawyers. © 2016 American Academy of Forensic Sciences.

  14. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  15. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    pronounced at intermediate environmental conditions. Optimizing single traits generally leads to a more pronounced response of the defense traits, which implies that studying single traits leads to an overestimation of their response to predation. Behavioral defense and morphological defense compensate......Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  16. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  17. [Epistemic and historical elucidation of the borderline personality disorder].

    Science.gov (United States)

    Londoño Paredes, Diego Enrique

    2015-01-01

    The particularities of those that have been considered "hard cases" in the clinical field, and their relationship with personality disorders, are discussed together with their quintessential conceptual and diagnostic model: the borderline personalities. The aim of the study is to historically and epistemologically rebuild their origins within psychiatry and psychoanalysis. From a classical epistemological and historical study, a brief tour is made through the nineteenth century alienism and the postulate of "partial insanity". Next, a passage is spawned through the concepts that emerged from this postulate: "monomania" and "moral insanity", up to mid-century Kraepelin and the "fundamental states" of manic-depressive insanity as pathological constitutional forms or characters, and reaching the twentieth century with characterology and psychopathic personalities. Finally, psychoanalysis is analyzed as the main source of borderline personality disorders arising from the problems encountered in analytical treatments and the development of the notion of "character neurosis". Borderline personality disorders are the result of the conjunction of a number of factors, heirs of the notion of "partial insanity", of the fundamental states of manic-depression insanity, of characterology, of the idea of constitutions and pathological personalities, together with the emerging concerns of psychoanalysis in the early twentieth century. Copyright © 2014 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  18. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  19. 75 FR 54524 - Defense Federal Acquisition Regulation Supplement; Acquisition Strategies To Ensure Competition...

    Science.gov (United States)

    2010-09-08

    ...., because the changes are to internal Government organization and operating procedures only. The rule... 48 CFR Part 207 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations... Life Cycle of Major Defense Acquisition Programs (DFARS Case 2009-D014) AGENCY: Defense Acquisition...

  20. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  2. Nevada test site defense waste acceptance criteria, certification, and transfer requirements

    International Nuclear Information System (INIS)

    1988-10-01

    The Nevada Test Site (NTS) Defense Waste Acceptance Criteria, Certification and Transfer Requirements establishes procedures and criteria for safe transfer, disposal, and storage of defense transuranic, low-level, and mixed waste at the NTS. Included are an overview of the NTS defense waste management program; the NTS waste acceptance criteria for transuranic, low-level, and mixed wastes; waste certification requirements and guidance; application to submit waste; and requirements for waste transfer and receipt. 5 figs., 16 tabs

  3. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  4. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  5. Colors and Some Morphological Traits as Defensive Mechanisms in Anurans

    Directory of Open Access Journals (Sweden)

    Luís Felipe Toledo

    2009-01-01

    Full Text Available Anurans may be brightly colored or completely cryptic. Generally, in the former situation, we are dealing with aposematism, and the latter is an example of camouflage. However, these are only simple views of what such colorations really mean and which defensive strategy is implied. For instance, a brightly colored frog may be part of a mimicry ring, which could be either Batesian, Müllerian, or Browerian. These are only examples of the diversity of color-usage systems as defensive strategies. Unfortunately, reports on the use of colors as defensive mechanisms are widespread in the available literature, and the possible functions are rarely mentioned. Therefore, we reviewed the literature and added new data to this subject. Then, we the use of colors (as defensive mechanism into categories. Mimicry was divided into the subcategories camouflage, homotypy, and nondeceitful homotypy, and these groups were also subcategorized. Dissuasive coloration was divided into behavioral display of colors, polymorphism, and polyphenism. Aposematism was treated apart, but aposematic colorations may be present in other defensive strategies. Finally, we propose functions and forms of evolution for some color systems in post-metamorphic anurans and hope that this review can be the basis for future research, even on other animal groups.

  6. The Contextual Nature of Psychiatric Diagnosis

    Science.gov (United States)

    Rosenhan, David L.

    1975-01-01

    Psychiatric diagnoses are powerfully influenced by the contexts in which patients are found and the expectations of diagnosticians. The observations of Millon, Spitzer, and Weiner on Rosenhan's "On Being Sane in Insane Places" (AA 521 951) were examined for the implications they held for the meanings of sanity and insanity. (Editor/RK)

  7. Reducing Defensive Responses to Thoughts of Death: Meditation, Mindfulness, and Buddhism.

    Science.gov (United States)

    Park, Young Chin; Pyszczynski, Tom

    2017-08-24

    Three studies investigated the effects of meditation on responses to reminders of death. Study 1 took a quasi-experimental approach, comparing defensive responses to mortality salience (MS) of South Korean participants with varying levels of experience with Buddhism and meditation. Whereas non-Buddhists without meditation showed the typical increase in worldview defense after mortality salience (MS), this effect was not found among non-Buddhists immediately after an initial meditation experience, nor among lay Buddhists who meditated regularly or Buddhist monks with intensive meditation experience. Study 2, a fully randomized experiment, showed that MS increased worldview defense among South Koreans at a meditation training who were assessed before meditating but not among participants assessed after their first meditation experience. Study 3 showed that whereas American students without prior meditation experience showed increased worldview defense and suppression of death-related thoughts after MS, these effects were eliminated immediately after an initial meditation experience. Death thought accessibility mediated the effect of MS on worldview defense without meditation, but meditation eliminated this mediation. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  8. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  9. Copper Contamination Impairs Herbivore Initiation of Seaweed Inducible Defenses and Decreases Their Effectiveness.

    Directory of Open Access Journals (Sweden)

    Alexandria M Warneke

    Full Text Available Seaweed-herbivore interactions are often mediated by environmental conditions, yet the roles of emerging anthropogenic stressors on these interactions are poorly understood. For example, chemical contaminants have unknown consequences on seaweed inducible resistance and herbivore response to these defenses despite known deleterious effects of contaminants on animal inducible defenses. Here, we investigated the effect of copper contamination on the interactions between a snail herbivore and a brown seaweed that displays inducible resistance to grazing. We examined seaweed inducible resistance and its effectiveness for organisms exposed to copper at two time points, either during induction or after herbivores had already induced seaweed defenses. Under ambient conditions, non-grazed tissues were more palatable than grazed tissues. However, copper additions negated the preference for non-grazed tissues regardless of the timing of copper exposure, suggesting that copper decreased both how herbivores initiated these inducible defenses and their subsequent effectiveness. Copper decreased stimulation of defenses, at least in part, by suppressing snail grazing pressure-the cue that turns inducible defenses on. Copper decreased effectiveness of defenses by preventing snails from preferentially consuming non-grazed seaweed. Thus, contaminants can potentially stress communities by changing seaweed-herbivore interactions mediated via inducible defenses. Given the ubiquity of seaweed inducible resistance and their potential influence on herbivores, we hypothesize that copper contamination may change the impact of these resistant traits on herbivores.

  10. Evaluating Work-Life Balance in the Department of Defense

    Science.gov (United States)

    2011-04-18

    Evaluating Work - Life Balance in the Department of Defense Erin A. Moeser Defense Equal Opportunity Management Institute (DEOMI) Kizzy M. Parks...for service members’ family lives may increase satisfaction with work - life balance . Examples of family-friendly organizational policies include...1,500 active duty military personnel were surveyed on the value of work / life balance initiates. More specifically, this study assessed respondents

  11. Outsourcing of Defense Supply Center, Columbus, Bus and Taxi Service Operations

    National Research Council Canada - National Science Library

    Granetto, Paul

    1999-01-01

    Introduction. We performed the audit in response to allegations to the Defense Hotline that the Defense Supply Center, Columbus, outsourcing study for bus and taxi service operations was based on incorrect methodology...

  12. 77 FR 52700 - Reestablishment of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-08-30

    ...), the Department of Defense gives notice that it is reestablishing the charter for the Board of Visitors... advice and recommendations on the overall management and governance of the National Defense University in...

  13. Review of the Book “Defense Mechanisms. Coping Strategies. Self-Regulation”

    Directory of Open Access Journals (Sweden)

    Stoil Mavrodiev

    2012-10-01

    Full Text Available This book deals with coping strategies and defense mechanisms as two kinds of self-regulation of human behaviour. The defense mechanisms are described with some examples of fiction books.

  14. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  15. Genome Defense Mechanisms in Neurospora and Associated Specialized Proteins

    Directory of Open Access Journals (Sweden)

    Ranjan Tamuli

    2010-06-01

    Full Text Available Neurospora crassa, the filamentous fungus possesses widest array of genome defense mechanisms known to any eukaryotic organism, including a process called repeat-induced point mutation (RIP. RIP is a genome defense mechanism that hypermutates repetitive DNA sequences; analogous to genomic imprinting in mammals. As an impact of RIP, Neurospora possesses many fewer genes in multigene families than expected. A DNA methyltransferase homologue, RID was shown to be essential for RIP. Recently, a variant catalytic subunit of translesion DNA polymerase zeta (Pol zeta has been found to be essential for dominant RIP suppressor phenotype. Meiotic silencing and quelling are two other genome defense mechanisms in Neurospora, and proteins required for these two processes have been identified through genetic screens.

  16. Mental incapacity defenses at the War Crimes Tribunal: questions and controversy.

    Science.gov (United States)

    Sparr, Landy F

    2005-01-01

    Following a report from the Secretary General in May 1993, the United Nations Security Council adopted Resolution 827 and its Statute establishing an International War Crimes Tribunal for the Former Yugoslavia (ICTY) located in The Hague, The Netherlands. Although such action has been discussed in the past, this is the first time the international community has established a tribunal to indict and try individuals for war crimes. The crimes had been previously "created" by multilateral international treaties. The ICTY Rules of Procedure and Evidence allowed for "any special defense, including that of diminished or lack of mental responsibility." Precise legal parameters of the defense were not specified. In 1998, a defendant at the ICTY "Celebici" Trial named Esad Landzo raised the defense of diminished mental responsibility. The Celebici Trial Chamber thus became the first legal body to consider reduced mental capacity as it applies to international criminal law. This article is an examination of the application of the affirmative defense of diminished responsibility at the ICTY and relates the process to the need for further definition of mental incapacity defenses at the newly established International Criminal Court (ICC). At the ICC preparatory commission, drafting material elements of crimes was emphasized, with less consideration given to mental elements. That diminished capacity and diminished-responsibility defenses have often confused scholars and practitioners alike is explored in this article with suggestions for further directions.

  17. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... and what emerging science and technology would have the greatest intelligence potential in this type... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Counter... Defense (DoD). ACTION: Notice of advisory committee meetings. SUMMARY: The Defense Science Board Task...

  18. 76 FR 18193 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2011-04-01

    ... out his responsibility to conduct the business of the Uniformed Services University of the Health... shall be appointed from civilian life by the Secretary of Defense; b. The Secretary of Defense, or his...

  19. Central importance of immunoglobulin A in host defense against Giardia spp.

    Science.gov (United States)

    Langford, T Dianne; Housley, Michael P; Boes, Marianne; Chen, Jianzhu; Kagnoff, Martin F; Gillin, Frances D; Eckmann, Lars

    2002-01-01

    The protozoan pathogen Giardia is an important cause of parasitic diarrheal disease worldwide. It colonizes the lumen of the small intestine, suggesting that effective host defenses must act luminally. Immunoglobulin A (IgA) antibodies are presumed to be important for controlling Giardia infection, but direct evidence for this function is lacking. B-cell-independent effector mechanisms also exist and may be equally important for antigiardial host defense. To determine the importance of the immunoglobulin isotypes that are transported into the intestinal lumen, IgA and IgM, for antigiardial host defense, we infected gene-targeted mice lacking IgA-expressing B-cells, IgM-secreting B-cells, or all B-cells as controls with Giardia muris or Giardia lamblia GS/M-83-H7. We found that IgA-deficient mice could not eradicate either G. muris or G. lamblia infection, demonstrating that IgA is required for their clearance. Furthermore, although neither B-cell-deficient nor IgA-deficient mice could clear G. muris infections, IgA-deficient mice controlled infection significantly better than B-cell-deficient mice, suggesting the existence of B-cell-dependent but IgA-independent antigiardial defenses. In contrast, mice deficient for secreted IgM antibodies cleared G. muris infection normally, indicating that they have no unique functions in antigiardial host defense. These data, together with the finding that B-cell-deficient mice have some, albeit limited, residual capacity to control G. muris infection, show that IgA-dependent host defenses are central for eradicating Giardia spp. Moreover, B-cell-dependent but IgA-independent and B-cell-independent antigiardial host defenses exist but are less important for controlling infection.

  20. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  1. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  2. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  3. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  4. Spatiotemporal heterogeneity of tomato induced defense responses affects spider mite performance and behavior.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Kant, Merijn R

    2017-10-03

    When feeding from tomato (Solanum lycopersicum), the generalist spider mite Tetranychus urticae induces jasmonate (JA)- and salicylate (SA)-regulated defense responses that hamper its performance. The related T. evansi, a Solanaceae-specialist, suppresses these defenses, thereby upholding a high performance. On a shared leaf, T. urticae can be facilitated by T. evansi, likely via suppression of defenses by the latter. Yet, when infesting the same plant, T. evansi outcompetes T. urticae. Recently, we found that T. evansi intensifies suppression of defenses locally, i.e., at its feeding site, after T. urticae mites were introduced onto adjacent leaf tissue. This hyper-suppression is paralleled by an increased oviposition rate of T. evansi, probably promoting its competitive population growth. Here we present additional data that not only provide insight into the spatiotemporal dynamics of defense induction and suppression by mites, but that also suggest T. evansi to manipulate more than JA and SA defenses alone.

  5. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  6. VAROLUŞ FELSEFELERİ, VAROLUŞÇU TERAPİ VE SOSYAL HİZMET

    Directory of Open Access Journals (Sweden)

    Gizem ÇELİK

    2017-07-01

    Full Text Available Öz Varoluş felsefeleri, insanı ve insan yaşamını açıklamaya çalışan felsefi akımları temel alarak; ancak onlardan farklılaşan önemli nitelikleri ile günümüz insanının sorunlarına yönelen ve tek bir tanımlamayla anılması mümkün olmayan, kimilerine göre bir felsefe yapma tarzını kimilerine göre ise bir felsefi iklimi ifade etmektedir. En yalın ifadeyle, insanı nesne gibi ele alan ve yorumlayan yaklaşımlara tepki olarak, insanın biricik ve otantik oluşu özelliği ile tanımlanması gereken bir varoluş olduğunu belirten varoluşçu görüş, pek çok insanî soruyu ele alıp işleyerek “öz-varoluş ilişkisi”, “varlığın ve hayatın anlamı”, “özgür iradenin insan davranışlarındaki rolü”, “sınırsız özgürlük ve sorumluluk”, “varoluşsal anksiyete” gibi pek çok konuda açıklamalarda bulunmaktadır. Bu çalışmada, varoluş felsefelerine ve temel niteliklerine ilişkin genel bilgilere, artan ve karmaşıklaşan insan sorunlarının çözümünde önemli açıklamalar getirmesi dolayısıyla terapide yer bulan varoluşçu analizin özelliklerine ve odağı insan, insan sorun ve ihtiyaçları olan sosyal hizmet disiplin ve mesleğinin varoluş felsefeleri ile olan ilişkisine yer verilmektedir. Abstract Without a single definition, philosophies of existence sometimes described as the “way of making philosophy” or sometimes “climate of philosophy”. It basically arose from philosophical trends which are trying to explain human and life but differentiates from them by focusing on the problems of the modern man. By the simplest terms, existential philosophy states that human being must be defined as unique and authentic existent and it has born as a reaction to the approach that takes human beings as objects. Existential philosophy takes and examines many humanitarian questions such as "self-existence relationship”, “meaning of life and the existence”, “the role of

  7. Strategy alternatives for homeland air and cruise missile defense.

    Science.gov (United States)

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  8. Defenses to malpractice: what every emergency physician should know.

    Science.gov (United States)

    Hudson, Michael Jason; Moore, Gregory P

    2011-12-01

    Emergency medicine is a high-risk specialty that carries a constant risk of malpractice litigation. Fear of malpractice litigation can lead to less-than-optimal patient care as well as impairments in physician quality of life. Although malpractice fear can be ubiquitous among emergency physicians, most receive little to no education on malpractice. Medical malpractice requires that 1) The physician had a duty, 2) The physician breached the duty, 3) There was harm to the patient, and 4) The harm was caused by the physician's breach of duty. Even if all four medical malpractice conditions are met, there are still special legal defenses that have been and can be used in court to exonerate the physician. These defenses include assumption of the risk, Good Samaritan, contributory negligence, comparative fault, sudden emergency, respectable minority, two schools of thought, and clinical innovation. These legal defenses are illustrated and explained using defining precedent cases as well as hypothetical examples that are directly applicable to emergency medical practice. Knowledge of these special legal defenses can help emergency physicians minimize their risk of litigation when caring for patients. Published by Elsevier Inc.

  9. Integration of long-range planning for management of defense transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; McFadden, M.H.; Raudenbush, M.H.; Smith, L.J.

    1984-01-01

    As described in The Defense Waste Management Plan, the defense TRU program goal is to achieve permanent disposal and to end interim storage. TRU waste is currently stored at six Department of Energy (DOE) sites, and new waste is generated at several more sites. The Waste Isolation Pilot Plant (WIPP) project is well defined, and it has been necessary to integrate the activities of other parts of the TRU program in support of DOE Headquarters policy and the WIPP schedules and technical requirements. The strategy is described in the Defense Transuranic Waste Program Strategy Document. More detailed, quantitative plans have been developed through the use of several system models, with a Long-Range Master Plan for Defense Transuranic Waste Management as the focal point for coordination of proposed plans with all the parties involved

  10. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  11. A Comparative Assessment of Knowledge Management Leadership Approaches within the Department of Defense

    Science.gov (United States)

    2007-03-01

    A COMPARATIVE ASSESSMENT OF KNOWLEDGE MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE... MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE THESIS Presented to the Faculty Department of Systems and Engineering...KNOWLEDGE MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE Tommy V. S. Marshall II, BS Captain, USAF Approved

  12. The levels of psychological functioning of personality and the mechanisms of defense

    OpenAIRE

    Benítez Camacho, Erika; Chávez-León, Enrique; Ontiveros Uribe, Martha Patricia; Yunes Jiménez, Arlette; Náfate López, Omar

    2010-01-01

    Otto Kernberg states three types of personality organizations, also named psychological functional levels. They reflect the patient's predominant psychological characteristics: identity integration grade, defense mechanisms, and reality test. In mental disorders, the predominant defensive influences significantly in the severity and evolution of the suffering. Objectives The objective of the actual study was to determine the usage of defense mechanisms by patients with some mental disorder, g...

  13. The creation of psychopharmacology

    National Research Council Canada - National Science Library

    Healy, David, MRC Psych

    2002-01-01

    ... the meaning Of being numerous. George Oppen IntroductionIntroduction This book is about drugs, insanity, and society and about how changes in the relationship between them cause changes in the ways we experience our selves. Insanity has always been a source or expression of disorder in society and individuals. Drugs have played a more ambiguou...

  14. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  15. Using the Defensive Style Questionnaire to evaluate the impact of sex reassignment surgery on defensive mechanisms in transsexual patients Aplicação do Defensive Style Questionnaire para avaliar o impacto da cirurgia de redesignação sexual nos mecanismos de defesa de pacientes transexuais

    Directory of Open Access Journals (Sweden)

    Maria Inês Lobato

    2009-12-01

    Full Text Available Objective: To evaluate the impact of sex reassignment surgery on the defense mechanisms of 32 transsexual patients at two different points in time using the Defensive Style Questionnaire. Method: The Defensive Style Questionnaire was applied to 32 patients upon their admission to the Gender Identity Disorder Program, and 12 months after they had undergone sex reassignment surgery. Results: There were changes in two defense mechanisms: anticipation and idealization. However, no significant differences were observed in terms of the mature, neurotic and immature categories. Discussion: One possible explanation for this result is the fact that the procedure does not resolve gender dysphoria, which is a core symptom in such patients. Another aspect is related to the early onset of the gender identity disorder, which determines a more regressive defensive structure in these patients. Conclusion: Sex reassignment surgery did not improve the defensive profile as measured by the Defensive Style Questionnaire.Objetivo: Avaliar o efeito da cirurgia de redesignação sexual nos mecanismos de defesa de 32 pacientes transexuais em dois momentos do estudo usando o Defensive Style Questionnaire. Método: O Defensive Style Questionnaire foi aplicado a 32 pacientes quando ingressaram no Programa de Transtorno de Identidade de Gênero e 12 meses após a cirurgia de redesignação sexual. Resultados: Houve modificações em dois mecanismos de defesa: antecipação e idealização; porém, sem mudanças significativas nos fatores maduro, neurótico e imaturo. Discussão: Uma possibilidade para esse resultado é o fato de a intervenção cirúrgica não resolver a disforia de gênero (principal sintoma desses pacientes. Outro aspecto está relacionado com o fato de o transtorno de identidade de gênero ser instalado precocemente, o que determina uma estrutura defensiva mais regressiva para esses pacientes. Conclusão: A cirurgia de redesignação sexual não foi

  16. Implementing Set Based Design into Department of Defense Acquisition

    Science.gov (United States)

    2016-12-01

    The team employed a tailored waterfall process model in order to explore SBD applications in the support of defense acquisition and PORs. Figure 1...Engineering Model . Additionally, the team reviewed DOD case studies that implemented SBD. The SBD principles, along with the common themes from the...acquisition. 14. SUBJECT TERMS set based design, set based thinking, model based systems engineering, concurrent engineering, defense acquisition

  17. Contribution to the improvement of management in defense logistics

    OpenAIRE

    LJUBOJEVIC SRDJAN D.; ANDREJIC MARKO D.; DRAGOVIC NEBOJSA K.

    2013-01-01

    Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with inter...

  18. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  19. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  20. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  1. Induction of phenolics, lignin and key defense enzymes in eggplant ...

    African Journals Online (AJOL)

    Elicitors are capable of mimicking the perception of a pathogen by a plant, thereby triggering induction of a sophisticated defense response in plants. In this study, we investigated an induced resistance in eggplant in respect to cell wall strengthening and defense enzyme activation affected by four elicitors such as, chitosan ...

  2. U.S. Department of Energy defense waste management program implementation plan

    International Nuclear Information System (INIS)

    Jordan, E.A.

    1988-01-01

    The Program Implementation Plan describes the Department of Energy's current approach to managing its defense high-level, low-level, and transuranic radioactive waste. It documents implementation of the policies described in the 1983 Defense Waste Management Plan

  3. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  4. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  5. Psychological masochism: A systematic review of the literature on conflicts, defenses, and motives.

    Science.gov (United States)

    Békés, Vera; Perry, J Christopher; Robertson, Brian M

    2018-05-01

    Our aim was to conduct a systematic review of the literature on psychological masochism to identify hypotheses for examination in clinical studies. We identified defenses, conflicts, and motives using standardized measures in 23 psychoanalytic papers. Three primary and three secondary subtypes of masochism emerged in the literature. Overall Gratification Inhibition (subtype I.1) was the "healthiest" form, associated with higher developmental level motives and neurotic defenses. The Global Conflict (I.2) was the least healthy form of masochism, consistent with personality disorder. It was associated with early developmental level motives and immature defenses, including depressive defenses, often associated with depression. Dominant Other (I.3) represented masochistic attachment problems, associated with early developmental level motives, object-related, image-distorting defenses, and narcissism. Of the secondary types, Separation-Abandonment (II.1) reflected object-related defenses, and separation-related motives. Rejection of Others (II.2) represented a sadistic-narcissistic form, associated with image-distorting and disavowal defenses, with both early and later developmental level motives. Finally, Sexual Pleasure vs. Guilt (II.3) was associated with autistic fantasy, and both early and later developmental level motives, suggesting a distinct traumatic origin and representing the juncture of sexual and psychological masochism. Analysts described six distinguishable types of masochism. Future studies should examine their validity.

  6. Health transformation project and defensive medicine practice among neurosurgeons in Turkey.

    Science.gov (United States)

    Solaroglu, Ihsan; Izci, Yusuf; Yeter, H Gokce; Metin, M Mert; Keles, G Evren

    2014-01-01

    The term "Defensive" medicine was coined in the early 1970's and has been an important topic of scientific investigation and professional debate ever since. The aim of this study was to investigate the characteristics of defensive medicine, its reasons, and the extent to which it is practiced in the Turkish health care system. This is the first national survey to study the practice of defensive medicine among neurosurgeons in Turkey. The present cross-sectional study on defensive medicine assessed neurosurgeons registered at the Turkish Neurosurgical Society, who are actively working in various centers and hospitals within the Turkish health care system. A 40-question survey was adapted from existing measures described in the literature and was completed by a total of 404 neurosurgeons, representing 36.7% of the neurosurgeons registered at the Turkish Neurosurgical Society. Seventy-two percent of the participants in the current study reported practicing defensive medicine. This practice was mainly reported among inexperienced neurosurgeons (74.4%). Most were younger than 40 years of age (75.2%), working in state hospitals/universities (72.7%), and living in the Marmara region (38%). Respondents reported engaging in defensive medicine by avoiding high-risk surgery (62.6%), ordering additional imaging studies (60.9%) and laboratory tests (33.7%), and referring patients to consultants (31.2%). Most participants consider every patient as a potential threat in terms of a medical lawsuit (68.3%) and do not believe the courts can distinguish malpractice from complications (89.6%). Concerns and perceptions about medical liability lead neurosurgeons to practice defensive medicine. By avoiding high-risk surgery, ordering unnecessary diagnostic tests, and referring the patients to consultants, neurosurgeons try to minimize the risk of malpractice and protect themselves from legal risks, resulting in higher healthcare expenditure and longer treatment periods.

  7. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  8. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  9. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  10. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  11. Evaluation of health and safety impacts of defense high-level waste in geologic repositories

    International Nuclear Information System (INIS)

    Smith, E.D.; Kocher, D.C.; Witherspoon, J.P.

    1985-02-01

    Pursuant to the requirement of the Nuclear Waste Policy Act of 1982 that the President evaluate the use of commercial high-level waste repositories for the disposal of defense high-level wastes, a comparative assessment has been performed of the potential health and safety impacts of disposal of defense wastes in commercial or defense-only repositories. Simplified models were used to make quantitative estimates of both long- and short-term health and safety impacts of several options for defense high-level waste disposal. The results indicate that potential health and safety impacts are not likely to vary significantly among the different disposal options for defense wastes. Estimated long-term health and safety impacts from all defense-waste disposal options are somewhat less than those from commercial waste disposal, while short-term health and safety impacts appear to be insensitive to the differences between defense and commercial wastes. In all cases, potential health and safety impacts are small because of the need to meet stringent standards promulgated by the US Environmental Protection Agency and the US Nuclear Regulatory Commission. We conclude that health and safety impacts should not be a significant factor in the choice of a disposal option for defense high-level wastes. 20 references, 14 tables

  12. Endogenous egg immune defenses in the yellow mealworm beetle (Tenebrio molitor).

    Science.gov (United States)

    Jacobs, Chris G C; Gallagher, Joe D; Evison, Sophie E F; Heckel, David G; Vilcinskas, Andreas; Vogel, Heiko

    2017-05-01

    In order to survive microbe encounters, insects rely on both physical barriers as well as local and systemic immune responses. Most research focusses on adult or larval defenses however, whereas insect eggs are also in need of protection. Lately, the defense of eggs against microbes has received an increasing amount of attention, be it through endogenous egg defenses, trans-generational immune priming (TGIP) or parental investment. Here we studied the endogenous immune response in eggs and adults of Tenebrio molitor. We show that many immune genes are induced in both adults and eggs. Furthermore, we show that eggs reach comparable levels of immune gene expression as adults. These findings show that the eggs of Tenebrio are capable of an impressive endogenous immune response, and indicate that such inducible egg defenses are likely common in insects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. I--N-ov-ember

    Indian Academy of Sciences (India)

    One of the top-security banks in Monte Carlo· (for security reasons the name of the bank is withheld!), has just lost the combination of their biggest safe. (An overzealous clerk has ... Fether, where anybody, doctor or patient, can be either sane or insane, effectively sane people always tell the truth and insane people always.

  14. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  15. Cost and price auditing: effectiveness in the procurement of defense services in Spain

    Directory of Open Access Journals (Sweden)

    José Aguado Romero

    Full Text Available Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

  16. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  17. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  18. 76 FR 43674 - Renewal of Department of Defense Federal Advisory Committee

    Science.gov (United States)

    2011-07-21

    ... Defense (Comptroller)/Chief Financial Officer shall select the Committee's Chairperson from the membership... Financial Officer, independent advice and recommendations on DoD financial management, to include financial... with relevant laws and regulations. The Under Secretary of Defense (Comptroller)/Chief Financial...

  19. 78 FR 63462 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-10-24

    ... Relating to Organizational Conflict of Interest-Major Defense Acquisition Program; OMB Control Number 0704...] Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Organizational Conflict... submit comments, identified by OMB Control Number 0704-0477, using any of the following methods: [cir...

  20. The National Research Council study: "Making sense of ballistic missile defense"

    Science.gov (United States)

    Wilkening, Dean A.

    2014-05-01

    This chapter explains and summarizes the main findings of a recent National Research Council study entitled Making Sense of Ballistic Missile Defense: An Assessment of Concepts and Systems for U.S. Boost-Phase Missile Defense in Comparison to Other Alternatives.