WorldWideScience

Sample records for internal defense afid

  1. [Economic impact of AFId management with modern management system in Intensive Care patients: comparison between ICUs].

    Science.gov (United States)

    Fuoco, Giovanni; Di Giulio, Paola

    2016-01-01

    . Economic impact of AFId management with modern management systems in Intensive Care patients: comparison between ICUs. Acute fecal incontinence associated with diarrhea (AFId) affects up to 40% of intensive care unit (ICU) patients and may be responsible for pressure ulcers (PU). The FMS (Fecal Management System) though improving the management of these patients is not often provided due to its cost. To measure the costs of the use of FMS compared to routine care in three intensive care units (ICU) of Piedmont (Italy). All patients admitted from January to June 2016, > 18 years with at least three AFId episodes in the previous 24 hours were included. The costs for hygiene, medications and nursing time spent were calculated on 10 patients without FMS, accounting for the mean number of diarrhea attacks (3.04 per day), and mean days of FMS use. The FMS generated savings compared to routine care in nursing time, equipments for hygiene and pressure sores medications in patients with sacral sores. Savings depended on length of use (LoU) of the device: ICU with 10 patients (7 with PUs), mean LoU FMS 11.9 days, savings 1.210 euros; ICU with 10 patients (2 with PUs), mean LoU FMS 17.3 days, savings 5.317 euros; ICU with 45 patients (11 with PUs) mean LoU FMS 9.3 days, cost increase 1.057 euros. The cost of FMS is quickly amortised in patients with PUs. No FMS patients developed a new PUs. The FMS gives rise to savings when used in patients with PUs or for more than 10 days. The savings related to the prevention of PUs should be also added.

  2. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  3. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. UNIPOLAR, BIPOLAR OR MULTIPOLAR INTERNATIONAL SYSTEM? THE DEFENSE INDUSTRY FACTOR

    OpenAIRE

    ÖZKAN, Gökhan

    2008-01-01

    International system can be defined as a complex system of systems that is comprised of economic, political, scientific, technological and military systems. It is hard to analyze this complex system. It is even harder to forecast its future. Nonetheless, there are factors such as the defense industry and military power that affect the dynamics of the international system much more than other factors. After the Revolution in Military Affairs, which transformed the military paradigm, significa...

  5. Ending the Debate: Unconventional Warfare, Foreign Internal Defense, and Why Words Matter

    National Research Council Canada - National Science Library

    Jones, D

    2006-01-01

    There is an ongoing debate within the Special Forces community whether unconventional warfare and foreign internal defense are applicable in the contemporary and future Special Operations environments...

  6. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available . The result is that many countries are not properly prepared, nor adequately protected by legislation, in the event of a cyber attack on a national level. This article will address the international cyber defense collaboration problem by looking at the impact...

  7. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  8. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  9. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  10. International technology exchange in support of the Defense Waste Processing Facility wasteform production

    International Nuclear Information System (INIS)

    Kitchen, B.G.

    1989-01-01

    The nearly completed Defense Waste Processing Facility (DWPF) is a Department of Energy (DOE) facility at the Savannah River Site that is designed to immobilize defense high level radioactive waste (HLW) by vitrification in borosilicate glass and containment in stainless steel canisters suitable for storage in the future DOE HLW repository. The DWPF is expected to start cold operation later this year (1990), and will be the first full scale vitrification facility operating in the United States, and the largest in the world. The DOE has been coordinating technology transfer and exchange on issues relating to HLW treatment and disposal through bi-lateral agreements with several nations. For the nearly fifteen years of the vitrification program at Savannah River Laboratory, over two hundred exchanges have been conducted with a dozen international agencies involving about five-hundred foreign national specialists. These international exchanges have been beneficial to the DOE's waste management efforts through confirmation of the choice of the waste form, enhanced understanding of melter operating phenomena, support for paths forward in political/regulatory arenas, confirmation of costs for waste form compliance programs, and establishing the need for enhancements of melter facility designs. This paper will compare designs and schedules of the international vitrification programs, and will discuss technical areas where the exchanges have provided data that have confirmed and aided US research and development efforts, impacted the design of the DWPF and guided the planning for regulatory interaction and product acceptance

  11. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  12. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  13. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  14. Four years of international counter proliferation training: The U.S. Department of Defense's experience

    International Nuclear Information System (INIS)

    Strauss, H.J.

    2001-01-01

    Full text: Over the last four years, the U.S. Department of Defense has engaged 17 countries in the former Soviet Union, Eastern/Central Europe, and the Baltic states in two counterproliferation initiatives, i.e., the DOD/FBI and the DOD/U.S. Customs Service Counterproliferation Programs. These activities are designed to train and equip border security and law enforcement personnel to prevent, deter, and investigate incidents related to weapons of mass destruction, as well as the trafficking in chemical, nuclear, and biological weapons materials and technologies. Though these programs have begun to produce tangible successes, some recipient countries have failed to demonstrate an earnest commitment to program goals. The U.S. DOD has fielded varied training courses in the region, together with associated WMD detection equipment. In spite of demands by the political leadership in many of the engaged countries, the most successful training has proven to be the more basic rather than the advanced training. Similarly, the real equipment needs prove to be for low rather than high technology. The presentation will explore the systemic, political/military, and geographic factors contributing to this result. The U.S. Department of Defense will continue to engage participating nations in these international counterproliferation programs, and will continue to respond positively to assistance requests based on recipient country needs and honest commitment. Still there remain numerous opportunities for other donor states and international agencies to make positive contributions in the counterproliferation arena. Only with increased donor state commitment - fiscal, programmatic, and personnel - together with full donor state coordination, can international proliferation and trafficking problems be effectively deterred and resolved. (author)

  15. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  16. Prime Contract Awards by Service Category and Federal Supply Classification, Fiscal Years 1973, 1974, 1975, 1976.

    Science.gov (United States)

    1976-11-09

    most of the steel plate for ships is purchased by Defense prime contractors, and only a small portion is obtained by direct DoD purchase (see Code 9515...7.14S 9,0St U29 TRAINING OF GOVT PERSONNEL OTHER THAN U621-UG26 26, h13 4.7,63S 215,165 61,603 ’ TOTAL 86,092 116,316 333,121 145,039 V4...S5 M4AFID TOOLS 2.566 4,696 4,SS6 11,206 S2 EASURING TOOLS 1,46S LS6L 1,S94 16 a3 S3 MARONARE AND ABRASIVES 2 364Y 37,967 4.534 o.26 6 54

  17. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  18. Mental incapacity defenses at the War Crimes Tribunal: questions and controversy.

    Science.gov (United States)

    Sparr, Landy F

    2005-01-01

    Following a report from the Secretary General in May 1993, the United Nations Security Council adopted Resolution 827 and its Statute establishing an International War Crimes Tribunal for the Former Yugoslavia (ICTY) located in The Hague, The Netherlands. Although such action has been discussed in the past, this is the first time the international community has established a tribunal to indict and try individuals for war crimes. The crimes had been previously "created" by multilateral international treaties. The ICTY Rules of Procedure and Evidence allowed for "any special defense, including that of diminished or lack of mental responsibility." Precise legal parameters of the defense were not specified. In 1998, a defendant at the ICTY "Celebici" Trial named Esad Landzo raised the defense of diminished mental responsibility. The Celebici Trial Chamber thus became the first legal body to consider reduced mental capacity as it applies to international criminal law. This article is an examination of the application of the affirmative defense of diminished responsibility at the ICTY and relates the process to the need for further definition of mental incapacity defenses at the newly established International Criminal Court (ICC). At the ICC preparatory commission, drafting material elements of crimes was emphasized, with less consideration given to mental elements. That diminished capacity and diminished-responsibility defenses have often confused scholars and practitioners alike is explored in this article with suggestions for further directions.

  19. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  20. Internal Controls and Compliance With Laws and Regulations for the FY 1996 Financial Statements of the "Other Defense Organizations" Receiving Department 97 Appropriations

    National Research Council Canada - National Science Library

    1997-01-01

    The overall audit objective was to assess internal controls and compliance with laws and regulations and to review and evaluate the adjustments to the FY 1996 "Other Defense Organizations" financial statements...

  1. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  2. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  3. Internal Controls and Compliance With Laws and Regulations for the Defense Finance and Accounting Service Working Capital Fund Financial Statements for FY 1998

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Director, Defense Finance and Accounting Service (DFAS), who is the fund manager of the DFAS Working Capital Fund, is responsible for establishing and maintaining adequate internal controls and for complying with applicable laws and regulations...

  4. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  5. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  6. 75 FR 54524 - Defense Federal Acquisition Regulation Supplement; Acquisition Strategies To Ensure Competition...

    Science.gov (United States)

    2010-09-08

    ...., because the changes are to internal Government organization and operating procedures only. The rule... 48 CFR Part 207 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations... Life Cycle of Major Defense Acquisition Programs (DFARS Case 2009-D014) AGENCY: Defense Acquisition...

  7. 75 FR 43944 - Defense Science Board; Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-07-27

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  8. 75 FR 34438 - Defense Science Board Task Force on Trends and Implications of Climate Change for National and...

    Science.gov (United States)

    2010-06-17

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...

  9. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  10. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  11. Iran the aerial defense facing a preventive attack against the nuclear sites; Iran la defense aerienne face a une attaque preventive contre ses sites nucleaires

    Energy Technology Data Exchange (ETDEWEB)

    Gruselle, B.; Payre, G

    2006-01-15

    In the context of the nuclear uranium enrichment program development facing the international opinion, the author discusses the Iran policy of implementing a defense against an aerial attack. Even with the modernization of its anti-aerial defense, the Iran will cannot support an aerial american campaign, precise and long. (A.L.B.)

  12. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  13. Aegis International and Ballistic Missile Defense: A New Interoperability Network

    Science.gov (United States)

    2011-06-01

    the 1950’s and 1960s ( NIKE Hercules, Sentinel, Safeguard, Site Defense, etc.). The objectives have been pursued by a centralized organization (the...from land. This means greater geographic flexibility, greater survivability and greater scalability in response to an evolving threat. That’s

  14. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  15. Presentation of Accrued Annual Leave in the FY 1996 Defense Agency Financial Statements of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1997-01-01

    .... We also assessed internal controls and compliance with laws and regulations. As part of that objective, we evaluated how the Defense agencies presented the accrued leave account on the FYs 1994,1995, and 1996 Statements of Financial Position...

  16. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  17. Psychometric properties of the defense style questionnaire (DSQ-40) in adolescents.

    Science.gov (United States)

    Ruuttu, Titta; Pelkonen, Mirjami; Holi, Matti; Karlsson, Linnea; Kiviruusu, Olli; Heilä, Hannele; Tuisku, Virpi; Tuulio-Henriksson, Annamari; Marttunen, Mauri

    2006-02-01

    This study examined the psychometric properties of the Defense Style Questionnaire (DSQ-40) in adolescents. Internal consistency, factor structure, and discriminant and concurrent validity of the DSQ-40 were studied in 211 adolescent psychiatric outpatients aged 13 to 19 years and 199 age-matched and sex-matched controls. Principal components analysis yielded four internally consistent components: mature, neurotic, image-distorting, and immature defense styles. The outpatients reported more immature, image-distorting, and neurotic styles and less mature style than did the controls, suggesting adequate discriminant validity. As a demonstration of convergent and concurrent validity, the severity of psychiatric symptoms assessed by the General Health Questionnaire and psychosocial adjustment assessed by the Global Assessment of Functioning Scale correlated theoretically meaningfully with the different defense styles. The DSQ-40 appears to be a reliable and valid instrument for adolescents.

  18. Evaluation of the Transfer of International Traffic in Arms Regulations-Controlled Missile Defense Technology to the National Aeronautics and Space Administration (NASA)

    Science.gov (United States)

    2015-07-13

    120.19) occurs. He said even where an export does occur, in many cases transfers between U.S. Government agencies are exempted under ITAR 126.4 from...services is not an export under the ITAR and, to the extent it is, that any exemptions to license requirements are properly applied. Importantly, the...National Defense Authorization Act for Fiscal Year 2015,” we conducted an evaluation of the transfer of specific International Traffic in Arms

  19. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  20. Iran the aerial defense facing a preventive attack against the nuclear sites

    International Nuclear Information System (INIS)

    Gruselle, B.; Payre, G.

    2006-01-01

    In the context of the nuclear uranium enrichment program development facing the international opinion, the author discusses the Iran policy of implementing a defense against an aerial attack. Even with the modernization of its anti-aerial defense, the Iran will cannot support an aerial american campaign, precise and long. (A.L.B.)

  1. Offices of Industrial Security International: A Review

    National Research Council Canada - National Science Library

    Sands, W

    1998-01-01

    The Defense Security Service (DSS), formerly the Defense Investigative Service (DIS), handles many of its overseas industrial security issues through its Offices of Industrial Security International...

  2. The Impact of Globalization on the U.S. Defense Industry

    Science.gov (United States)

    2013-04-01

    the prism of international trade, White House staff have argued that the impact of increased job exportation, offshoring ( Mankiw referred to it as...muddles over outsourcing. The Journal of Economic Perspectives, 18(4), 93–114. Defense Science Board. (1999). Final report of the Defense Science Board on...and economic merging of geographically dispersed groups of people across geopolitical lines. • Globalization as a concept has existed for

  3. Anticipatory Self-Defense in the Cyber Context

    NARCIS (Netherlands)

    Gill, T.D.; Ducheine, P.A.L.

    2013-01-01

    This article will examine the question of whether the right of self-defense under contemporary international law permits a State to react to an imminent or potential armed attack carried out by digital means in two circumstances. First, as an attack occurring in conjunction with, or as an adjunct

  4. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  5. International Dynamics of U.S. National Defense Acquisition and Budgetary Policy

    Science.gov (United States)

    2012-04-30

    2010, Winter). Russian defense industry: Feet of clay . Security Index, 1(90), 31–46. Kan, S. (2002). CRS report for Congress—Taiwan: Major U.S...military (pp. 1–44). Carlisle, PA: U.S. Army Strategic Studies Institute. Le Roy, F. (2002, May). Mirages over the Andes: Peru , France, the United States

  6. The journal of medical chemical, biological and radiological defense, an update

    International Nuclear Information System (INIS)

    Price, B. B. S.; Peitersen, L.E.

    2009-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense (www.JMedCBR.org) is a peer-reviewed scientific online journal focusing on the biology, chemistry, physiology, toxicology and treatment of exposure to threat agents. JMedCBR provides a central international forum for the publication of current research and development information on medical chemical, biological and radiological defense, as well as training, doctrine, and problems related to chemical, biological and radiological casualties. JMedCBR is sponsored by the US Defense Threat Reduction Agency (DTRA) Chem-Bio Technologies Directorate as part of its scientific outreach program in chemical and biological defense solutions for the Department of Defense. In addition to scientific and medical research, JMedCBR hosts an archive of related papers from authors in the field. Although organized into annual issues, articles are published on the web continuously. The complete JMedCBR is published electronically and is made available to the scientific community free of charge. JMedCBR is committed to providing its readers with quality scientific information and critical analyses. All submissions are peer-reviewed by an editorial board of recognized and respected international scientists who represent expertise in different aspects of medical chemical, biological and radiological defense. Contributions to JMedCBR must be original works of the author(s) and must not have been previously published or simultaneously submitted to other publications. The author(s) transfer the copyright of articles published in JMedCBR to the journal. A copyright transfer form must accompany each manuscript submission. For more information on submitting to JMedCBR, see the Authors' Guide, available at http://www.jmedcbr.org/authorGuide.html.(author)

  7. Cost and price auditing: effectiveness in the procurement of defense services in Spain

    Directory of Open Access Journals (Sweden)

    José Aguado Romero

    Full Text Available Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

  8. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  9. In Defense of International Investment Law

    NARCIS (Netherlands)

    Schill, S.W.; Bungenberg, M.; Herrmann, C.; Krajewski, M.; Terhechte, J.P.

    2016-01-01

    The present article responds to the critical perspective Kate Miles offers on international investment law in her article “Investor-State Dispute Settlement: Conflict, Convergence, and Future Directions”, published in this Yearbook. While sharing several concerns Miles identifies, and supporting

  10. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  11. U.S. National Defense Acquisition and Budgetary Policy in an International Perspective

    Science.gov (United States)

    2011-12-03

    arsenal. London, UK: Sphere. (Original work published 1981). Kalinina, N., & Kozyulin, V. (2010, Winter). Russian defense industry: Feet of clay ...Mirages over the Andes: Peru , France, the United States, and military jet procurement in the 1960s. The Pacific Historical Review, 71(2), 269–300

  12. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  13. Defense response in Nopal Cladodes infiltrated with Salmonella Typhimurium

    Science.gov (United States)

    Foodborne outbreaks associated with fresh produce have increased in recent years. Pre-harvest contamination of fresh produce via irrigation water, soil, or other animal vectors may be responsible for many of these outbreaks. We evaluated defense response of nopal plants when contaminated in intern...

  14. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  15. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  16. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  17. A direct comparison of the defense mechanisms of nondepressed people and depressed psychiatric inpatients.

    Science.gov (United States)

    Margo, G M; Greenberg, R P; Fisher, S; Dewan, M

    1993-01-01

    This report presents a direct comparison of defensive styles (as measured by the Defense Mechanisms Inventory [DMI]) in a sample of depressed psychiatric inpatients and samples of nondepressed male and female normative groups. Consistent with the "depressive realism" literature, nondepressed men and women were more likely than their depressed counterparts to bias their perceptions in an overly cheerful, optimistic direction. Counternormative sex differences were also found. Depressed men were more likely to use internalizing defenses and depressed women were more likely to use externalizing defenses than their respective nondepressed comparison groups. Overall, as has been speculated, there was a relationship within depressed subjects between depression severity and the amount of negatively biased self-perception.

  18. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  19. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  20. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  1. The Society's Involvement in the Defense of Human Rights

    Science.gov (United States)

    Gerjuoy, Edward

    2015-04-01

    The history of the Society's involvement in the defense of human rights, a history of which the Society can be proud, will be summarized; the summary will include illustrative specific APS human rights defense actions in illustrative specific cases. As will be emphasized, the aforesaid involvement has been primarily through the activities of the APS Committee on International Freedom of Scientists (CIFS). It is noteworthy-and one of the reasons the Society can be proud-that CIFS is charged with ``monitoring concerns regarding human rights for scientists,'' not solely for physicists, and that CIFS indeed has sought to protect the human rights of nonphysicists.

  2. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  3. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  4. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  5. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  6. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  7. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  8. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  9. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna

    2016-01-01

    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  10. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  11. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  12. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  13. Multicellular oxidant defense in unicellular organisms.

    OpenAIRE

    Ma, M; Eaton, J W

    1992-01-01

    Although catalase is thought to be a major defense against hydrogen peroxide (H2O2), the catalase activity within individual Escherichia coli fails to protect against exogenous H2O2. Contrary to earlier reports, we find that dilute suspensions of wild-type and catalase-deficient E. coli are identical in their sensitivity to H2O2, perhaps because even wild-type, catalase-positive E. coli cannot maintain an internal/external concentration gradient of this highly diffusible oxidant. However, con...

  14. Analisis Teori Offense-Defense Pada Reformasi Kebijakan Pertahanan Jepang Dalam Dinamika Keamanan Di Asia Timur

    Directory of Open Access Journals (Sweden)

    Fadhil Alghifari

    2016-05-01

    Full Text Available This paper will seek to demonstrate how the use of Offense-Defense Theory can best explain the Japan’s new defense reform legislation that enables the country to play a more comprehensive global security role commensurate with its capabilities, resources, national interests, and international responsibilities. Through this offense-defense lens, it will be argued that Japan’s new defense reform legislation is a response to the growing dominance of ‘offensive’ behaviour by the neighbouring countries in East Asia. This paper will then elaborate more about the elements that are used in the offense-defense theory to analyze the ‘offense’ dominance that prompts East Asian states behave aggressively and defensively including Japan. Furthermore, this paper will explain why Japan is currently playing the ‘defensive’ role to counter the growing dominance of ‘offense’ in East Asia through the four variables of offense-defense balance; military doctrine and technology, geographical considerations, social and political order, and diplomatic arrangements. Thus, we will see that Japan holds the key to the offense-defense and security balance in the increasingly hostile environment in East Asia.

  15. International Health Regulations (2005) and the U.S. Department of Defense: building core capacities on a foundation of partnership and trust.

    Science.gov (United States)

    Johns, Matthew C; Blazes, David L

    2010-12-03

    A cornerstone of effective global health surveillance programs is the ability to build systems that identify, track and respond to public health threats in a timely manner. These functions are often difficult and require international cooperation given the rapidity with which diseases cross national borders and spread throughout the global community as a result of travel and migration by both humans and animals. As part of the U.S. Armed Forces Health Surveillance Center (AFHSC), the Department of Defense's (DoD) Global Emerging Infections Surveillance and Response System (AFHSC-GEIS) has developed a global network of surveillance sites over the past decade that engages in a wide spectrum of support activities in collaboration with host country partners. Many of these activities are in direct support of International Health Regulations (IHR[2005]). The network also supports host country military forces around the world, which are equally affected by these threats and are often in a unique position to respond in areas of conflict or during complex emergencies. With IHR(2005) as the guiding framework for action, the AFHSC-GEIS network of international partners and overseas research laboratories continues to develop into a far-reaching system for identifying, analyzing and responding to emerging disease threats.

  16. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  17. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  18. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  19. Who’s in Charge? Defense Policy Formation in Japan

    Science.gov (United States)

    2010-09-01

    Hongo , DPJ shows stress fractures under pressure of leadership, August 8, 2009, http://search.japantimes.co.jp/cgi-bin/nn20090808f1.html (accessed...ballistic shield.” September 1, 2000. Jane’s International Defense Review. http://www4.janes.com/subscribe (accessed August 18, 2010). Hongo , Jun

  20. The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe

    Science.gov (United States)

    2011-03-01

    Long-Term Defense Planning,” Information and Security: An International Journal 23, no. 1 (2009): 62-72; and Nicu Ionel Sava, Western (NATO/PfP...questionable relevance elsewhere in the world.” Huntington advanced his notions of “objective” and “subjective” control explicitly around the...chamber committees for defense: Public Order Committee and National Security Committee. These two discuss the proposals advanced by the government. Then

  1. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  2. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program.

    Science.gov (United States)

    Pusateri, Anthony E; Dubick, Michael A

    2015-08-01

    Data from recent conflicts demonstrate the continuing need for research and development focusing on hemorrhage control, fluid resuscitation, blood products, transfusion, and pathophysiologic responses to traumatic hemorrhage. The US Department of Defense Hemorrhage and Resuscitation Research and Development Program brings together US Department of Defense efforts and is coordinated with efforts of our other federal government, industry, international, and university-based partners. Military medical research has led to advances in both military and civilian trauma care. A sustained effort will be required to continue to advance the care of severely injured trauma patients.

  3. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  4. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  5. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  6. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  7. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  8. Joint Cross-Service Group for Laboratories 1995 Defense Base Realignment and Closure Process

    National Research Council Canada - National Science Library

    Reed, Donald

    1995-01-01

    This report is one in a series of reports that discusses the Joint Cross-Service Group implementation of the internal control plan developed by the 1995 Defense Base Closure and Realignment Steering Group (the Steering Group...

  9. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  10. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  11. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  12. Russian Military Politics and Russia’s 2010 Defense Doctrine

    Science.gov (United States)

    2011-03-01

    63 Jacob W. Kipp 3. Russian Defense Doctrine .............................. 153 Alexander G. Savelyev About...DOCTRINE Alexander G. Savelyev After President Vladimir Putin of Russian Fed- eration (RF) approved the Military Doctrine in April 2000, experts and...from the Pennsylvania State University. ALEXANDER SAVELYEV has been head of the Strategic Studies Department, Center of International Security

  13. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  14. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  15. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  16. Chemical and genetic defenses against disease in insect societies.

    Science.gov (United States)

    Stow, Adam; Beattie, Andrew

    2008-10-01

    The colonies of ants, bees, wasps and termites, the social insects, consist of large numbers of closely related individuals; circumstances ideal for contagious diseases. Antimicrobial assays of these animals have demonstrated a wide variety of chemical defenses against both bacteria and fungi that can be broadly classified as either external antiseptic compounds or internal immune molecules. Reducing the disease risks inherent in colonies of social insects is also achieved by behaviors, such as multiple mating or dispersal, that lower genetic relatedness both within- and among colonies. The interactions between social insects and their pathogens are complex, as illustrated by some ants that require antimicrobial and behavioral defenses against highly specialized fungi, such as those in the genus Cordyceps that attack larvae and adults and species in the genus Escovopsis that attack their food supplies. Studies of these defenses, especially in ants, have revealed remarkably sophisticated immune systems, including peptides induced by, and specific to, individual bacterial strains. The latter may be the result of the recruitment by the ants of antibiotic-producing bacteria but the extent of such three-way interactions remains unknown. There is strong experimental evidence that the evolution of sociality required dramatic increases in antimicrobial defenses and that microbes have been powerful selective agents. The antimicrobial chemicals and the insect-killing fungi may be useful in medicine and agriculture, respectively.

  17. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  18. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  19. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  20. 32 CFR 700.705 - Observance of international law.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Observance of international law. 700.705 Section... Other Commanders Titles and Duties of Commanders § 700.705 Observance of international law. At all times, commanders shall observe, and require their commands to observe, the principles of international law. Where...

  1. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  2. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  3. Afghanistan’s Local War: Building Local Defense Forces

    Science.gov (United States)

    2010-01-01

    Afghanistan’s Local War: Building Local Defense Forces economic and other development conditions. As the Nobel Prize- winning economist Amartya Sen ...strengthen warlords 9 Amartya Sen , Development as Freedom, New York: Anchor Books, 2000, p. 11. Mitigating Risks 77 • weaken central government forces...Taliban Afghanistan, Bonn: Bonn International Center for Conversion, 2002. Sen , Amartya , Development as Freedom, New York: Anchor Books, 2000. Shahrani

  4. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  5. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  6. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  8. Compliance With the Federal Managers' Financial Integrity Act at the Defense Commercial Communications Office

    National Research Council Canada - National Science Library

    Ugone, Mary

    1993-01-01

    ...; Integrity Act of 1982 (FMFIA) at the Defense Commercial Communications Office (DECCO). The FMFIA requires each executive agency to periodically evaluate its system of internal controls and to report annually to the President and the Congress...

  9. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  10. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  11. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  12. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  13. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  14. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  15. 32 CFR 635.15 - Release of law enforcement information furnished by foreign governments or international...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Release of law enforcement information furnished by foreign governments or international organizations. 635.15 Section 635.15 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS LAW ENFORCEMENT REPORTING Release of...

  16. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  17. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  18. Echoes Across the Pond: Understanding EU-US Defense Industrial Relationships

    Science.gov (United States)

    2009-08-05

    Paul, MN: Zenith Press. Hammond, G.T. (1990). Countertrade , offsets and barter in international political economy. New York: St. Martin’s Press...industrial cooperation: Spain’s changing strategies on Arms Importing, in S. Martin (ed.), The Economics of Offsets: defense procurement and countertrade ... countertrade (pp. 357-379). Amsterdam: Harwood Academic Publishers. Udis, B., & Maskus, K.E. (1991). Offsets as industrial policy: Lessons from aerospace

  19. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  20. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  1. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  2. Personality disorders and criminal law: an international perspective.

    Science.gov (United States)

    Sparr, Landy F

    2009-01-01

    At the International War Crimes Tribunal for the Former Yugoslavia (ICTY), a detention camp guard, charged with acts of murder and torture, advanced a plea of diminished responsibility. Defense psychiatrists testified that he had a personality disorder that influenced his ability to control his behavior, but a prosecution expert testified that the guard did not meet Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR) criteria. Thus, the unresolved question of how the law defines a mental disease or defect for purposes of mitigation or excuse was transposed to an international setting. It has been argued in a variety of jurisdictions and national legal systems that exculpatory mental disorders must be serious, and personality disorders should not qualify. In fact, it has been proposed that the volitional aspect of excuse defenses be eliminated, and definitions of mental disease or defect narrowed. Others have argued that such exclusions are too restrictive and arbitrary. This article examines the criminal defense at ICTY and traces its origin in national jurisdictions. Mental incapacity defenses based on personality disorders are more often used in The Netherlands, England, Germany and Belgium, but seldom in Canada and rarely in the United States and Sweden.

  3. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    2000-01-01

    will be selected for the disposal container inner and outer cylinders. The two metal cylinders, in combination with the Emplacement Drift System, drip shield, and natural barrier, will support the design philosophy of defense-in-depth. The use of materials with different properties prevents a single mode failure from breaching the waste package. The inner cylinder and inner cylinder lids will be constructed of stainless steel and the outer cylinder and outer cylinder lids will be a barrier made of high-nickel alloy. The defense HLW disposal container interfaces with the emplacement drift environment and the internal waste by transferring heat from the canisters to the external environment and by protecting the canisters and their contents from damage/degradation by the external environment. The disposal container also interfaces with the canisters by limiting access of moderator and oxidizing agents to the waste. A loaded and sealed disposal container (waste package) interfaces with the Emplacement Drift System's emplacement drift waste package supports upon which the waste packages are placed. The disposal container interfaces with the Canister Transfer System, Waste Emplacement /Retrieval System, Disposal Container Handling System, and Waste Package Remediation System during loading, handling, transfer, emplacement, and retrieval for the disposal container/waste package

  4. Review of the Fiscal Year 2014 (FY14) Defense Environmental International Cooperation (DEIC) Program

    Science.gov (United States)

    2015-05-01

    advanced by the U.S. team, and embraced by the participants, was to retrain approximately 20 percent of the military force to address ecologically ...the lead for the State Partnership Program with Chile . Discussions focused on environmental programs in both countries, as well as working group...sessions to develop collaborative plans for the next three to five years under the U.S.- Chile Defense Consultative Commission (DCC) in the areas of

  5. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  6. Internal Controls and Compliance With Laws and Regulations for the FY 1996 Financial Statements of the "Other Defense Organizations" Receiving Department 97 Appropriations

    National Research Council Canada - National Science Library

    1997-01-01

    .... Our audit of the "Other Defense Organizations" principal financial statements was delayed until January 9, 1997, because of difficulties that the Defense Finance and Accounting Services Indianapolis...

  7. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  8. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  9. 77 FR 39392 - Amendment to the International Traffic in Arms Regulations: Yemen

    Science.gov (United States)

    2012-07-03

    ... International Traffic in Arms Regulations: Yemen AGENCY: Department of State. ACTION: Final rule. SUMMARY: The... toward Yemen. Licenses or other approvals for exports or imports of defense articles and defense services destined for or originating in Yemen will be reviewed, and may be issued, on a case-by-case basis. DATES...

  10. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  11. West European and East Asian Perspectives on Defense, Deterrence and Strategy. Volume 2. Western European Perspectives on Defense, Deterrence and Strategy.

    Science.gov (United States)

    1984-05-16

    3a - vDE Or 4EPORT 13b 󈨋M COvERED :W)AE OF REPOR~ r or ay 5~ COu.N. *Technical :ROM 821201 -o 8451" 1984, May 16"a 238" 0y 5-I o. * 6 Su POLEMETARY...34 International Defense Review, Vol. 12, No. 3 (1979). 82. Geneste, Colonel Marc. ’La Bataille Terrestre Nuc1~aire,5 Strategie, (July-September 1976). 83.t, u...Strategi- gues, Nucl~aires Tactiques, Terrestres Maritimes et Aeriennes,’ Le Figaro, April 21, 1983. 182. Everts, Philip P. ’Reviving Unilateralism

  12. THE DEFENSE IN CHILE FROM 1960 TO 2010: AN ISSUE OF THE MILITARY OR AN ISSUE OF EVERY CHILEAN CITIZEN?

    Directory of Open Access Journals (Sweden)

    JULIO SOTO SILVA

    2018-01-01

    Full Text Available This essay presents a general vision of the national defense trough the last 50 years as well as a study of the National Defense System of Chile. The Decree 181 of 1960 that stated the organization of the system and structure of the National Defense is the starting point, a brief analysis of how it worked until 2010 when it was replaced by the new law of the MOD. The way it worked during the international crisis Chile faced during the 70s and 80s is also discussed. But this study does not stop there, it also tackles the way by which the defense policy evolved from an issue related only to the military, to become an issue of every Chilean citizen, through the widening of the knowledge of defense issues to the civilian and political elites, being the formulation of an explicit Defense Policy the cornerstone of the whole process, by means of the publishing of the three books of the national defense, along with other key public policies in defense issues whereas the contribution of the Defense Community, recognized as such in the Second Book of the Defense, was capital. This community has a representation of all the sectors of the civil society interested in defense issues as well as from the armed forces. This period ends with the law 20.424 “Organic Statute of the Ministry of Defense”, the most important change in defense issues, besides de DFL 181, since the creation of the Ministry of Defense back in 1932.

  13. Government Performance and Results Act Reporting on Defense Working Capital Funds Net Operating Results

    National Research Council Canada - National Science Library

    2001-01-01

    .... The overall objective of the audit was to determine whether the net operating results for the activity groups of the Defense Working Capital Fund were consistently and accurately compiled. We also assessed internal controls to determine whether management complied with the Government Performance and Results Act of 1993.

  14. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  15. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  16. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  17. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  18. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  19. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  20. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  1. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  2. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  3. Reflecting on 20+ Years of “Executive Program in Defense Decision Making” Curriculum

    OpenAIRE

    2017-01-01

    CCMR News Article CCMR hosted a version of its biannual “Executive Program in Defense Decision Making” offering for 21 international military and civilian participants, from November 6-17, 2017. Often described as CCMR’s “flagship” course, this curriculum has been offered at the Naval Postgraduate School (NPS) in Monterey, California for over 20 years.

  4. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  5. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  6. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  7. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  8. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  9. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  10. 32 CFR Appendix B to Part 327 - Internal Management Control Review Checklist

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Internal Management Control Review Checklist B... B to Part 327—Internal Management Control Review Checklist (a) Task: Personnel and/or Organization... See footnote 2 to this Appendix B. (1) I attest that the above listed internal controls provide...

  11. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  12. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  13. Internal safety review team at Comanche Peak SES

    Energy Technology Data Exchange (ETDEWEB)

    Davis, D [Comanche Peak Steam Electric Staion, Texas Utilities, TX (United States)

    1997-09-01

    The presentations describes the following issues: levels of defense in depth; internal safety review organizations; methods used to perform safety assessment; safety committee review; quality verification; root cause analysis; human performance program; industry operating experience.

  14. Exploitation in International Paid Surrogacy Arrangements

    OpenAIRE

    Wilkinson, Stephen

    2015-01-01

    Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...

  15. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  16. Internal Controls and Compliance with Laws and Regulations for the FY 1997 Financial Statements of Other Defense Organizations

    National Research Council Canada - National Science Library

    1998-01-01

    ... consolidated financial statements for FY 1996 and each succeeding year. The DoD Consolidated Financial Statements for FY 1997 include financial statements for a reporting entity entitled "Other Defense Organizations...

  17. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  18. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  19. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  20. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  1. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  2. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  3. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  4. Legitimate Use of Military Force Against State-Sponsored International Terrorism

    Science.gov (United States)

    1989-07-01

    principal. American international law professor and theorist Hans Kelsen writes, There are a number of ways in which force may be used indirectly by a...excluding anticipatory self-defense. Brownlie, Boyle, Jessup, Kelsen , Kunz, Sorensen, and Q. Wright, among others, assert that �there is no right of...law on self-defense. The most articulate writer in this regard is Hans Kelsen , who argues: All sides in this controversy over the scope of the

  5. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  6. Alternative conventional defense postures in the European theater

    International Nuclear Information System (INIS)

    Brauch, H.D.; Kennedy, R.

    1992-01-01

    This book is about change: in the Soviet Union, in Eastern Europe, and how we in the West should respond. Few observers of the international scene, even in their wildest dreams, could have imagined the course of events that have taken place in Europe since early 1989. The communist system came to a dead end. Old social, economic, political, and psychological recipes no longer were acceptable, either in the Soviet Union or in Eastern Europe. Soviet leadership had only two choices: repress change in Eastern Europe and demand continued sacrifices from its own people, or press forward on the road of economic reform and political restructuring at home and the pursuit of new relationships abroad. The three volumes on Alternative Conventional Defense Postures in the European Theater contributed significantly to the current debate in Europe and in the United States on the future of European security. As an outgrowth of a German-American workshop at the Army War College in Carlisle, Pennsylvania, the two editors have succeeded in bringing together statesmen, soldiers, and civilian defense specialist from the Federal Republic, the United States, and the Soviet Union, who represent a variety of schools of political and strategic thinking

  7. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  8. OPINIONS ON INTERNATIONAL RESERVES MANAGEMENT - POST CRISIS

    OpenAIRE

    MERCEA (HANDRO) PATRICIA AMALIA

    2017-01-01

    The recent crisis demonstrated once again the importance of maintaining an adequate level of the international reserves as part of the defense of a country against the shocks internationally transmitted. Liquidity buffers aided the good functioning of financial systems, and allowed countries to cope with sudden foreign capital stops or to manage massive outflows without facing a costly crisis. This logic has been strengthened in the context of the crisis from 2008, when countries ...

  9. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  10. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  11. The Rationality/Emotional Defensiveness Scale--I. Internal structure and stability.

    Science.gov (United States)

    Swan, G E; Carmelli, D; Dame, A; Rosenman, R H; Spielberger, C D

    1991-01-01

    In a 10-year prospective study, Grossarth-Maticek and colleagues reported that the tendency to repress and/or deny emotions was strongly predictive of cancer mortality. The method used to assess repression/denial was modified recently by Spielberger to form the Rationality/Emotional Defensiveness (R/ED) Scale. The present study investigates the psychometric properties of the R/ED Scale in 1236 male (mean age = 71.8 yr) and 863 female (mean age = 68.5 yr) participants in a 27-year follow-up of the Western Collaborative Group Study. Analyses revealed high interitem consistency (Cronbach's alpha = 0.77 and 0.78 for men and women, respectively) and two independent and stable factors that we labeled 'Anti-emotionality' (27% of total variance) and 'Rationality' (21% of total variance). Excluding cancer subjects, significant gender differences were observed for individual items, total R/ED score, and the two subscales. Comparisons of the 159 male cancer patients and the 175 female cancer patients with the corresponding noncancer subjects suggest possible gender x cancer status and age x cancer status interactions. These results challenge Grossarth-Maticek's assertion that rationality/anti-emotionality is a unidimensional construct and indicate the need to take into account the effect of age and gender on the presence of these psychological constructs.

  12. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 4

    Science.gov (United States)

    2009-06-01

    to measure impacted functions not covered by the International Function Point User’s Group (IFPUG) Counting Practices Manual ( CPM ) 4.2. If you are...foggy on the ins and outs of IFPUG or CPM 4.2, or just want a refresher, Total Metrics has simplified the concepts down to an easily under- stood two...information from your organization’s perspective with the software defense industry. • Dedicated space in each issue. • Advertisements ranging from a full

  13. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  14. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  15. Russia and NATO Missile Defense: The European Phased Adaptive Approach Experience, 2009-2017

    Science.gov (United States)

    2018-03-01

    Volume I, 1945-1955. Ft. McNair, Washington, DC: US Army Center of Military History , 2009. Defense Science Board. Science and Technology Issues of...but were not the only contributing factors. Budgetary constraints, technological issues, and reassessments of threats also led to modifications in the...design for adaptability to benefit from technological innovations and to meet the evolving needs for Alliance protection in the international security

  16. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  17. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  18. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  19. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  20. 77 FR 31642 - Hawker Beech Craft Defense Company, LLC, Also Known As Hawker Beechcraft Corporation, Also Known...

    Science.gov (United States)

    2012-05-29

    ... DEPARTMENT OF LABOR Employment and Training Administration [TA-W-74,901] Hawker Beech Craft Defense Company, LLC, Also Known As Hawker Beechcraft Corporation, Also Known As Hawker Beechcraft International SVC, Also Known As Rapid Surplus Parts, Also Known As Hawker Beechcraft Svcs, Also Known As Travel...

  1. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  2. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  3. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  4. Greater tactile sensitivity and less use of immature psychological defense mechanisms predict women's penile-vaginal intercourse orgasm.

    Science.gov (United States)

    Brody, Stuart; Houde, Stephanie; Hess, Ursula

    2010-09-01

    Previous research has suggested that diminished tactile sensitivity might be associated with reduced sexual activity and function. Research has also demonstrated significant physiological and psychological differences between sexual behaviors, including immature psychological defense mechanisms (associated with various psychopathologies) impairing specifically women's orgasm from penile-vaginal intercourse (PVI). To examine the extent to which orgasm triggered by PVI (distinguished from other sexual activities) is associated with both greater tactile sensitivity and lesser use of immature psychological defenses. Seventy French-Canadian female university students (aged 18-30) had their finger sensitivity measured with von Frey type microfilaments, completed the Defense Style Questionnaire and a short form of the Marlowe-Crowne social desirability scale, and provided details of the 1 month (and ever) frequencies of engaging in, and having an orgasm from, PVI, masturbation, anal intercourse, partner masturbation, and cunnilingus. Logistic and linear regression prediction of orgasm triggered by PVI from tactile sensitivity, age, social desirability responding, and immature psychological defenses. Having a PVI orgasm in the past month was associated with greater tactile sensitivity (odds ratio=4.0 for each filament point) and less use of immature defense mechanisms (odds ratio=5.1 for each scale point). Lifetime PVI orgasm was associated only with less use of immature defense mechanisms (and lower social desirability responding score). Orgasms triggered by other activities were not associated with either tactile sensitivity or immature defense mechanisms. Tactile sensitivity was also associated with greater past month PVI frequency (inclusion of PVI frequency in a logistic regression model displaced tactile sensitivity), and lesser use of immature defenses was associated with greater past month PVI and PVI orgasm frequencies. Both diminished physical sensitivity and the

  5. 77 FR 71028 - Notice of Meeting of Advisory Committee on International Law

    Science.gov (United States)

    2012-11-28

    ... Law A meeting of the Advisory Committee on International Law will take place on Friday December 14, from 9:30 a.m. to approximately 5:30 p.m., at the George Washington University Law School (Frederick... current international legal topics, including corporate social responsibility, principles of self-defense...

  6. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  7. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  8. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  15. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  16. Parasitic wasp responses to symbiont-based defense in aphids

    Directory of Open Access Journals (Sweden)

    Oliver Kerry M

    2012-02-01

    Full Text Available Abstract Background Recent findings indicate that several insect lineages receive protection against particular natural enemies through infection with heritable symbionts, but little is yet known about whether enemies are able to discriminate and respond to symbiont-based defense. The pea aphid, Acyrthosiphon pisum, receives protection against the parasitic wasp, Aphidius ervi, when infected with the bacterial symbiont Hamiltonella defensa and its associated bacteriophage APSE (Acyrthosiphon pisum secondary endosymbiont. Internally developing parasitoid wasps, such as A. ervi, use maternal and embryonic factors to create an environment suitable for developing wasps. If more than one parasitoid egg is deposited into a single aphid host (superparasitism, then additional complements of these factors may contribute to the successful development of the single parasitoid that emerges. Results We performed experiments to determine if superparasitism is a tactic allowing wasps to overcome symbiont-mediated defense. We found that the deposition of two eggs into symbiont-protected aphids significantly increased rates of successful parasitism relative to singly parasitized aphids. We then conducted behavioral assays to determine whether A. ervi selectively superparasitizes H. defensa-infected aphids. In choice tests, we found that A. ervi tends to deposit a single egg in uninfected aphids, but two or more eggs in H. defensa-infected aphids, indicating that oviposition choices may be largely determined by infection status. Finally, we identified differences in the quantity of the trans-β-farnesene, the major component of aphid alarm pheromone, between H. defensa-infected and uninfected aphids, which may form the basis for discrimination. Conclusions Here we show that the parasitic wasp A. ervi discriminates among symbiont-infected and uninfected aphids, and changes its oviposition behavior in a way that increases the likelihood of overcoming symbiont

  17. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  18. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  19. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  20. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  1. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  2. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  3. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  4. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  5. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  6. Roadmap for an EArth Defense Initiative (READI)

    Science.gov (United States)

    Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.

    2015-12-01

    During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.

  7. THE CONTEMPORARY INTERNATIONAL LAW. A RELATION BETWEEN HUMAN RIGHTS AND THE INTERNATIONAL HUMANITARIAN LAW

    Directory of Open Access Journals (Sweden)

    JEANNETTE IRIGOIN BARRENE

    2018-01-01

    Full Text Available During an armed conflict, a change in the application of the human right regulations and international humanitarian law can be observed in the practice of contemporary international law. It is possible to observe at UN and International Courts’ levels an interesting trend in the sense of considering the application of both systems simultaneously in cases of international crisis as well as in internal conflicts. This innovation in contemporary international law can be observed initially in the change experimented by the legislation of the Human Rights’ European Court and specially and clearer in the Human Rights’ Inter American Court, which in cases against Honduras, Colombia, Paraguay and other countries, states that the State, being warrantor of the efficient protection of civil population, must apply and honor not only the Human Rights’ American Convention, but also the articles 13th and 14th of the II protocol of the Geneva Conventions of 1949. The convergence of both branches of the Law, and its application may help to achieve a better defense and efficiency of the fundamental rights of the human being.

  8. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  9. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  10. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  11. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  12. Guide for the Management of Multinational Programs. A Handbook for Managers Entering the World of International Acquisition. Second Edition

    Science.gov (United States)

    1987-05-11

    of concern have been somewhat modified, as evidenced by the Eastern Airlines and the recent 10-11 northwest Airlines purchase of the A-300 Airbus and...extensions of the DIS •’At affect international cooperative efforts. These are the Defense Irdus- trial Security Clearance Office ( DISCO ), the Defense...determining the eligibility of industrial personnel for access to classified 17-24 defense information. This function is performed centrally by DISCO . DISCO

  13. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  14. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  15. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  16. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  17. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  18. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  19. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  20. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  1. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  2. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  3. Internal Controls and Compliance With Laws and Regulations for the Defense Business Operations Fund Consolidated Financial Statements for FY 1995

    National Research Council Canada - National Science Library

    Lane, Frederick

    1996-01-01

    The objective of the audit was to determine whether the Consolidated Statement of Financial Position and selected accounts on the Statement of Operations of the Defense Business Operations Fund for FY...

  4. Internal Controls and Compliance with Laws and Regulations for the National Defense Stockpile Transaction Fund Financial Statements for FY 1996

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The Chief Financial Officers Act of 1990, as amended by the Federal Financial Management Act of 1994, requires an annual audit of revolving funds such as the National Defense Stockpile Transaction Fund...

  5. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  6. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  7. Leveraging International Cooperation Acquisition Opportunities for the Department of Defense

    Science.gov (United States)

    2014-09-01

    Comparative and cost/ benefit and risk analysis and SWOT  Research Needed: Examples of U.S. DOD domestic projects and programs that have included...for International Cooperation and how that will benefit or deter the domestic program offices system acquisition efforts. Our research and analysis ...38 2. SWOT Analysis ..................................................................................39

  8. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  9. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  10. Can patriotism justify killing in defense of one’s country?

    Directory of Open Access Journals (Sweden)

    Pavković Aleksandar

    2007-01-01

    Full Text Available Cosmopolitan liberals would be ready to fight - and to kill and be killed for the sake of restoring international justice or for the abolition of profoundly unjust political institutions. Patriots are ready to do the same for their own country. Sometimes the cosmopolitan liberals and patriots would fight on the same side and sometimes on the opposite sides of the conflict. Thus the former would join the latter in the defense of Serbia against Austria-Hungary (in 1914 but would oppose the white Southerner patriots in the American Civil War (in 1861. In this paper I argue that fighting and killing for one’s country is, in both of those cases, different from the defense of one’s own life and the lives of those who cannot defend themselves. Killing for one’s country is killing in order to fulfill a particular political preference. The same is the case with fighting for the abolition of a profoundly unjust political institution. It is not amoral or immoral to refuse to kill for any one of these two political preferences because there is no reason to believe that either political preference trumps our moral constraints against killing.

  11. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  12. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  13. Alpha synchronization as a brain model for unconscious defense: An overview of the work of Howard Shevrin and his team.

    Science.gov (United States)

    Bazan, Ariane

    2017-10-01

    Howard Shevrin and his team have developed a stringent subliminal priming methodology, which experimentally approximates a situation of an internal, mental triggering of unconscious defense. Through a series of four studies they thus are able to bring evidence for this type of unconscious defense. With event-related potentials, three clinical studies show how synchronization of a specific brain wave, the alpha wave, known for its inhibitory function, is also induced by subliminally presented conflictual subject-specific stimuli. Therefore, alpha synchronization could serve as the brain mechanism of unconscious defense. The results only make sense if we suppose the existence of a dynamic unconscious, which has inherited childhood conflicts, and with privileged connections to neurotic symptom characteristics. Moreover, by showing that the unconscious conflict phrases, inferred by clinicians from clinical interviews, have a similar brain behavior, Shevrin and his team provide evidence that these inferences are not simply clinician-dependent subjective interpretations but also imply some form of independent mental reality. Finally, interpretation of the results has led us to propose two distinct physiological mechanisms for defense: one, unconscious defense, by alpha synchronization in connection with the drive derivatives, and another, repression, based on the indications of reality in connection with the ego. Copyright © 2017 Institute of Psychoanalysis.

  14. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  15. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  16. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  17. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  18. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  19. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  20. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  1. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  2. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  3. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  4. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  5. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  6. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  7. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  8. Photoelastic Studies of Internal Stress Distributions of Unidirectional Composites.

    Science.gov (United States)

    1980-12-01

    34 verre a, If t nece, e.ry and Identify by block number) ..... ’Io-dimensional phutoelastli, models were used to determine internal taading-. and...Secretary of Defense for Research and Engineering, le Pe, ,tagon,, Uashington, D.C. 10301 ]2 Commandr, T)efens. lecn, ical Information Center, Cameron

  9. Enhancing Unity of Effort in Homeland Defense, Homeland Security, and Civil Support Through Interdisciplinary Education

    Science.gov (United States)

    2010-03-01

    Parameters, Winter 1998, 39–50. Walt Disney Pictures. (2004) Miracle. Burbank, CA. Wormuth, C. E., & Witkowsky, A. (2008). Managing the Next...defense, homeland security, and civil support. In 2004, Disney produced a movie entitled Miracle that portrayed the story of the 1980 hockey team...perspective that the players have finally set aside their differences and internal competitions to form a true team. These quotes from a movie Disney

  10. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  11. Impact of defense conversion and US response

    International Nuclear Information System (INIS)

    Montanarelli, N.

    1994-01-01

    Conversion from military to civilian products due to defense conversion after the end of the Cold War takes a long as 20 years. In USA there are over 50 government programs funded to assist in defence conversion. This paper concentrates on the three major programs that will have the greatest impact on the economy, in the framework of the issues and needs of American industry. Federal government and US industry are making a considerable effort to transform how to do business today. One of the most important emerging themes in the federal program is international competitiveness. Large federal expenditures are made to support research and development that will increase productivity, thereby helping industry in global economic competition. This, in turn will play a key role in absorbing a large quantity od resources affected by the end of the Cold War

  12. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  13. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  14. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  15. Addressing the needs of international students: a case from a ...

    African Journals Online (AJOL)

    ... and enhances the problem solving process in the context of international students' identification with an imaginary personality. The defense mechanisms unconsciously applied in the frame of an individual's narration assist in interpreting their emotional state and psychological adaptation levels at a certain point in time.

  16. The natural defense system and the normative self model [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2016-05-01

    Full Text Available Infectious agents are not the only agressors, and the immune system is not the sole defender of the organism. In an enlarged perspective, the ‘normative self model’ postulates that a ‘natural defense system’ protects man and other complex organisms against the environmental and internal hazards of life, including infections and cancers. It involves multiple error detection and correction mechanisms that confer robustness to the body at all levels of its organization. According to the model, the self relies on a set of physiological norms, and NONself (meaning : Non Obedient to the Norms of the self is anything ‘off-norms’. The natural defense system comprises a set of ‘civil defenses’ (to which all cells in organs and tissues contribute, and a ‘professional army ‘, made of a smaller set of mobile cells. Mobile and non mobile cells differ in their tuning abilities. Tuning extends the recognition capabilities of NONself by the mobile cells, which increase their defensive function. To prevent them to drift, which would compromise self/NONself discrimination, the more plastic mobile cells need to periodically refer to the more stable non mobile cells to keep within physiological standards.

  17. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  18. [Clinical characteristics among forensic inpatients: A special case, the establishment of social defense "Les Marronniers" in Tournai (Belgium)].

    Science.gov (United States)

    Oswald, P; Saloppé, X; Ducro, C; Macquet, D; Cornu, P-J; Pham, T; Delaunoit, B

    2017-05-01

    In Belgium, the law of "social defense" stipulates that an accused "which is either in a state of dementia or in a serious state of mental disturbance or mental deficiency, incapable of controlling his actions" can be interned. The establishment of social defense (ESD) in Tournai (Belgium) hosts 350 inmates. In collaboration with the Centre for research in social defense, we organized a systematic assessment of patients interned in ESD. This is the first study evaluating prospectively this population. Of the total, 229 patients signed informed consent. Different scales of assessment (MINI, WAIS-III, SCID II) were used. Descriptive analyzes were applied (SPSS version 12). We show that 48.8 % of our participants had committed a sexual offense (rape or attempted rape, indecent assault, public outrage or mixed). The average intelligence quotient is 71.4. According to the MINI, 33.2 % of participants showed no psychiatric disorder. Among psychiatric disorders, psychotic disorders are the most represented (37.4 %). According to the SCID, personality disorders were absent in 26.8 % of our participants. Most of the axis II disorders are represented personality disorders related to cluster B (57.3 %) mainly with antisocial personality disorder (37.9 %). These data demonstrate the significant heterogeneity of our sample and the need for the establishment of specific care routes to each subpopulation. Copyright © 2016 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  19. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  20. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  1. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  2. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  3. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  4. Problems of internalization: a button is a button is-not.

    Science.gov (United States)

    Rockwell, Shelley

    2014-01-01

    Analysts hope to help the patient internalize a relationship with the analyst that contrasts with the original archaic object relation. In this paper, the author describes particular difficulties in working with a patient whose defenses and anxieties were bulimic, her movement toward internalization inevitably undone. Several issues are considered: how does the nonsymbolizing patient come to internalize the analyst's understanding, and when this does not hold, what is the nature of the patient's subsequent methods of dispersal? When the patient can maintain connection to the analyst as a good object, even fleetingly, in the depressive position, the possibility of internalization and symbolic communication is increased. © 2014 The Psychoanalytic Quarterly, Inc.

  5. Internal Crisis Communication Strategies to Protect Trust Relationships

    DEFF Research Database (Denmark)

    Mazzei, Alessandra; Ravazzani, Silvia

    2015-01-01

    Crisis communication has emerged as a hot topic after the global financial crisis that started in the second half of 2008. A survey of 61 Italian companies examined internal crisis communication strategies and the characteristics of that communication in order to understand the role...... of communication in safeguarding relationships of trust with employees. The main results show that companies have used poorly internal communication as a strategic lever to develop employee commitment and have adopted a broadly defensive approach that may undermine their intangible assets. The study offers...

  6. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  7. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  8. The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense

    International Nuclear Information System (INIS)

    Massa, R.J.

    1987-01-01

    This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training

  9. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  11. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  12. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  13. Brazilian nuclear politics in the context of contemporary international relations

    International Nuclear Information System (INIS)

    Carpes, Mariana Montez

    2006-09-01

    The present dissertation analyses the retaking of the debate over Brazilian nuclear Program's recovery by Luis Inacio Lula da Silva government, based on the defense of the utilization of an already acquired technology of its own to enrich uranium. In spite of the intrinsic duality on this subject and having in mind the pacific ends concerning the utilization of such technology by Brazil, the hypothesis sustained in this work is that the Program's defense is considered a strategy of sovereign international insertion with relative autonomy and an instrument of national valorization against other powers. In order to verify the hypothesis outlined above, we will analyse the actual government, comparing it to, two other moments in Brazilian History in which the nuclear issue also acquired preponderance on the national agenda, namely, Geisel and Sarney governments. Although these three moments differ in relation to their internal political regime, our goal is to identify their similarities. (author)

  14. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  15. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  16. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  17. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  18. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  19. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  20. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  1. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  2. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  3. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  4. In Defense of the National Labs and Big-Budget Science

    Energy Technology Data Exchange (ETDEWEB)

    Goodwin, J R

    2008-07-29

    The purpose of this paper is to present the unofficial and unsanctioned opinions of a Visiting Scientist at Lawrence Livermore National Laboratory on the values of LLNL and the other National Labs. The basic founding value and goal of the National Labs is big-budget scientific research, along with smaller-budget scientific research that cannot easily be done elsewhere. The most important example in the latter category is classified defense-related research. The historical guiding light here is the Manhattan Project. This endeavor was unique in human history, and might remain so. The scientific expertise and wealth of an entire nation was tapped in a project that was huge beyond reckoning, with no advance guarantee of success. It was in many respects a clash of scientific titans, with a large supporting cast, collaborating toward a single well-defined goal. Never had scientists received so much respect, so much money, and so much intellectual freedom to pursue scientific progress. And never was the gap between theory and implementation so rapidly narrowed, with results that changed the world, completely. Enormous resources are spent at the national or international level on large-scale scientific projects. LLNL has the most powerful computer in the world, Blue Gene/L. (Oops, Los Alamos just seized the title with Roadrunner; such titles regularly change hands.) LLNL also has the largest laser in the world, the National Ignition Facility (NIF). Lawrence Berkeley National Lab (LBNL) has the most powerful microscope in the world. Not only is it beyond the resources of most large corporations to make such expenditures, but the risk exceeds the possible rewards for those corporations that could. Nor can most small countries afford to finance large scientific projects, and not even the richest can afford largess, especially if Congress is under major budget pressure. Some big-budget research efforts are funded by international consortiums, such as the Large Hadron Collider

  5. International waste management fact book

    Energy Technology Data Exchange (ETDEWEB)

    Amaya, J P; LaMarche, M N; Upton, J F

    1997-10-01

    Many countries around the world are faced with nuclear and environmental management problems similar to those being addressed by the US Department of Energy. The purpose of this Fact Book is to provide the latest information on US and international organizations, programs, activities and key personnel to promote mutual cooperation to solve these problems. Areas addressed include all aspects of closing the commercial and nuclear fuel cycle and managing the wastes and sites from defense-related, nuclear materials production programs.

  6. International waste management fact book

    International Nuclear Information System (INIS)

    Amaya, J.P.; LaMarche, M.N.; Upton, J.F.

    1997-10-01

    Many countries around the world are faced with nuclear and environmental management problems similar to those being addressed by the US Department of Energy. The purpose of this Fact Book is to provide the latest information on US and international organizations, programs, activities and key personnel to promote mutual cooperation to solve these problems. Areas addressed include all aspects of closing the commercial and nuclear fuel cycle and managing the wastes and sites from defense-related, nuclear materials production programs

  7. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  8. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  9. Promoting International Energy Security. Volume 1: Understanding Potential Air Force Roles

    Science.gov (United States)

    2012-01-01

    obtain additional information, contact Distribution Services: Telephone: (310) 451 -7002; Fax: (310) 451 -6915; Email: order@rand.org Library of...raise the temperature of one pound of water one degree Fahrenheit ) DoD Department of Defense EIA U.S. Energy Information Administration IEA International

  10. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  11. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  12. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  13. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  14. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  15. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  16. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  17. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  18. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  19. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  20. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  1. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  2. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  3. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  4. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  5. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  6. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  7. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  8. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  9. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  10. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  11. Behavioral responses to a repetitive visual threat stimulus express a persistent state of defensive arousal in Drosophila.

    Science.gov (United States)

    Gibson, William T; Gonzalez, Carlos R; Fernandez, Conchi; Ramasamy, Lakshminarayanan; Tabachnik, Tanya; Du, Rebecca R; Felsen, Panna D; Maire, Michael R; Perona, Pietro; Anderson, David J

    2015-06-01

    The neural circuit mechanisms underlying emotion states remain poorly understood. Drosophila offers powerful genetic approaches for dissecting neural circuit function, but whether flies exhibit emotion-like behaviors has not been clear. We recently proposed that model organisms may express internal states displaying "emotion primitives," which are general characteristics common to different emotions, rather than specific anthropomorphic emotions such as "fear" or "anxiety." These emotion primitives include scalability, persistence, valence, and generalization to multiple contexts. Here, we have applied this approach to determine whether flies' defensive responses to moving overhead translational stimuli ("shadows") are purely reflexive or may express underlying emotion states. We describe a new behavioral assay in which flies confined in an enclosed arena are repeatedly exposed to an overhead translational stimulus. Repetitive stimuli promoted graded (scalable) and persistent increases in locomotor velocity and hopping, and occasional freezing. The stimulus also dispersed feeding flies from a food resource, suggesting both negative valence and context generalization. Strikingly, there was a significant delay before the flies returned to the food following stimulus-induced dispersal, suggestive of a slowly decaying internal defensive state. The length of this delay was increased when more stimuli were delivered for initial dispersal. These responses can be mathematically modeled by assuming an internal state that behaves as a leaky integrator of stimulus exposure. Our results suggest that flies' responses to repetitive visual threat stimuli express an internal state exhibiting canonical emotion primitives, possibly analogous to fear in mammals. The mechanistic basis of this state can now be investigated in a genetically tractable insect species. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  13. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  14. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  15. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  16. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  17. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  18. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  19. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  20. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  1. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  2. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  3. Foreign Internal Defense

    Science.gov (United States)

    2010-07-12

    leaders. (h) Former political leaders or retired government officials. (i) Tribal or family leaders. (j) Agricultural leaders, farmers ...logistics sustainability overlay depicts potable water supplies, farms, orchards , growing seasons, and other relevant items. In built-up areas, this...explosives, and population patterns such as seasonal employment. Examples of potential effects are periods of drought that force farmers to become

  4. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  5. A STUDY ON DEFENSE ACQUISITION MODELS WITH AN EMERGING MARKET PERSPECTIVE. THE CASE OF TURKEY

    Directory of Open Access Journals (Sweden)

    Mustafa Kemal Topcu

    2015-10-01

    Full Text Available With the end of the Cold War, the static environment, characteristic of the bipolar world, has changed quickly into a dynamic and complicated environment with new actors. These changes have also affected the countries’ armed forces and new approaches to procurement/acquisition come into progress. After the Cold War, countries have focused on responding to changing threats with their decreasing defense budgets. In this study, acquisition models and their effects on Turkey’s technology acquisition and defense industry are evaluated. The evaluation is performed based on criteria such as contribution to national economy, customization, acquisition cost, time and risk, life cycle cost, and technology acquisition. Major acquisition models in this study are determined as direct procurement, production under license, joint venture, indigenous development, production via international consortium. Finally, it is observed that the best model is indigenous development while the others will serve as technology acquisition for indigenous development.

  6. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  7. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  8. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  9. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  10. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  11. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  12. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  13. Psychoticism, Immature Defense Mechanisms and a Fearful Attachment Style are Associated with a Higher Homophobic Attitude.

    Science.gov (United States)

    Ciocca, Giacomo; Tuziak, Bogdan; Limoncin, Erika; Mollaioli, Daniele; Capuano, Nicolina; Martini, Alessia; Carosa, Eleonora; Fisher, Alessandra D; Maggi, Mario; Niolu, Cinzia; Siracusano, Alberto; Lenzi, Andrea; Jannini, Emmanuele A

    2015-09-01

    Homophobic behavior and a negative attitude toward homosexuals are prevalent among the population. Despite this, few researches have investigated the psychologic aspects associated with homophobia, as psychopathologic symptoms, the defensive system, and attachment styles. The aim of this study was to investigate the psychologic factors mentioned earlier and their correlation with homophobia. Five hundred fifty-one university students recruited, aged 18-30, were asked to complete several psychometric evaluation. In particular, Homophobia Scale (HS) was used to assess homophobia levels, the Symptoms Check List Revised (SCL-90-R) for the identification of psychopathologic symptoms, the Defence Style Questionnaire (DSQ-40) for the evaluation of defense mechanisms and the Relationship Questionnaire (RQ) for attachment styles. After a regression analysis, we found a significant predictive value of psychoticism (β = 0.142; P = 0.04) and of immature defense mechanisms (β = 0.257; P homophobia, while neurotic defense mechanisms (β = -0.123; P = 0.02) and depressive symptoms (β = -0.152; P = 0.04) have an opposite role. Moreover, categorical constructs of the RQ revealed a significant difference between secure and fearful attachments styles in levels of homophobia (secure = 22.09 ± 17.22 vs. fearful = 31.07 ± 25.09; P homophobia compared with the subjects demonstrating a fearful style of attachment. Hence, in the assessment of homophobia and in the relevant programs of prevention, it is necessary to consider the psychologic aspects described earlier. © 2015 International Society for Sexual Medicine.

  14. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  15. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  16. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  17. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  18. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  19. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  20. Programs that support non-proliferation and defense conversion funded by the US Government

    International Nuclear Information System (INIS)

    Rutkowski, H.L.

    1994-08-01

    The proliferation of nuclear, chemical, and biological weapons is a serious problem for international security. Consequently the U.S. government has established an array of programs to fund activities that will inhibit this activity. The problem of proliferation and defense conversion, in general, is quite complicated. The most immediate concern is the actual diversion of weapons materials. In the long term; however, weapons of mass destruction must be destroyed in a safe and environmentally sound manner. Ultimately the solution of the proliferation problem lies in the redirection of the intellectual skills of weapons scientists and engineers to peaceful commercial activities. At the present time the economic conditions in the New Independent States create severe pressure on people with critical weapons knowledge to sell their skills to political entities that are dangerous. There are four programs to be discussed in this paper. The first is the open-quotes Nunn-Lugarclose quotes program which is the largest and is administered by the Department of Defense. Between FY92 and FY94 Congress authorized $1.2B for this activity which is aimed at weapons destruction, storage, and safeguards. The second is the International Science and Technology Center in Moscow and the Science Center about to open in Ukraine. These are joint efforts involving the U.S., the European Community, and Japan to fund projects to prevent proliferation and foster commercial technological activity in Russia, Georgia, and Ukraine. The New Independent States - Industrial Partnering Program is a $35M (FY94) program jointly administered by the Department of Energy and the Department of State

  1. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  2. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  3. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  4. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  5. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  6. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  7. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  8. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  9. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  10. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  11. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  12. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  13. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  14. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  15. NASA's Planetary Defense Coordination Office at NASA HQ

    Science.gov (United States)

    Daou, D.; Johnson, L.; Fast, K. E.; Landis, R.; Friedensen, V. P.; Kelley, M.

    2017-12-01

    NASA and its partners maintain a watch for near-Earth objects (NEOs), asteroids and comets that pass close to the Earth, as part of an ongoing effort to discover, catalog, and characterize these bodies. The PDCO is responsible for: Ensuring the early detection of potentially hazardous objects (PHOs) - asteroids and comets whose orbit are predicted to bring them within 0.05 Astronomical Units of Earth; and of a size large enough to reach Earth's surface - that is, greater than perhaps 30 to 50 meters; Tracking and characterizing PHOs and issuing warnings about potential impacts; Providing timely and accurate communications about PHOs; and Performing as a lead coordination node in U.S. Government planning for response to an actual impact threat. The PDCO collaborates with other U.S. Government agencies, other national and international agencies, and professional and amateur astronomers around the world. The PDCO also is responsible for facilitating communications between the science community and the public should any potentially hazardous NEO be discovered. In addition, the PDCO works closely with the United Nations Office of Outer Space Affairs, its Committee on the Peaceful Uses of Outer Space, and its Action Team on Near Earth Objects (also known as Action Team 14). The PDCO is a leading member of the International Asteroid Warning Network (IAWN) and the Space Missions Planning Advisory Group (SMPAG), multinational endeavors recommended by the United Nations for an international response to the NEO impact hazard and established and operated by the space-capable nations. The PDCO also communicates with the scientific community through channels such as NASA's Small Bodies Assessment Group (SBAG). In this talk, we will provide an update to the office's various efforts and new opportunities for partnerships in the continuous international effort for Planetary Defense.

  16. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  17. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  18. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  19. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  20. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  1. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  2. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  3. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  4. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  5. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  6. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  7. Defense response of susceptible and resistant Biomphalaria alexandrina snails against Schistosoma mansoni infection

    Directory of Open Access Journals (Sweden)

    Iman F. Abou-El-Naga

    2012-09-01

    Full Text Available In Egypt, Biomphalaria alexandrina is the intermediate host for Schistosoma mansoni. The fates of Schistosoma miracidia in the snails varies between different species of Biomphalaria. The internal defense system is one of the factors that influence the susceptibility pattern of the snails. The interaction between Biomphalaria snails and S. mansoni needs to be identified for each species, and even between the members of the same species with different degrees of susceptibility. In the present study, the first generation of susceptible and resistant parents of B. alexandrina was examined histologically at the 30th day post exposure. The study includes the characterization of the immune response, as expressed by tissue reactions, of susceptible and resistant B. alexandrina snails against S. mansoni. It was also designed to determine the impact of the resistance increase in parent snails, on the mechanisms of interaction of their offspring against infection. The results showed that the infection rate of the offspring from the susceptible parents was 92%. No susceptible offspring was produced from the resistant parents. When the parents were of equal number of susceptible and resistant snails, they gave an offspring with an infection rate of 20%. Susceptible snails that had susceptible parents showed a higher degree of susceptibility than those that had both susceptible and resistant parents. A common feature of the resistant snails was the absence of any viable parasites. The tissue reactions of the resistant snails having only resistant parents occurred at the site of miracidial penetration. In resistant snails for which susceptible ones were included in their parents, the reactions occurred in the deep tissues. These results characterized the immune response of B. alexandrina snails against Schistosoma infection which was found to occur by two different mechanisms. One type of defense occurs in highly resistant snails, and employs direct

  8. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  9. The Evolution of Missile Defense Plan from Bush to Obama. Implications for the National Security of Romania

    Directory of Open Access Journals (Sweden)

    Ruxandra-Laura BOSILCA

    2012-06-01

    Full Text Available In 2011 Romania officially became part of the Obama administration’s missile defense system in Europe which has significantly changed the strategic military relations both in Europe and worldwide. The Bush approach has been revised and progress in several sections has been achieved, both strategically and technically. For Romania, the participation in the missile defence plan, ensures more solid security guarantees, especially in an unpredictable and risk-prone international environment where the U.S. reconsiders its presence in Europe under the pressure of the economic crisis and of a relative decline in power; it has also become a more visible actor – alongside Bulgaria – which were initially excluded by the Bush missile defence plan. This paper’s purpose is to review the main evolutions of the missile defense plan from the Bush to the Obama administration and to outline its implications on the national security of Romania.

  10. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  11. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  12. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  13. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  14. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  15. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    Science.gov (United States)

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  16. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  17. Evaluating Security Assistance Programs: Performance Evaluation and the Expanded International Military Education and Training (E-IMET) Program

    National Research Council Canada - National Science Library

    Calhoun, Todd

    1998-01-01

    In 1991 the International Military Education and Training (IMET) program was expanded to include training programs focusing on civilian control over the military, respect for human rights, and responsible defense resource management...

  18. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  19. The DISAM Journal of International Security Assistance Management. Volume 26, Number 1, Fall 2003

    Science.gov (United States)

    2003-01-01

    contribution to international peace and stability. Current Members of the Hall of Fame General Lojas Fodor, Commander, Hungarian Defense Forces and Chief of...Belize Bermuda Bolivia Brazil British Virgin Islands Cayman Islands Chile Colombia Costa Rica Cuba Dominica Dominican Republic Ecuador El

  20. New evidence for a multi-functional role of herbivore-induced plant volatiles in defense against herbivores.

    Science.gov (United States)

    Rodriguez-Saona, Cesar R; Frost, Christopher J

    2010-01-01

    A diverse, often species-specific, array of herbivore-induced plant volatiles (HIPVs) are commonly emitted from plants after herbivore attack. Although research in the last 3 decades indicates a multi-functional role of these HIPVs, the evolutionary rationale underpinning HIPV emissions remains an open question. Many studies have documented that HIPVs can attract natural enemies, and some studies indicate that neighboring plants may eavesdrop their undamaged neighbors and induce or prime their own defenses prior to herbivore attack. Both of these ecological roles for HIPVs are risky strategies for the emitting plant. In a recent paper, we reported that most branches within a blueberry bush share limited vascular connectivity, which restricts the systemic movement of internal signals. Blueberry branches circumvent this limitation by responding to HIPVs emitted from neighboring branches of the same plant: exposure to HIPVs increases levels of defensive signaling hormones, changes their defensive status, and makes undamaged branches more resistant to herbivores. Similar findings have been reported recently for sagebrush, poplar and lima beans, where intra-plant communication played a role in activating or priming defenses against herbivores. Thus, there is increasing evidence that intra-plant communication occurs in a wide range of taxonomically unrelated plant species. While the degree to which this phenomenon increases a plant's fitness remains to be determined in most cases, we here argue that within-plant signaling provides more adaptive benefit for HIPV emissions than does between-plant signaling or attraction of predators. That is, the emission of HIPVs might have evolved primarily to protect undamaged parts of the plant against potential enemies, and neighboring plants and predators of herbivores later co-opted such HIPV signals for their own benefit.

  1. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  2. The International Criticality Safety Benchmark Evaluation Project on the Internet

    International Nuclear Information System (INIS)

    Briggs, J.B.; Brennan, S.A.; Scott, L.

    2000-01-01

    The International Criticality Safety Benchmark Evaluation Project (ICSBEP) was initiated in October 1992 by the US Department of Energy's (DOE's) defense programs and is documented in the Transactions of numerous American Nuclear Society and International Criticality Safety Conferences. The work of the ICSBEP is documented as an Organization for Economic Cooperation and Development (OECD) handbook, International Handbook of Evaluated Criticality Safety Benchmark Experiments. The ICSBEP Internet site was established in 1996 and its address is http://icsbep.inel.gov/icsbep. A copy of the ICSBEP home page is shown in Fig. 1. The ICSBEP Internet site contains the five primary links. Internal sublinks to other relevant sites are also provided within the ICSBEP Internet site. A brief description of each of the five primary ICSBEP Internet site links is given

  3. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  4. The waste isolation pilot plant. Permanent isolation of defense transuranic waste in deep geologic salt. A national solution and international model

    International Nuclear Information System (INIS)

    Franco, Jose; Van Luik, Abraham

    2015-01-01

    The Waste Isolation Pilot Plant is located about 42 kilometers from the city of Carlsbad, New Mexico. It is an operating deep geologic repository in bedded salt 657 meters below the surface of the Chihuahuan desert. Since its opening in March of 1999, it has received about 12,000 shipments totaling about 91,000 cubic meters of defense related transuranic (TRU) wastes. Twenty-two sites have been cleaned up of their defense-legacy TRU waste. The WIPP's shipping program has an untarnished safety record and its trucks and trailers have safely traveled the equivalent of about 60 round-trips to the Moon. WIPP received, and deserved, a variety of safety accolades over its nearly 15 year working life. In February of 2014, however, two incidents resulted in a major operational suspension and reevaluation of its safety systems, processes and equipment. The first incident was an underground mining truck fire, followed nine days later by an airborne radiation release incident. Accident Investigation Board (AIB) reports on both incidents point to failures of plans, procedures and persons. The AIB recommendations for recovery from both these incidents are numerous and are being carefully implemented. One major recommendation is to no longer have different maintenance and safety requirements for nuclear handling equipment and mining equipment. Maintenance and cleanliness of mining equipment was cited as a contributing cause to the underground fire, and the idea that there can be lesser rigor in taking care of mining equipment, when it is being operated in the same underground space as the waste handling equipment, is not tenable. At some point in the future, the changes made in response to these two incidents will be seen as a valuable lesson learned on behalf of future repository programs. WIPP will once again be seen as a ''pilot'' in the nautical sense, in terms of 'showing the way' - the way to a national and international radioactive waste

  5. The waste isolation pilot plant. Permanent isolation of defense transuranic waste in deep geologic salt. A national solution and international model

    Energy Technology Data Exchange (ETDEWEB)

    Franco, Jose; Van Luik, Abraham [US Department of Energy, Carlsbad, NM (United States). Carlsbad Field Office

    2015-07-01

    The Waste Isolation Pilot Plant is located about 42 kilometers from the city of Carlsbad, New Mexico. It is an operating deep geologic repository in bedded salt 657 meters below the surface of the Chihuahuan desert. Since its opening in March of 1999, it has received about 12,000 shipments totaling about 91,000 cubic meters of defense related transuranic (TRU) wastes. Twenty-two sites have been cleaned up of their defense-legacy TRU waste. The WIPP's shipping program has an untarnished safety record and its trucks and trailers have safely traveled the equivalent of about 60 round-trips to the Moon. WIPP received, and deserved, a variety of safety accolades over its nearly 15 year working life. In February of 2014, however, two incidents resulted in a major operational suspension and reevaluation of its safety systems, processes and equipment. The first incident was an underground mining truck fire, followed nine days later by an airborne radiation release incident. Accident Investigation Board (AIB) reports on both incidents point to failures of plans, procedures and persons. The AIB recommendations for recovery from both these incidents are numerous and are being carefully implemented. One major recommendation is to no longer have different maintenance and safety requirements for nuclear handling equipment and mining equipment. Maintenance and cleanliness of mining equipment was cited as a contributing cause to the underground fire, and the idea that there can be lesser rigor in taking care of mining equipment, when it is being operated in the same underground space as the waste handling equipment, is not tenable. At some point in the future, the changes made in response to these two incidents will be seen as a valuable lesson learned on behalf of future repository programs. WIPP will once again be seen as a ''pilot'' in the nautical sense, in terms of 'showing the way' - the way to a national and international radioactive waste

  6. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  7. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  8. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  9. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  10. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  11. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  12. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  13. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  14. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  15. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  16. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  17. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  18. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  19. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  20. MACS as a tool for international inspections

    Energy Technology Data Exchange (ETDEWEB)

    Curtiss, J.A.; Indusi, J.P.

    1995-08-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

  1. MACS as a tool for international inspections

    International Nuclear Information System (INIS)

    Curtiss, J.A.; Indusi, J.P.

    1995-01-01

    The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites

  2. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  3. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  4. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  5. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  6. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  7. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  8. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  9. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  10. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  11. The role of defensive ecological interactions in the evolution of conotoxins.

    Science.gov (United States)

    Prashanth, J R; Dutertre, S; Jin, A H; Lavergne, V; Hamilton, B; Cardoso, F C; Griffin, J; Venter, D J; Alewood, P F; Lewis, R J

    2016-01-01

    Venoms comprise of complex mixtures of peptides evolved for predation and defensive purposes. Remarkably, some carnivorous cone snails can inject two distinct venoms in response to predatory or defensive stimuli, providing a unique opportunity to study separately how different ecological pressures contribute to toxin diversification. Here, we report the extraordinary defensive strategy of the Rhizoconus subgenus of cone snails. The defensive venom from this worm-hunting subgenus is unusually simple, almost exclusively composed of αD-conotoxins instead of the ubiquitous αA-conotoxins found in the more complex defensive venom of mollusc- and fish-hunting cone snails. A similarly compartmentalized venom gland as those observed in the other dietary groups facilitates the deployment of this defensive venom. Transcriptomic analysis of a Conus vexillum venom gland revealed the αD-conotoxins as the major transcripts, with lower amounts of 15 known and four new conotoxin superfamilies also detected with likely roles in prey capture. Our phylogenetic and molecular evolution analysis of the αD-conotoxins from five subgenera of cone snails suggests they evolved episodically as part of a defensive strategy in the Rhizoconus subgenus. Thus, our results demonstrate an important role for defence in the evolution of conotoxins. © 2015 John Wiley & Sons Ltd.

  12. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  13. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  14. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  15. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  16. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  17. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  18. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  19. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  20. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  1. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  2. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  3. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  4. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  5. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  6. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  7. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  8. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  9. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News

  10. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  11. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  12. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  13. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  14. Message framing and defensive processing: a cultural examination.

    Science.gov (United States)

    Ko, Deborah M; Kim, Heejung S

    2010-01-01

    Past research has shown that health messages on safer sexual practices that focus on relational consequences are more persuasive than messages that focus on personal consequences. However, we theorize that it is defensiveness against personal risk framing that threatens the self among people from more individualistic cultures. Two studies tested this idea. Study 1 showed that European Americans were less persuaded by personal framing than by relational framing but that this pattern was not found for Asian Americans, who are more collectivistic. Study 2 showed that these defensive patterns were eliminated among European American participants when a person's self-image was affirmed. These results suggest defensive processes as the mechanism behind the differences in message framing effectiveness and motivate a closer look at cultural patterns.

  15. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  16. CXCR1 regulates pulmonary anti-Pseudomonas host defense

    Science.gov (United States)

    Carevic, M.; Öz, H.; Fuchs, K.; Laval, J.; Schroth, C.; Frey, N.; Hector, A.; Bilich, T.; Haug, M.; Schmidt, A.; Autenrieth, S. E.; Bucher, K.; Beer-Hammer, S.; Gaggar, A.; Kneilling, M.; Benarafa, C.; Gao, J.; Murphy, P.; Schwarz, S.; Moepps, B.; Hartl, D.

    2016-01-01

    Pseudomonas aeruginosa is a key opportunistic pathogen causing disease in cystic fibrosis (CF) and other lung diseases such as chronic obstructive pulmonary disease (COPD). However, the pulmonary host defense mechanisms regulating anti-Pseudomonas aeruginosa immunity remain incompletely understood. Here we demonstrate, by studying an airway Pseudomonas aeruginosa infection model, in vivo bioluminescence imaging, neutrophil effector responses and human airway samples, that the chemokine receptor CXCR1 regulates pulmonary host defense against Pseudomonas aeruginosa. Mechanistically, CXCR1 regulated anti-Pseudomonas neutrophil responses through modulation of reactive oxygen species and interference with toll-like receptor 5 expression. These studies define CXCR1 as a novel non-canonical chemokine receptor that regulates pulmonary anti-Pseudomonas host defense with broad implications for CF, COPD and other infectious lung diseases. PMID:26950764

  17. Study of General health, resiliency, and defense mechanisms in patients with migraine headache

    Directory of Open Access Journals (Sweden)

    Alireza Aghayusefi

    2013-06-01

    Full Text Available Background: Migraine is a neurological disease that the etiology, several factors affect its onset or its exacerbation. One of the factors affecting disease is psychological factors such as defense mechanisms, resiliency, and general health. This study assessed the relationship between general health, resiliency, and general defense mechanisms, and also predicts the general health of people with migraine headaches that have a high resiliency and use mature defense mechanisms. Material and Methods: 50 women with migraine headache in the city of Bushehr using defense mechanisms, resiliency, and general health questionnaires were studied. For statistical analysis, Pearson correlation and multiple regression tests were used by SPSS 17 software. Results: The results showed that most of the defense mechanisms of migraine sufferers are Immature and Neuroticism. There is significant negative correlation between the deterioration of general health and resiliency as well as the mature defense mechanism (p=0/003, and also there is a significant positive correlation between this deterioration with neuroticism (p=0/040 and immature defense mechanisms (p=0/041. On the other hand there is significant negative correlation between resiliencies with immature (p=0/009 and neuroticism defense mechanisms (p=0/04, and also with mature defense mechanism has a significant positive correlation (p=0/003. Also, as more people use the mature defense mechanism, their deterioration of general health will be reduced, but this relationship will be stronger with the presence of resiliency. So migraine people use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health. Conclusion: This study showed that migraine patients use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health.

  18. Defense AT&L (Volume 37, Number 1, January-February 2008)

    Science.gov (United States)

    2008-02-01

    Senate, he serves as the senior advisor to the secretary of defense on testing Department of Defense weapon systems, and prescribing policies and...including several commands. As general, his final assign- ment was the senior air defense advisor to the chief of staff of the Army. His awards...by going to <www. usajobs.gov>. For more details, see the USA Staffing Ap- plication Manager’s online help at <http://eshelp.opm. gov/ robo /projects

  19. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  20. Light-dependent expression of flg22-induced defense genes in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Satoshi eSano

    2014-10-01

    Full Text Available Chloroplasts have been reported to generate retrograde immune signals that activate defense gene expression in the nucleus. However, the roles of light and photosynthesis in plant immunity remain largely elusive. In this study, we evaluated the effects of light on the expression of defense genes induced by flg22, a peptide derived from bacterial flagellins which acts as a potent elicitor in plants. Whole-transcriptome analysis of flg22-treated Arabidopsis thaliana seedlings under light and dark conditions for 30 min revealed that a number of (30% genes strongly induced by flg22 (>4.0 require light for their rapid expression, whereas flg22-repressed genes include a significant number of genes that are down-regulated by light. Furthermore, light is responsible for the flg22-induced accumulation of salicylic acid, indicating that light is indispensable for basal defense responses in plants. To elucidate the role of photosynthesis in defense, we further examined flg22-induced defense gene expression in the presence of specific inhibitors of photosynthetic electron transport: 3-(3,4-dichlorophenyl-1,1-dimethylurea (DCMU and 2,5-dibromo-3-methyl-6-isopropyl-benzoquinone (DBMIB. Light-dependent expression of defense genes was largely suppressed by DBMIB, but only partially suppressed by DCMU. These findings suggest that photosynthetic electron flow plays a role in controling the light-dependent expression of flg22-inducible defense genes.

  1. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  2. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  3. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  4. Vaginal orgasm is associated with less use of immature psychological defense mechanisms.

    Science.gov (United States)

    Brody, Stuart; Costa, Rui Miguel

    2008-05-01

    Freud implied a link between inability to have a vaginal orgasm and psychosexual immaturity. Since Kinsey, many sexologists have asserted that no such link exists. However, empirical testing of the issue has been lacking. The objective was to determine the relationship between different sexual behavior triggers of female orgasm and use of immature psychological defense mechanisms. Women reported their past month frequency of different sexual behaviors and corresponding orgasm rates and completed the Defense Style Questionnaire (DSQ-40). The association between ability to have vaginal intercourse orgasm (versus clitoral orgasm) and the use of DSQ-40 immature psychological defense mechanisms (associated with various psychopathologies) was examined. In a sample of 94 healthy Portuguese women, vaginal orgasm (triggered solely by penile-vaginal intercourse) was associated with less use of DSQ-40 immature defenses. Vaginal orgasm was associated with less somatization, dissociation, displacement, autistic fantasy, devaluation, and isolation of affect. Orgasm from clitoral stimulation or combined clitoral-intercourse stimulation was not associated with less use of immature defenses, and was associated with more use of some immature defenses. In one regression analysis, more masturbation and less vaginal orgasm consistency made independent contributions to the statistical prediction of immature defenses. In another regression analysis, any use of extrinsic clitoral stimulation for intercourse orgasm, and lack of any vaginal orgasm, made independent contributions to the statistical prediction of immature defenses. Vaginally anorgasmic women had immature defenses scores comparable to those of established (depression, social anxiety disorder, panic disorder, and obsessive-compulsive disorder) outpatient psychiatric groups. Results were not confounded by social desirability responding or relationship quality. The results linking penile-vaginal orgasm with less use of immature

  5. Risk assessment in international operations

    International Nuclear Information System (INIS)

    Stricklin, Daniela L.

    2008-01-01

    During international peace-keeping missions, a diverse number of non-battle hazards may be encountered, which range from heavily polluted areas, endemic disease, toxic industrial materials, local violence, traffic, and even psychological factors. Hence, elevated risk levels from a variety of sources are encountered during deployments. With the emphasis within the Swedish military moving from national defense towards prioritization of international missions in atypical environments, the risk of health consequences, including long term health effects, has received greater consideration. The Swedish military is interested in designing an optimal approach for assessment of health threats during deployments. The Medical Intelligence group at FOI CBRN Security and Defence in Umea has, on request from and in collaboration with the Swedish Armed Forces, reviewed a variety of international health threat and risk assessment models for military operations. Application of risk assessment methods used in different phases of military operations will be reviewed. An overview of different international approaches used in operational risk management (ORM) will be presented as well as a discussion of the specific needs and constraints for health risk assessment in military operations. This work highlights the specific challenges of risk assessment that are unique to the deployment setting such as the assessment of exposures to a variety of diverse hazards concurrently

  6. 48 CFR 225.7016 - Restriction on Ballistic Missile Defense research, development, test, and evaluation.

    Science.gov (United States)

    2010-10-01

    ... Missile Defense research, development, test, and evaluation. 225.7016 Section 225.7016 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS... Acquisition 225.7016 Restriction on Ballistic Missile Defense research, development, test, and evaluation. [68...

  7. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  8. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    information accurately and in conformance with Generally Accepted Accounting Principles , to comply with Congressional requirements of the Chief Financial ...2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting

  9. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  10. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  11. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  12. International Conflict Studies as a Research and Teaching Area

    Directory of Open Access Journals (Sweden)

    Alexandra Viktorovna Khudaykulova

    2015-12-01

    Full Text Available The article analyzes international conflict studies as a science and an educational discipline. The analysis of the subject field and professional terminology adopted in this area both in Russian and in English is provided. Formation of international conflict studies as a distinct field of study in the United States and Western Europe is described. The results of analysis of 10 leading foreign schools on international conflict studies are presented. The main factors that were taken into account in identifying the leading centers were the existence of a separate research (educational analysis units of international conflicts, the world's leading scientific journals on conflict resolution, as well as databases for the analysis of international conflicts. The role of professional associations, education consortia and international organizations (UNESCO in the study of international conflicts is described. An analysis of the leading think tanks on defense and national security (as rated by Philadelphia think tank ranking is also provided. Particular attention is given to interdisciplinary research methodology of international conflicts and the structure of educational programs at leading schools in the world in international relations. The author summarizes the recommendations of the Association of Professional Schools of International Affairs (APSIA to create educational programs of this kind.

  13. 76 FR 45543 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of Visitors, Defense Language Institute Foreign Language Center meeting scheduled for August 3 and 4, 2011...

  14. Distinct roles of jasmonates and aldehydes in plant-defense responses.

    Directory of Open Access Journals (Sweden)

    E Wassim Chehab

    Full Text Available BACKGROUND: Many inducible plant-defense responses are activated by jasmonates (JAs, C(6-aldehydes, and their corresponding derivatives, produced by the two main competing branches of the oxylipin pathway, the allene oxide synthase (AOS and hydroperoxide lyase (HPL branches, respectively. In addition to competition for substrates, these branch-pathway-derived metabolites have substantial overlap in regulation of gene expression. Past experiments to define the role of C(6-aldehydes in plant defense responses were biased towards the exogenous application of the synthetic metabolites or the use of genetic manipulation of HPL expression levels in plant genotypes with intact ability to produce the competing AOS-derived metabolites. To uncouple the roles of the C(6-aldehydes and jasmonates in mediating direct and indirect plant-defense responses, we generated Arabidopsis genotypes lacking either one or both of these metabolites. These genotypes were subsequently challenged with a phloem-feeding insect (aphids: Myzus persicae, an insect herbivore (leafminers: Liriomyza trifolii, and two different necrotrophic fungal pathogens (Botrytis cinerea and Alternaria brassicicola. We also characterized the volatiles emitted by these plants upon aphid infestation or mechanical wounding and identified hexenyl acetate as the predominant compound in these volatile blends. Subsequently, we examined the signaling role of this compound in attracting the parasitoid wasp (Aphidius colemani, a natural enemy of aphids. PRINCIPAL FINDINGS: This study conclusively establishes that jasmonates and C(6-aldehydes play distinct roles in plant defense responses. The jasmonates are indispensable metabolites in mediating the activation of direct plant-defense responses, whereas the C(6-aldehyes are not. On the other hand, hexenyl acetate, an acetylated C(6-aldehyde, is the predominant wound-inducible volatile signal that mediates indirect defense responses by directing tritrophic

  15. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior

  16. Adversity Quotient and Defense Mechanism of Secondary School Students

    Science.gov (United States)

    Nikam, Vibhawari B.; Uplane, Megha M.

    2013-01-01

    The present study was conducted to explore the relationship between Adversity Quotient (AQ) and Defense Mechanism (DM) of secondary school students. The aim of the study was to ascertain relationship between Adversity Quotient and Defense mechanism i. e. Turning against object (TAO), Projection (PRO), Turning against self (TAS), Principalisation…

  17. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  18. Proceedings of the international topical meeting on nuclear and hazardous waste management

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    This book contains the proceedings of the 1988 International Topical Meeting on Nuclear and Hazardous Waste Management. Included are the following articles: Defense radioactive waste management: status and challenges, Secrets of successful siting legislation for low-level radioactive waste disposal facilities, A generic hazardous waste management training program, Status of industry standards for decommissioning of nuclear facilities

  19. Peptidoglycan from Fermentation By-Product Triggers Defense Responses in Grapevine

    Science.gov (United States)

    Chen, Yang; Takeda, Taito; Aoki, Yoshinao; Fujita, Keiko; Suzuki, Shunji; Igarashi, Daisuke

    2014-01-01

    Plants are constantly under attack from a variety of microorganisms, and rely on a series of complex detection and response systems to protect themselves from infection. Here, we found that a by-product of glutamate fermentation triggered defense responses in grapevine, increasing the expression of defense response genes in cultured cells, foliar chitinase activity, and resistance to infection by downy mildew in leaf explants. To identify the molecule that triggered this innate immunity, we fractionated and purified candidates extracted from Corynebacterium glutamicum, a bacterium used in the production of amino acids by fermentation. Using hydrolysis by lysozyme, a silkworm larva plasma detection system, and gel filtration analysis, we identified peptidoglycan as inducing the defense responses. Peptidoglycans of Escherichia coli, Bacillus subtilis, and Staphylococcus aureus also generated similar defensive responses. PMID:25427192

  20. Early Family Relationships Predict Children’s Emotion Regulation and Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Jallu Lindblom

    2016-12-01

    Full Text Available Early family relationships have been suggested to influence the development of children’s affect regulation, involving both emotion regulation and defense mechanisms. However, we lack research on the specific family predictors for these two forms of affect regulation, which have been conceptualized to differ in their functions and accessibility to consciousness. Accordingly, we examine how the (a quality and (b timing of family relationships during infancy predict child’s later emotion regulation and defense mechanisms. Parents (N = 703 reported autonomy and intimacy in marital and parenting relationships at the child’s ages of 2 and 12 months, and the child’s use of emotion regulation and immature and neurotic defenses at 7 to 8 years. As hypothesized, the results showed that functional early family relationships predicted children’s efficient emotion regulation, whereas dysfunctional relationships predicted reliance on defense mechanisms in middle childhood. Further, results showed a timing effect for neurotic defenses, partially confirming our hypothesis of early infancy being an especially important period for the development of defense mechanisms. The findings are discussed from the viewpoints of attachment and family dynamics, emotional self-awareness, and sense of security.

  1. 76 FR 39076 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-05

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 3 and 4, 2011. Time of Meeting...

  2. 75 FR 43496 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 10 and 11, 2010. Time of Meeting...

  3. 77 FR 62223 - Board of Visitors Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2012-10-12

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: October 31, 2012 and November 1, 2012...

  4. Multiple Identified Neurons and Peripheral Nerves Innervating the Prothoracic Defense Glands in Stick Insects Reveal Evolutionary Conserved and Novel Elements of a Chemical Defense System

    Directory of Open Access Journals (Sweden)

    Johannes Strauß

    2017-11-01

    Full Text Available The defense glands in the dorsal prothorax are an important autapomorphic trait of stick insects (Phasmatodea. Here, we study the functional anatomy and neuronal innervation of the defense glands in Anisomorpha paromalus (Westwood, 1859 (Pseudophasmatinae, a species which sprays its defense secretions when disturbed or attacked. We use a neuroanatomical approach to identify the nerves innervating the gland muscles and the motoneurons with axons in the different nerves. The defense gland is innervated by nerves originating from two segments, the subesophageal ganglion (SOG, and the prothoracic ganglion. Axonal tracing confirms the gland innervation via the anterior subesophageal nerve, and two intersegmental nerves, the posterior subesophageal nerve, and the anterior prothoracic nerve. Axonal tracing of individual nerves reveals eight identified neuron types in the subesophageal or prothoracic ganglion. The strongest innervating nerve of the gland is the anterior subesophageal nerve, which also supplies dorsal longitudinal thorax muscles (neck muscles by separate nerve branches. Tracing of individual nerve branches reveals different sets of motoneurons innervating the defense gland (one ipsilateral and one contralateral subesophageal neuron or the neck muscle (ventral median neurons. The ipsilateral and contralateral subesophageal neurons have no homologs in related taxa like locusts and crickets, and thus evolved within stick insects with the differentiation of the defense glands. The overall innervation pattern suggests that the longitudinal gland muscles derived from dorsal longitudinal neck muscles. In sum, the innervating nerves for dorsal longitudinal muscles are conserved in stick insects, while the neuronal control system was specialized with conserved motoneurons for the persisting neck muscles, and evolutionarily novel subesophageal and prothoracic motoneurons innervating the defense gland.

  5. Mises’s Defense of Liberty: A Critique

    Directory of Open Access Journals (Sweden)

    Sean Parr

    2010-11-01

    Full Text Available What this paper attempts to demonstrate is that, in his treatise Liberalism, Mises’s defense of liberty is incomplete because his reasoning in favor of liberty for all is–not of a moral, but–exclusively of an economic kind. Without a moral justification, Mises’s defense–once the aim of productivity has been abandoned–is forced to affirm with cold indifference that a society of slaves is no better or worse than one of free men. There exists a more comprehensive defense

  6. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  7. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli

    2012-01-01

    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources...... of Arabidopsis thaliana, coupled with 39 years of field data on aphid abundance, to (i) demonstrate that geographic patterns in a polymorphic defense locus (GS-ELONG) are strongly correlated with changes in the relative abundance of two specialist aphids; and (ii) demonstrate differential selection by the two...... aphids on GS-ELONG, using a multigeneration selection experiment. We thereby show a causal link between variation in abundance of the two specialist aphids and the geographic pattern at GS-ELONG, which highlights the potency of natural enemies as selective forces....

  8. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  9. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  10. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  11. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  12. 76 FR 21705 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-04-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... that closed meetings of the Department of Defense Wage Committee will be held on Tuesday, May 3, 2011... detailed wage data to be considered were obtained from officials of private establishments with a guarantee...

  13. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  14. INSTITUTIONAL BASIS OF MANAGEMENT AND EVALUATION OF UKRAINIAN DEFENSE LANDS

    Directory of Open Access Journals (Sweden)

    Garazhа Y.P

    2017-02-01

    Full Text Available The management and evaluation of defense land was revealed in the article. Specific institution is the military institutе in the institutional framework for defense land. A special regime and zoning, evaluation, payment and exclusion conditions were established for these lands. The market economy has changed the land-property relations in the country. Lands for defense used only in the framework that established the state. Recently there was a tendency of land release this subcategory. This has led to their misuse, belonging to other owners. The research problem consists of the setting clear boundaries of defense land and legal regulation mechanisms of land relations. Public ownership rights applies only to the defense lands. They are located only in the state ownership. The subject is the state that implements ownership (right to possess, use and dispose of the lands of Defense. It ensures the defense of the country and territory for military sites, airfields, parts, ammunition depots. Functional use of defense land is divided into public (military schools, socio-cultural (health centers, recreation centers, industrial (military and industrial objects, residential (cantonment, commercial (commissary, special (military installations, transport ( carpark, bridges, engineering (antennas, radars, storage (defense deport. The land for military unit were given for permanent use with the justification of the project design documentation sizes. The military part of the land for permanent use with the justification sizes by the project design documentation. Safety, security and other areas are created around military and other defense installations. There are restricted areas, prohibited areas. They have a special regime. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real estate. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real

  15. 75 FR 47797 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-08-09

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of... be held on September 13 & 14, 2010 from 8 a.m. to 5 p.m. at the Defense Language Institute Foreign...

  16. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  17. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  18. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  19. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  20. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  1. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  2. Jasmonate is essential for insect defense in Arabidopsis.

    Science.gov (United States)

    McConn, M; Creelman, R A; Bell, E; Mullet, J E; Browse, J

    1997-05-13

    The signaling pathways that allow plants to mount defenses against chewing insects are known to be complex. To investigate the role of jasmonate in wound signaling in Arabidopsis and to test whether parallel or redundant pathways exist for insect defense, we have studied a mutant (fad3-2 fad7-2 fad8) that is deficient in the jasmonate precursor linolenic acid. Mutant plants contained negligible levels of jasmonate and showed extremely high mortality ( approximately 80%) from attack by larvae of a common saprophagous fungal gnat, Bradysia impatiens (Diptera: Sciaridae), even though neighboring wild-type plants were largely unaffected. Application of exogenous methyl jasmonate substantially protected the mutant plants and reduced mortality to approximately 12%. These experiments precisely define the role of jasmonate as being essential for the induction of biologically effective defense in this plant-insect interaction. The transcripts of three wound-responsive genes were shown not to be induced by wounding of mutant plants but the same transcripts could be induced by application of methyl jasmonate. By contrast, measurements of transcript levels for a gene encoding glutathione S-transferase demonstrated that wound induction of this gene is independent of jasmonate synthesis. These results indicate that the mutant will be a good genetic model for testing the practical effectiveness of candidate defense genes.

  3. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  4. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  5. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  6. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  7. Transcripts of Regional Hearings, St. Louis, Missouri. Annex L to Adjusting to the Drawdown. Report of the Defense Conversion Commission

    Science.gov (United States)

    1992-08-01

    entrepreneurship courses for laid-off McDonnell Douglas employees. Over 500 have participated in the classes. • McDonnell Douglas donated its lease-hold...international programs and organizations • Analysis of regional financing programs The St. Louis World Trade Center franchise was acquired for the region...averaged over the 1970’s, the defense cutbacks are likely contribute only a small part of that objective. 2 38 7 Figure 5.3 REAL GDP BASE VS

  8. Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for Naval Station Treasure Island, California

    Science.gov (United States)

    1994-05-19

    the audit of two projects: P-608T, Building Modifications, valued at...Island, California, to the Naval Training Center Great Lakes, Illinois. The audit also evaluated the implementation of the DoD Internal Management...related to the two projects in this report and is discussed in Report No. 94-109, Quick-Reaction Report on the Audit of Defense Base Realignment and Closure Budget Data for the Naval Training Center Great Lakes, Illinois, May 19,

  9. Final Report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas

    Science.gov (United States)

    1990-09-18

    This is our final report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas (DCMR... audit was made from January to October 1989. The objectives of the audit were to determine the timeliness of the contract closeout process, the validity...As part of the audit , we also evaluated internal controls over the contract closeout process. As of December 31, 1988, the Contract Administration

  10. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  11. How to optimize joint theater ballistic missile defense

    OpenAIRE

    Diehl, Douglas D.

    2004-01-01

    Approved for public release, distribution is unlimited Many potential adversaries seek, or already have theater ballistic missiles capable of threatening targets of interest to the United States. The U.S. Missile Defense Agency and armed forces are developing and fielding missile interceptors carried by many different platforms, including ships, aircraft, and ground units. Given some exigent threat, the U.S. must decide where to position defensive platforms and how they should engage poten...

  12. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  13. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  14. International Context during and after World War II

    Directory of Open Access Journals (Sweden)

    A S Protopopov

    2015-12-01

    Full Text Available The author examines the international context of the Soviet Union and today's Russia during and after the World War II. Relations between the allies (the USSR, the US and the UK shortly after the end of World War II «gave a crack». Particular attention is paid to the development of the American nuclear program in an international context and objectives of the nuclear bombing of Japan, the expansion of NATO. The author concludes that the problem of military and economic development in the post-war period were largely dictated by the difficult international situation at that time. The Soviet Union was forced not only to establish a peaceful life, but also to take steps to create its own nuclear weapons and their means of delivery, strengthening the country's defense. After the troubled times of the second half of the 1980s and 1990s, in the XXI century Russia again began to strengthen its international position. The author proves the need for a consistent foreign policy.

  15. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  16. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    pronounced at intermediate environmental conditions. Optimizing single traits generally leads to a more pronounced response of the defense traits, which implies that studying single traits leads to an overestimation of their response to predation. Behavioral defense and morphological defense compensate......Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  17. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  18. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  19. 2003 annual report. Information and health, defense, energy

    International Nuclear Information System (INIS)

    2004-01-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  20. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).