WorldWideScience

Sample records for nonproliferation advanced defense

  1. Review and comment on the advanced spent fuel management process (1): Technical aspects and non-proliferation concerns

    Energy Technology Data Exchange (ETDEWEB)

    Song, Yo Taik

    2001-01-01

    Efforts are made to analyze the project, the Advanced Spent Fuel Management Technology (ASFMT), which is currently carried out at Korea Atomic Energy Research Institute, on the technical feasibility and validity as well as on the nuclear non-proliferation concerns. The project is a part of a program under the 'Long and Midterm Nuclear Development Program'. On the technical analysis, reviewed the papers presented at the national and international meetings on the subject by KAERI staffs, and also participated to various technical discussions on the 'Mock-up Test', currently in progress. On the non-proliferation concerns, the ASFMT project was reviewed and analyzed in reference to various programs currently in progress or in a formulation stages in US, such as the DOE TOPS and ATW. Further reviewed the past JASNEC process and programs for possible application of the ASFMT project for JASNEC project. Provided a few thoughts for effectively carrying out the ASFMT project, and a plan for the next phase is presented.

  2. Nuclear Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Atkins-Duffin, C E

    2008-12-10

    With an explosion equivalent of about 20kT of TNT, the Trinity test was the first demonstration of a nuclear weapon. Conducted on July 16, 1945 in Alamogordo, NM this site is now a Registered National Historic Landmark. The concept and applicability of nuclear power was demonstrated on December 20, 1951 with the Experimental Breeder Reactor Number One (EBR-1) lit four light bulbs. This reactor is now a Registered National Historic Landmark, located near Arco, ID. From that moment forward it had been clearly demonstrated that nuclear energy has both peaceful and military applications and that the civilian and military fuel cycles can overlap. For the more than fifty years since the Atoms for Peace program, a key objective of nuclear policy has been to enable the wider peaceful use of nuclear energy while preventing the spread of nuclear weapons. Volumes have been written on the impact of these two actions on the world by advocates and critics; pundits and practioners; politicians and technologists. The nations of the world have woven together a delicate balance of treaties, agreements, frameworks and handshakes that are representative of the timeframe in which they were constructed and how they have evolved in time. Collectively these vehicles attempt to keep political will, nuclear materials and technology in check. This paper captures only the briefest abstract of the more significant aspects on the Nonproliferation Regime. Of particular relevance to this discussion is the special nonproliferation sensitivity associated with the uranium isotope separation and spent fuel reprocessing aspects of the nuclear fuel cycle.

  3. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... ADMINISTRATION Webinar About Advanced Defense Technologies RFP AGENCY: U.S. Small Business Administration (SBA). ACTION: Notice of open webinar meeting to discuss Advanced Defense Technologies (ADT) Request for... webinar it is hosting to answer questions from potential Offerors about the Advanced Defense...

  4. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of... Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense. Statements, opinions... Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016

  5. Nonproliferation Graduate Fellowship Program Annual Report: Class of 2011

    Energy Technology Data Exchange (ETDEWEB)

    McMakin, Andrea H.

    2012-08-20

    Annual report for the Nonproliferation Graduate Fellowship Program (NGFP), which PNNL administers for the National Nuclear Security Administration (NNSA). Features the Class of 2011. The NGFP is a NNSA program with a mission to cultivate future technical and policy leaders in nonproliferation and international security. Through the NGFP, outstanding graduate students with career interests in nonproliferation are appointed to program offices within the Office of Defense Nuclear Nonproliferation (DNN). During their one-year assignment, Fellows participate in programs designed to detect, prevent, and reverse the proliferation of nuclear weapons.

  6. World Nonproliferation Regime

    Institute of Scientific and Technical Information of China (English)

    Ouyang Liping; Wu Xingzuo

    2007-01-01

    2006 witnessed an intense struggle between nuclear proliferation and nonproliferation. Iran's nuclear issue and North Korea's nuclear test have cast a deep shadow over the current international nonproliferation regime. The international contest for civil nuclear development became especially fierce as global energy prices went up. Such a situation , to some extent, accelerated the pace of nuclear proliferation. Furthermore, the existing international nonproliferation regime, based upon the Nuclear Nonproliferation Treaty (NPT), was affected by loopholes, and the U.S. failed in its ambition to unite other forces to mend fences. The international community needs to come up with a comprehensive and long-term strategy to meet the demand for an effective future nonproliferation regime in a healthy nuclear order.

  7. Defense Advanced Research Projects Agency Strategic Plan

    Science.gov (United States)

    2007-02-01

    Autonomous Language Exploitation ...................................................................... 33 Figure 35: Bio-inspired "Big Dog" quadruped robot is... Acqusition , Technology and the United States, while creating Logistics Kenneth J. Krieg technological surprise for our • Under Secretaryof Defense for...working to maintain our global lead in this technology (Section 3.7). " Real-Time Accurate Language Translation: real-time machine language

  8. Leveraging U.S. nuclear weapons policy to advance U.S. nonproliferation goals : implications of major theories of international relations.

    Energy Technology Data Exchange (ETDEWEB)

    Walter, Andrew

    2009-06-01

    National policymakers are currently considering a dilemma of critical importance to the continued security of the United States: how can U.S. nuclear weapons policies be leveraged to benefit U.S. nuclear nonproliferation goals in the near-term, without sacrificing U.S. national security? In its role supporting U.S. nuclear weapons policy, Sandia National Laboratories has a responsibility to provide objective technical advice to support policy deliberations on this question. However, to best fulfill this duty Sandia must have a broader understanding of the context of the problem. To help develop this understanding, this paper analyzes the two predominant analytical perspectives of international relations theory to explore their prescriptions for how nuclear weapons and nonproliferation policies interact. As lenses with which to view and make sense of the world, theories of international relations must play a crucial role in framing the trade-offs at the intersection of the nuclear weapons and nonproliferation policy domains. An analysis of what these theories suggest as courses of action to leverage nuclear weapons policies to benefit nonproliferation goals is then offered, with particular emphasis on where the policy prescriptions resulting from the respective theories align to offer near-term policy changes with broad theoretical support. These policy prescriptions are then compared to the 2001 Nuclear Posture Review to understand what the theories indicate policymakers may have gotten right in their dealing with the nuclear dilemma, and where they may have gone wrong. Finally, a brief international relations research agenda is proposed to help address the dilemma between nuclear deterrence and nuclear nonproliferation policies, with particular emphasis on how such an agenda can best support the needs of the policy community and a potential 'all things nuclear' policy deliberation and decision-support framework.

  9. Chemical and biological nonproliferation program. FY99 annual report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    This document is the first of what will become an annual report documenting the progress made by the Chemical and Biological Nonproliferation Program (CBNP). It is intended to be a summary of the program's activities that will be of interest to both policy and technical audiences. This report and the annual CBNP Summer Review Meeting are important vehicles for communication with the broader chemical and biological defense and nonproliferation communities. The Chemical and Biological Nonproliferation Program Strategic Plan is also available and provides additional detail on the program's context and goals. The body of the report consists of an overview of the program's philosophy, goals and recent progress in the major program areas. In addition, an appendix is provided with more detailed project summaries that will be of interest to the technical community.

  10. Robust Indicators of Nonproliferation Performance

    Energy Technology Data Exchange (ETDEWEB)

    Cowan, Mara R.; Kurzrok, Andrew J.

    2014-02-13

    Understanding how the nuclear industry may benefit from self-regulation is closely linked with understanding how to report compliance activities for nonproliferation and export control objectives, as well as how to distinguish high and low compliance performance. Drawing on the corporate sustainability reporting model, nuclear and dual-use commodities industries can frame socially responsible self-regulatory activities to distinguish themselves as good nonproliferators.

  11. Broadening Industry Governance to Include Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Hund, Gretchen; Seward, Amy M.

    2008-11-11

    As industry is the first line of defense in detecting and thwarting illicit trade networks, the engagement of the private sector is critical to any government effort to strengthen existing mechanisms to protect goods and services throughout the supply chain. This study builds on previous PNNL work to continue to evaluate means for greater industry engagement to complement and strengthen existing governmental efforts to detect and stem the trade of illicit goods and to protect and secure goods that could be used in making a weapon of mass destruction. Specifically, the study evaluates the concept of Industry Self Regulation, defined as a systematic voluntary program undertaken by an industry or by individual companies to anticipate, implement, supplement, or substitute for regulatory requirements in a given field, generally through the adoption of best practices. Through a series of interviews with companies with a past history of non-compliance, trade associations and NGOs, the authors identify gaps in the existing regulatory infrastructure, drivers for a self regulation approach and the form such an approach might take, as well as obstacles to be overcome. The authors conclude that it is at the intersection of industry, government, and security that—through collaborative means—the effectiveness of the international nonproliferation system—can be most effectively strengthened to the mutual benefit of both government and the private sector. Industry has a critical stake in the success of this regime, and has the potential to act as an integrating force that brings together the existing mechanisms of the global nonproliferation regime: export controls, physical protection, and safeguards. The authors conclude that industry compliance is not enough; rather, nonproliferation must become a central tenant of a company’s corporate culture and be viewed as an integral component of corporate social responsibility (CSR).

  12. Nonproliferation Challenges in Space Defense Technology - PANEL

    Science.gov (United States)

    Houts, Michael G.

    2016-01-01

    The use of highly enriched uranium (HEU) almost always "helps" space fission systems. Nuclear Thermal Propulsion (NTP) and high power fission electric systems appear able to use Proliferation Objectives While Simultaneously Helping Enable the Development and Utilization of Modern Space Fission Power and Propulsion Systems?

  13. Law, Policy and Nonproliferation Project Events and Workshops: Key Themes, Results and Related Materials 2008 - 2009

    Science.gov (United States)

    2010-04-01

    Coast Guard Deborah Berman Monterey Institute James Martin Center for Nonproliferation Studies Chris Bidwell Defense Threat Reduction Agency James...ATTENDEES NAME ORGANIZATION Thomas Appel Booz Allen Hamilton Deborah Berman Monterey Institute for International Studies Chris Bidwell Defense...not credible and that preemptive selfdefense was true ground for action). 108. See generally Harold D. Lasswell & Myres S. McDougal, Jurisprudence

  14. Management Principles for Nonproliferation Organizations

    Energy Technology Data Exchange (ETDEWEB)

    Frazar, Sarah L.; Hund, Gretchen

    2012-03-06

    This paper identifies business models and six management principles that can be applied by a nonproliferation organization to maximize the value and effectiveness of its products. The organizations responsible for reducing the nuclear proliferation threat have experienced a substantial growth in responsibility and visibility since the September 11 attacks. Since then, the international community has witnessed revelations of clandestine nuclear facilities, nuclear black markets, periodic nuclear tests, and a resurgence of interest by countries worldwide in developing nuclear capabilities. The security environment will likely continue to evolve in unexpected ways since most of the proliferation threats with which the world will be forced to contend remain unforeseen. To better prepare for and respond to this evolving security environment, many nonproliferation organizations are interested in finding new or better ways to increase the effectiveness and efficiency of their operations. Of course, all organizations, whether they are market driven or non-profit, must operate effectively and efficiently if they are to succeed. Indeed, as this study demonstrates, many of the management principles that this study recommends can help all organizations succeed. However, this study pays particular attention to nonproliferation organizations because of the mission they are responsible for fulfilling. Nonproliferation organizations, including nonproliferation programs that operate within a larger national security organization, are responsible for reducing the threat of nuclear, chemical and biological weapons. These organizations have an enduring mandate from the public and the international community not to fail in the completion of their mission for failure could have detrimental impacts on international security, public health and the environment. Moreover, the public expects nonproliferation organizations and programs to fulfill their mission, even when resources are limited

  15. Prospects for advancing defense to cereal rusts through genetical genomics.

    Science.gov (United States)

    Ballini, Elsa; Lauter, Nick; Wise, Roger

    2013-01-01

    Rusts are one of the most severe threats to cereal crops because new pathogen races emerge regularly, resulting in infestations that lead to large yield losses. In 1999, a new race of stem rust, Puccinia graminis f. sp. tritici (Pgt TTKSK or Ug99), was discovered in Uganda. Most of the wheat and barley cultivars grown currently worldwide are susceptible to this new race. Pgt TTKSK has already spread northward into Iran and will likely spread eastward throughout the Indian subcontinent in the near future. This scenario is not unique to stem rust; new races of leaf rust (Puccinia triticina) and stripe rust (Puccinia striiformis) have also emerged recently. One strategy for countering the persistent adaptability of these pathogens is to stack complete- and partial-resistance genes, which requires significant breeding efforts in order to reduce deleterious effects of linkage drag. These varied resistance combinations are typically more difficult for the pathogen to defeat, since they would be predicted to apply lower selection pressure. Genetical genomics or expression Quantitative Trait Locus (eQTL) analysis enables the identification of regulatory loci that control the expression of many to hundreds of genes. Integrated deployment of these technologies coupled with efficient phenotyping offers significant potential to elucidate the regulatory nodes in genetic networks that orchestrate host defense responses. The focus of this review will be to present advances in genetical genomic experimental designs and analysis, particularly as they apply to the prospects for discovering partial disease resistance alleles in cereals.

  16. A Digest of Nonproliferation Literature.

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, Ruth A

    2006-04-01

    In preparation for the 2005 US/Russian Weapons Laboratories Directors Meeting, the six laboratories participating in the meeting endeavored to develop a strategy for nonproliferation technology research and development. A literature review was conducted to identify possible areas of technical collaboration and technology opportunities associated with improving nonproliferation associated with the civilian nuclear fuel cycle. The issue of multinationalization of the nuclear fuel cycle was also researched. This digest is the compilation of one-page summaries used by management of the three US nuclear weapons laboratories in preparation for strategy development. Where possible, the Web site address of the complete paper is referenced.3 AcknowledgementsThe author wishes to thank Jessica Ruyle, Nancy Orlando-Gay, and Barbara Dry for their research assistance and contributions.4

  17. 75 FR 28672 - Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures...

    Science.gov (United States)

    2010-05-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Bureau of International Security and Nonproliferation; Lifting of Nonproliferation Measures Against Two... measures on two Russian entities. DATES: Effective Date: May 21, 2010. FOR FURTHER INFORMATION CONTACT...

  18. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  19. Workshop on nuclear power growth and nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2010-01-01

    It is widely viewed that an expansion of nuclear power would have positive energy, economic and environmental benefits for the world. However, there are concerns about the economic competitiveness, safety and proliferation and terrorism risks of nuclear power. The prospects for a dramatic growth in nuclear power will depend on the ability of governments and industry to address these concerns, including the effectiveness of, and the resources devoted to, plans to develop and implement technologies and approaches that strengthen nonproliferation, nuclear materials accountability and nuclear security. In his Prague speech, President Obama stated: 'we should build a new framework for civil nuclear cooperation, including an international fuel bank, so that countries can access peaceful power without increasing the risks of proliferation. That must be the right of every nation that renounces nuclear weapons, especially developing countries embarking on peaceful programs. And no approach will succeed if it's based on the denial of rights to nations that play by the rules. We must harness the power of nuclear energy on behalf of our efforts to combat climate change, and to advance peace opportunity for all people.' How can the President's vision, which will rekindle a vigorous public debate over the future of nuclear power and its relation to proliferation, be realized? What critical issues will frame the reemerging debate? What policies must be put into place to address these issues? Will US policy be marked more by continuity or change? To address these and other questions, the Los Alamos National Laboratory in cooperation with the Woodrow Wilson International Center for Scholars will host a workshop on the future of nuclear power and nonproliferation.

  20. Nuclear World Order and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Joeck, N

    2007-02-05

    The decision by India and Pakistan in May 1998 to conduct nuclear weapon tests and declare themselves as nuclear weapon states challenged South Asian regional stability calculations, US nonproliferation policy, and prevailing assumptions about international security. A decade later, the effects of those tests are still being felt and policies are still adjusting to the changed global conditions. This paper will consider non- and counter-proliferation policy options for the United States and Pakistan as they work as partners to prevent the transfer of nuclear technology and further nuclear proliferation.

  1. Latin America`s emerging non-proliferation consensus

    Energy Technology Data Exchange (ETDEWEB)

    Redick, J.R.

    1994-03-01

    Latin America`s incorporation into the international nuclear non-proliferation regime is well advanced. The 1967 Tlatelolco Treaty, which established a regional nuclear-weapon-free zone (NWFZ), is nearing completion. A signal event occurred January 18, when Argentina and Chile deposited instruments of ratification to the treaty, leaving Brazil and Cuba the only major countries in Latin America that are not yet contracting parties. And after more than two decades of concern about the nuclear programs and policies in Argentina and Brazil, there is room for great optimism that Brazil may now be moving quickly on important non-proliferation issues. Even Cuba, the {open_quotes}bad boy of the neighborhood{close_quotes} in the eyes of many, which held aloof from the Tlatelolco process for three decades, has stated its willingness to join the zone in the future.

  2. Handbook for nuclear non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Wook; Oh, Keun Bae; Lee, Kwang Seok; Lee, Dong Jin; Ko, Han Seok

    1997-05-01

    This book analyzed international non-proliferation regime preventing from spread of nuclear weapon. This book took review from the historical background of non-proliferation regime to the recent changes and status. The regime, here, is divided into multilateral and bilateral regime. First of all, this book reports four multilateral treaties concluded for non-proliferation such as NPT, NWFZ, CTBT and others. Secondly, international organization and regimes concerned with non-proliferation are analyzed with emphasis of UN, IAEA, ZC and NSG, Regional Safeguards System and international conference. Finally, this book report the current circumstances of nuclear cooperation agreement related with Korea which is an important means for bilateral regime. (author). 13 tabs., 2 figs.

  3. Attacks and their Defenses for Advanced Metering Infrastructure

    DEFF Research Database (Denmark)

    Lighari, Sheeraz Niaz; Hussain, Dil Muhammad Akbar; Bak-Jensen, Birgitte

    2014-01-01

    The smart grid is the digitized, modernized, updated version of archaic traditional electric grid. Advanced Metering Infrastructure (AMI) is an imperative part of the smart grid. It has replaced legacy metering, as it reports the energy consumption to the utility automatically through communication...... channels. AMI is also featuring to communicate control functions from utility to the smart meters. So, both the consumption data and control data needs to be securely transmitted to their ends. Any leak and tempering may produce the dire effects to both utility and consumers. Hence security of AMI...

  4. Technical solutions to nonproliferation challenges

    Science.gov (United States)

    Satkowiak, Lawrence

    2014-05-01

    The threat of nuclear terrorism is real and poses a significant challenge to both U.S. and global security. For terrorists, the challenge is not so much the actual design of an improvised nuclear device (IND) but more the acquisition of the special nuclear material (SNM), either highly enriched uranium (HEU) or plutonium, to make the fission weapon. This paper provides two examples of technical solutions that were developed in support of the nonproliferation objective of reducing the opportunity for acquisition of HEU. The first example reviews technologies used to monitor centrifuge enrichment plants to determine if there is any diversion of uranium materials or misuse of facilities to produce undeclared product. The discussion begins with a brief overview of the basics of uranium processing and enrichment. The role of the International Atomic Energy Agency (IAEA), its safeguard objectives and how the technology evolved to meet those objectives will be described. The second example focuses on technologies developed and deployed to monitor the blend down of 500 metric tons of HEU from Russia's dismantled nuclear weapons to reactor fuel or low enriched uranium (LEU) under the U.S.-Russia HEU Purchase Agreement. This reactor fuel was then purchased by U.S. fuel fabricators and provided about half the fuel for the domestic power reactors. The Department of Energy established the HEU Transparency Program to provide confidence that weapons usable HEU was being blended down and thus removed from any potential theft scenario. Two measurement technologies, an enrichment meter and a flow monitor, were combined into an automated blend down monitoring system (BDMS) and were deployed to four sites in Russia to provide 24/7 monitoring of the blend down. Data was downloaded and analyzed periodically by inspectors to provide the assurances required.

  5. NATO and nonproliferation: A critical appraisal

    Energy Technology Data Exchange (ETDEWEB)

    Dembinski, M.; Kelle, A.; Mueller, H.

    1994-04-01

    This paper analyses NATO`s past, actual and potential impact on the nonproliferation regime. It starts by looking back at the useful function NATO has performed throughout its existence in discouraging motivations by its non-nuclear weapon member-states from going nuclear. It then asks whether that role is likely to continue. The study goes on to ask whether NATO`s doctrine and practice may also pose risks to the regime, and investigates what benefits and risks may emerge from future counterproliferation activities. In conclusion, the paper suggests a modest but useful contribution NATO could make to strengthen the nonproliferation regime, provided major flaws are avoided. (orig.)

  6. Arms control and nonproliferation technologies: The non-proliferation experiment. First quarter 1994

    Energy Technology Data Exchange (ETDEWEB)

    Staehle, G.; Stull, S.; Talaber, C. [eds.

    1994-05-01

    In this issue of Arms Control and Nonproliferation Technologies we present the initial findings of the recent Non-Proliferation Experiment (NPE), conducted by the Department of Energy at the Nevada Test Site. Through an introduction and pictorial walk-through, Marv Denny and Jay Zucca of Lawrence Livermore National Laboratory describe the overall experiment. This is followed by scientific and technical abstracts of the complex suite of experiments and analyses, which were presented at the Symposium on Non-Proliferation Experiment Results and Implications for Test Ban Treaties, April 19--21, 1994. Questions regarding the ongoing analysis and conclusions from the NPE should be directed to Leslie Casey in the Office of Research and Development within the Office of Nonproliferation and National Security of DOE. Her phone number is 202-586-2151.

  7. Goals, Objectives, and Requirements (GOR) of the Ground-based Nuclear Detonation Detection (GNDD) Team for the Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D)

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    2014-01-13

    The goal, objectives, and requirements (GOR) presented in this document define a framework for describing research directed specifically by the Ground-based Nuclear Detonation Detection (GNDD) Team of the National Nuclear Security Administration (NNSA). The intent of this document is to provide a communication tool for the GNDD Team with NNSA management and with its stakeholder community. It describes the GNDD expectation that much of the improvement in the proficiency of nuclear explosion monitoring will come from better understanding of the science behind the generation, propagation, recording, and interpretation of seismic, infrasound, hydroacoustic, and radionuclide signals and development of "game-changer" advances in science and technology.

  8. Goals, Objectives, and Requirements (GOR) of the Ground-based Nuclear Detonation Detection (GNDD) Team for the Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D)

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    2014-01-13

    The goal, objectives, and requirements (GOR) presented in this document define a framework for describing research directed specifically by the Ground-based Nuclear Detonation Detection (GNDD) Team of the National Nuclear Security Administration (NNSA). The intent of this document is to provide a communication tool for the GNDD Team with NNSA management and with its stakeholder community. It describes the GNDD expectation that much of the improvement in the proficiency of nuclear explosion monitoring will come from better understanding of the science behind the generation, propagation, recording, and interpretation of seismic, infrasound, hydroacoustic, and radionuclide signals and development of "game-changer" advances in science and technology.

  9. DETERMINATION OF RELATIVE IMPORTANCE OF NONPROLIFERATION FACTORS

    Energy Technology Data Exchange (ETDEWEB)

    Richard Metcalf

    2009-07-01

    Methodologies to determine the proliferation resistance (PR) of nuclear facilities often rely on either expert elicitation, a resource-intensive approach without easily reproducible results, or numeric evaluations, which can fail to take into account the institutional knowledge and expert experience of the nonproliferation community. In an attempt to bridge the gap and bring the institutional knowledge into numeric evaluations of PR, a survey was conducted of 33 individuals to find the relative importance of a set of 62 nonproliferation factors, subsectioned into groups under the headings of Diversion, Transportation, Transformation, and Weaponization. One third of the respondents were self-described nonproliferation professionals, and the remaining two thirds were from secondary professions related to nonproliferation, such as industrial engineers or policy analysts. The factors were taken from previous work which used multi-attribute utility analysis with uniform weighting of attributes and did not include institutional knowledge. In both expert and non-expert groups, all four headings and the majority of factors had different relative importance at a confidence of 95% (p=0.05). This analysis and survey demonstrates that institutional knowledge can be brought into numeric evaluations of PR, if there is a sufficient investment of resources made prior to the evaluation.

  10. Systems resilience : a new analytical framework for nuclear nonproliferation.

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian Leigh

    2011-12-01

    This paper introduces the concept of systems resilience as a new framework for thinking about the future of nonproliferation. Resilience refers to the ability of a system to maintain its vital functions in the face of continuous and unpredictable change. The nonproliferation regime can be viewed as a complex system, and key themes from the literature on systems resilience can be applied to the nonproliferation system. Most existing nonproliferation strategies are aimed at stability rather than resilience, and the current nonproliferation system may be over-constrained by the cumulative evolution of strategies, increasing its vulnerability to collapse. The resilience of the nonproliferation system can be enhanced by diversifying nonproliferation strategies to include general international capabilities to respond to proliferation and focusing more attention on reducing the motivation to acquire nuclear weapons in the first place. Ideas for future research, include understanding unintended consequences and feedbacks among nonproliferation strategies, developing methodologies for measuring the resilience of the nonproliferation system, and accounting for interactions of the nonproliferation system with other systems on larger and smaller scales.

  11. Arms control and nonproliferation technologies. First quarter 1995

    Energy Technology Data Exchange (ETDEWEB)

    Staehle, G; Alonzo, G M; Sanford, N M [eds.

    1995-01-01

    This first quarter issue for 1995 highlights the Small Business Innovation Research (SBIR) program. The SBIR program is managed by the DOE`s Basic Energy Sciences program within the Office of Energy Research. Each year, the SBIR program solicits research ideas of interest to the DOE. Articles contained in this issue include: The Small Business Innovation Research Program supported by the Office of Nonproliferation and National Security; Automated cueing to man-made objects via multispectral image; Security systems get smart with advanced processing and thermal imaging; A breakthrough in cooling system technology; The APSTNG neutron probe; Lithium-doped fullerene neutron detector; Miniature GC-MS for on-site chemical analysis; and Winner of Sandia President`s Quality Award.

  12. Lessons learned from U.S. Department of Defense 911-Bio Advanced Concept Technology Demonstrations.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T.; Gasper, W.; Lacher, L.; Newsom, D.; Yantosik, G.

    1999-07-06

    The US Department of Defense (DoD), in cooperation with other federal agencies, has taken many initiatives to improve its ability to support civilian response to a domestic biological terrorism incident. This paper discusses one initiative, the 911-Bio Advanced Concept Technology Demonstrations (ACTDs), conducted by the Office of the Secretary of Defense during 1997 to better understand: (1) the capability of newly developed chemical and biological collection and identification technologies in a field environment; (2) the ability of specialized DoD response teams to use these new technologies within the structure of cooperating DoD and civilian consequence management organizations; and (3) the adequacy of current modeling tools for predicting the dispersal of biological hazards. This paper discusses the experience of the ACTDs from the civilian community support perspective. The 911-Bio ACTD project provided a valuable opportunity for DoD and civilian officials to learn how they should use their combined capabilities to manage the aftermath of a domestic biological terrorism incident.

  13. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2014-12-01

    Full Text Available Here we report on the issue of Advanced Persistent Threats (APT, which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

  14. Advanced sensors, telecommunications and data processing: Technological spin-offs from the Strategic Defense Initiative

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.L.

    1986-10-01

    While the details of Nitze Criteria-satisfying architectures for defense against strategic attack with ballistic missiles are still being worked out, it is already clear that quite advanced sensors, telecommunications and data processing technologies will be features of all of them. It is concluded that the SDI, due to its institutional youthfulness, its charter for large-scale research and its self-evident need for such technologies, is likely to dominate many aspects of these technology development areas during the next two decades, especially if it continues more-or-less as the current American Administration contemplates. Both the technical and the economic aspects of data-gathering and manipulation seem likely to be substantially enhanced, due to the existence of the SDI.

  15. Developing Effluent Analysis Technologies to Support Nonproliferation Initiatives, Arms Control and Nonproliferation Technologies, Third quarter 1995

    Energy Technology Data Exchange (ETDEWEB)

    Schubert, S A; Staehle, G; Alonzo, G M [eds.

    1995-01-01

    This issue provides an overview of the Effluent Research Program of the DOE Office of Research and Development, highlighting a number of representative projects within this program in support of nonproliferation initiatives. Technologies reported include portable instruments for on-site inspections, standoff detectors, fieldable, real-time instruments, field collection techniques, and ultrasensitive laboratory techniques.

  16. Nuclear Nonproliferation Ontology Assessment Team Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Strasburg, Jana D.; Hohimer, Ryan E.

    2012-01-01

    Final Report for the NA22 Simulations, Algorithm and Modeling (SAM) Ontology Assessment Team's efforts from FY09-FY11. The Ontology Assessment Team began in May 2009 and concluded in September 2011. During this two-year time frame, the Ontology Assessment team had two objectives: (1) Assessing the utility of knowledge representation and semantic technologies for addressing nuclear nonproliferation challenges; and (2) Developing ontological support tools that would provide a framework for integrating across the Simulation, Algorithm and Modeling (SAM) program. The SAM Program was going through a large assessment and strategic planning effort during this time and as a result, the relative importance of these two objectives changed, altering the focus of the Ontology Assessment Team. In the end, the team conducted an assessment of the state of art, created an annotated bibliography, and developed a series of ontological support tools, demonstrations and presentations. A total of more than 35 individuals from 12 different research institutions participated in the Ontology Assessment Team. These included subject matter experts in several nuclear nonproliferation-related domains as well as experts in semantic technologies. Despite the diverse backgrounds and perspectives, the Ontology Assessment team functioned very well together and aspects could serve as a model for future inter-laboratory collaborations and working groups. While the team encountered several challenges and learned many lessons along the way, the Ontology Assessment effort was ultimately a success that led to several multi-lab research projects and opened up a new area of scientific exploration within the Office of Nuclear Nonproliferation and Verification.

  17. Evolution and resilience of the nuclear nonproliferation regime

    Energy Technology Data Exchange (ETDEWEB)

    Pregenzer, Arian L. [Senior Scientist, Retired, Sandia National Laboratories, 13013 Arroyo de Vista NE, Albuquerque, NM 87111 (United States)

    2014-05-09

    This paper introduces the concept of systems resilience as a new framework for thinking about the future of the nonproliferation regime. Resilience refers to the ability of a system to maintain its vital functions in the face of continuous and unpredictable change. First, I make the case that the nonproliferation regime can be viewed as a complex system. Next, I discuss key themes from the literature on systems resilience and apply them to the nonproliferation system: the difference between resilience and stability; the need for evolution to maintain function; the importance of functional diversity; and the concept of the adaptive cycle. I show that most existing nonproliferation strategies are aimed at stability rather than resilience and that the current nonproliferation system may be over-constrained by the cumulative evolution of strategies. According to the literature on systems resilience, this increases its vulnerability to collapse. I argue that the resilience of the nonproliferation system can be enhanced by increasing international participation in setting the nonproliferation agenda, developing general international response capabilities, focusing on non-coercive approaches to decreasing demand, and applying systems thinking more rigorously to nonproliferation.

  18. The Nuclear Nonproliferation Treaty in Context

    Science.gov (United States)

    Davenport, Kelsey

    2017-01-01

    The 1968 Nuclear Nonproliferation Treaty (NPT) is the cornerstone of multilateral efforts to prevent the spread of nuclear weapons and promote efforts toward complete disarmament. In the grand bargain of the NPT, states foreswore pursuit of nuclear weapons in exchange for access to nuclear technology and limited nuclear arsenals to the five states (China, France, Russia, the United Kingdom and the United States) that tested such weapons before the NPT's conception. Now in its seventh decade, the NPT regime is embraced by the vast majority of the world's nations and is viewed as a critical element of international security. However, despite past successes in halting efforts in several states to pursue nuclear weapons, near universal adherence, and only one withdrawal (North Korea), the NPT regime is at a critical crossroads. The treaty has proven unable to adapt to new challenges, such as emerging technologies that threaten operational strategic realities, the devolution of state authority to non-state actors and institutions, and growing dissatisfaction with slow pace of nuclear disarmament. Additionally, the treaty leaves open critical questions, including whether or not state parties have the `right' to pursue technologies that allow for domestic production of fuels for nuclear reactors and if modernization programs for nuclear warheads are inconsistent with the treaty. If these questions remain unresolved, the international community will find itself ill prepared to confront emerging proliferation challenges and the NPT, the linchpin of international nonproliferation and disarmament efforts, may begin to erode.

  19. Preparation for the Nuclear Non-Proliferation Treaty Extension Conference in 1995. Workshop summary

    Energy Technology Data Exchange (ETDEWEB)

    Chrzanowski, P.L.

    1993-05-07

    About 30 specialists in non-proliferation participated in a workshop to explore ideas for US Government preparatory steps leading to the 1995 Nuclear Non-Proliferation Treaty (NPT) Extension Conference. To that end, workshop sessions were devoted to reviewing the lessons learned from previous Review Conferences, discussing the threats to the non-proliferation regime together with ways of preserving and strengthening it, and examining the management of international nuclear commerce. A fundamental premise shared by workshop participants was that extension of the NPT is immensely important to international security. The importance of stemming proliferation and, more specifically, extending the Treaty, is growing as a result of the significant changes in the world. If the conferees of the Extension Conference decide on no extension or extension for a short limited duration, some technically advanced states that have foregone development of nuclear weapons may begin to rethink their options. Also, other arms control measures, such as the Chemical Weapons Convention, could start to unravel. The US must provide strong international leadership to ensure that the Extension Conference is a success, resulting in Treaty extension, perhaps through successive terms, into the indefinite future. Workshop participants were struck by the urgent need for the US to take organizational steps so that it is highly effective in its advance preparations for the Extension Conference. Moreover, the Extension Conference provides both a challenge and an opportunity to mold a cohesive set of US policy actions to define the future role of nuclear weapons and combat their proliferation.

  20. The Nuclear Non-Proliferation Policy of the Obama Administration

    Energy Technology Data Exchange (ETDEWEB)

    Baek, Jin Hyun; Hwang, Ji Hwan [Haesung International Problem Ethics Research Institute, Seoul (Korea, Republic of)

    2009-12-15

    The objective of this study is to analyze and foresee trends of international nuclear non-proliferation regimes focused on the nuclear non-proliferation policy of the Obama administration, and suggest national policy directions which promote utilization and development of nuclear energy in Korea. For the effective and efficient implementation of the national nuclear use and development program in current international nuclear environment, many efforts should be made: to actively and positively participate in the international nuclear non-proliferation regime; to strengthen nuclear diplomacy in a more systematic manner; and to strengthen the international nuclear cooperation

  1. Nuclear Deterrence in the Age of Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Richardson, J

    2009-01-21

    The fallacy of zero nuclear weapons, even as a virtual goal, is discussed. Because the complete abolition of nuclear weapons is not verifiable, nuclear weapons will always play a role in the calculus of assure, dissuade, deter and defeat (ADDD). However, the relative contribution of nuclear weapons to international security has diminished. To reconstitute the Cold War nuclear capability, with respect to both the nuclear weapons capability and their associated delivery systems, is fiscally daunting and not warranted due to competing budgetary pressures and their relative contribution to international security and nonproliferation. A proposed pathway to a sustainable nuclear weapons capability end-state is suggested which provides enough ADDD; a Dyad composed of fewer delivery and weapon systems, with trickle production at the National Laboratories and private sector to maintain capability and guard against technological surprise.

  2. Linear-drive cryocoolers for the Department of Defense standard advanced dewar assembly (SADA)

    Science.gov (United States)

    Tate, Garin S.

    2005-05-01

    The Standard Advanced Dewar Assembly (SADA) is the critical module in the Department of Defense (DoD) standardization of scanning second-generation thermal imaging systems. The DoD has established a family of SADAs to fulfill a range of performance requirements for various platforms. The SADA consists of the Infrared Focal Plane Array (IRFPA), Dewar, Command & Control Electronics (C&CE), and the cryogenic cooler, and is used in platforms such as the Apache helicopter, the M1A2 Abrams main battle tank, the M2 Bradley Infantry Fighting Vehicle, and the Javelin Command Launch Unit (CLU). In support of the family of SADAs, the DoD defined a complementary family of tactical linear drive cryocoolers. The Stirling cycle linear drive cryocoolers are utilized to cool the Infrared Focal Plane Arrays (IRFPAs) in the SADAs. These coolers are required to have low input power, a quick cool-down time, low vibration output, low audible noise, and a higher reliability than currently fielded rotary coolers. These coolers must also operate in a military environment with its inherent high vibration level and temperature extremes. This paper will (1) outline the characteristics of each cryocooler, (2) present the status and results of qualification tests, (3) present the status of production efforts, and (4) present the status of efforts to increase linear drive cooler reliability.

  3. The evolution of advanced mechanical defenses and potential technological applications of diatom shells.

    Science.gov (United States)

    Hamm, Christian E

    2005-01-01

    Diatoms are unicellular algae with silicified cell walls, which exhibit a high degree of symmetry and complexity. Their diversity is extraordinarily high; estimates suggest that about 10(5) marine and limnic species may exist. Recently, it was shown that diatom frustules are mechanically resilient, statically sophisticated structures made of a tough glass-like composite. Consequently, to break the frustules, predators have to generate large forces and invest large amounts of energy. In addition, they need feeding tools (e.g., mandibles or gastric mills) which are hard, tough, and resilient enough to resist high stress and wear, which are bound to occur when they feed on biomineralized objects such as diatoms or other biomineralized protists. Indeed, many copepods feeding on diatoms possess, in analogy to the enamelcoated teeth of mammals, amazingly complex, silica-laced mandibles. The highly developed adaptations both to protect and to break diatoms indicate that selection pressure is high to optimize material properties and the geometry of the shells to achieve mechanical strength of the overall structure. This paper discusses the mechanical challenges which force the development of mechanical defenses, and the structural components of the diatom frustules which indicate that evolutionary optimization has led to mechanically sophisticated structures. Understanding the diatom frustule from the nanometer scale up to the whole shell will provide new insights to advanced combinations of nanostructured composite ceramic materials and lightweight architecture for technological applications.

  4. IAEA safeguards and non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Harry, R.J.S.

    1995-02-01

    An overview is given of efforts to contain the nuclear weapons proliferation during half a century of man-controlled nuclear fission. An initial policy of denial did not work, a following period of cooperation needed a gradual strengthening of international assurances on the peaceful character of the flourishing use of nuclear techniques for power generation and of other applications. The focus of the nuclear weapon proliferation concern changed from the highly developed states to developing states. The Non-Proliferation Treaty laid the basis for a unique system of voluntarily accepted international inspections to verify the peaceful use of nuclear energy. The IAEA got the task to implement this `Full Scope Safeguards` on all nuclear material and all nuclear activities in the non-nuclear weapon states. Thanks to the structure of the IAEA, in which both proponent and states with a critical attitude take part in the decision making process on the IAEA execution of its tasks, a balanced, and widely acceptable system emerged. International developments necessitated additional improvements of the non-proliferation system. The increase of strength of sub-national groups triggered international cooperation on physical protection, about a quarter of a century ago. More recently, it appeared that NPT states with assumed nuclear weapon ambitions operated in the margins between the interpretation of IAEA safeguards and the spirit and purpose of NPT. Improvements of the IAEA safeguards and a stronger cooperation between states, including the constraints which exporting states have imposed on nuclear supplies, strengthen the safeguards system. The important reductions in the two largest nuclear weapon arsenals lead, together with the delay in the fast breeder implementation, to large stockpiles of nuclear weapon usable materials. Also in this areas new internationally credible assurances have to be obtained, that these materials will never return to nuclear weapon applications.

  5. Nuclear Nonproliferation Policy Issues in the 103rd Congress

    Science.gov (United States)

    2016-03-24

    North Korea Former Soviet Weapons President Clinton’s Address to the U.N. Federal Organization for Nonproliferation Counterproliferation Export ...Nonproliferation Policy Congress Weapon International North Korea Former Soviet Union Clinton Counterproliferation Export Control Short Long Term Issue Pages: 14...include: (1) proliferation efforts. These include the North Korea’s violation of its NPT obliga- agreement by Argentina and Brazil to allow tions; (2

  6. Modeling and Simulation for Safeguards and Nonproliferation Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Gilligan, Kimberly V. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Kirk, Bernadette Lugue [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    The Modeling and Simulation for Safeguards and Nonproliferation Workshop was held December 15–18, 2014, at Oak Ridge National Laboratory. This workshop was made possible by the Next Generation Safeguards Initiative Human Capital Development (NGSI HCD) Program. The idea of the workshop was to move beyond the tried-and-true boot camp training of nonproliferation concepts to spend several days on the unique perspective of applying modeling and simulation (M&S) solutions to safeguards challenges.

  7. Development of nonproliferation and assessment scenarios.

    Energy Technology Data Exchange (ETDEWEB)

    Finley, Melissa; Barnett, Natalie Beth

    2005-10-01

    The overall objective of the Nonproliferation and Assessments Scenario Development project is to create and analyze potential and plausible scenarios that would lead to an adversary's ability to acquire and use a biological weapon. The initial three months of funding was intended to be used to develop a scenario to demonstrate the efficacy of this analysis methodology; however, it was determined that a substantial amount of preliminary data collection would be needed before a proof of concept scenario could be developed. We have dedicated substantial effort to determine the acquisition pathways for Foot and Mouth Disease Virus, and similar processes will be applied to all pathogens of interest. We have developed a biosecurity assessments database to capture information on adversary skill locales, available skill sets in specific regions, pathogen sources and regulations involved in pathogen acquisition from legitimate facilities. FY06 funding, once released, will be dedicated to data collection on acquisition, production and dissemination requirements on a pathogen basis. Once pathogen data has been collected, scenarios will be developed and scored.

  8. The Future of Nonproliferation in a Changed and Changing Environment: A Workshop Summary

    Energy Technology Data Exchange (ETDEWEB)

    Dreicer, M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-08-30

    The Center for Global Security Research and Global Security Principal Directorate at Lawrence Livermore National Laboratory convened a workshop in July 2016 to consider “The Future of Nonproliferation in a Changed and Changing Security Environment.” We took a broad view of nonproliferation, encompassing not just the treaty regime but also arms control, threat reduction, counter-­proliferation, and countering nuclear terrorism. We gathered a group of approximately 60 experts from the technical, academic, political, defense and think tank communities and asked them what—and how much—can reasonably be accomplished in each of these areas in the 5 to 10 years ahead. Discussion was on a not-­for-­attribution basis. This document provides a summary of key insights and lessons learned, and is provided to help stimulate broader public discussion of these issues. It is a collection of ideas as informally discussed and debated among a group of experts. The ideas reported here are the personal views of individual experts and should not be attributed to Lawrence Livermore National Laboratory.

  9. 76 FR 68809 - Bureau of International Security and Nonproliferation; Termination of Chemical and Biological...

    Science.gov (United States)

    2011-11-07

    ... Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign... CONTACT: Pamela K. Durham, Office of Missile, Biological, and Chemical Nonproliferation, Bureau of... government, project, or entity in its efforts to acquire chemical or biological weapons capability:...

  10. Security Guarantees and Nuclear Non-Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Bruno Tertrais

    2011-07-01

    The purpose of this paper is to discuss the value of 'security guarantees', that is, positive security assurances that include a formal or informal defense commitment, in preventing nuclear proliferation. It demonstrates that such guarantees have proven to be a very effective instrument in preventing States from going nuclear. It would thus seem logical to reinforce or extend them. However, this path is fraught with obstacles and dilemmas

  11. Nonproliferation Graduate Fellowship Program, Annual Report, Class of 2012

    Energy Technology Data Exchange (ETDEWEB)

    McMakin, Andrea H.

    2013-09-23

    This 32-pp annual report/brochure describes the accomplishments of the Class of 2012 of the Nonproliferation Graduate Fellowship Program (the last class of this program), which PNNL administers for the National Nuclear Security Administration. The time period covers Sept 2011 through June 2013.

  12. Former Nonproliferation Graduate Fellow Served at U.S. Mission

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.

    2014-10-01

    Because of her training and professional experiences, Rosalyn Leitch, a Security Specialist at Pacific Northwest National Laboratory and former Nonproliferation Graduate Fellow with NIS (2012-2013) was able to transition into temporary assignment as UNVIE Acting Nuclear Security Attaché from November 2013 through February 2014.

  13. University-level Non-proliferation and Safeguards Education and Human Capital Development Activities at Brookhaven National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bachner K. M.; Pepper, S.; Gomera, J.; Einwechter, M.; Toler, L. T.

    2016-07-24

    BNL has offered Nuclear Nonproliferation, Safeguards and Security in the 21st Century,? referred to as NNSS, every year since 2009 for graduate students in technical and policy fields related to nuclear safeguards and nonproliferation. The course focuses on relevant policy issues, in addition to technical components, and is part of a larger NGSI short course initiative that includes separate courses that are delivered at three other national laboratories and NNSA headquarters. [SCHOLZ and ROSENTHAL] The course includes lectures from esteemed nonproliferation experts, tours of various BNL facilities and laboratories, and in-field and table-top exercises on both technical and policy subjects. Topics include the history of the Treaty on the Non-proliferation of Nuclear Weapons (NPT) and other relevant treaties, the history of and advances in international nuclear safeguards, current relevant political situations in countries such as Iran, Iraq, and the Democratic Peoples? Republic of Korea (DPRK), nuclear science and technology, instrumentation and techniques used for verification activities, and associated research and development. The students conduct a mock Design Information Verification (DIV) at BNL?s decommissioned Medical Research Reactor. The capstone of the course includes a series of student presentations in which students act as policy advisors and provide recommendations in response to scenarios involving a current nonproliferation related event that are prepared by the course organizers. ?The course is open to domestic and foreign students, and caters to students in, entering, or recently having completed graduate school. Interested students must complete an application and provide a resume and a statement describing their interest in the course. Eighteen to 22 students attend annually; 165 students have completed the course to date. A stipend helps to defray students? travel and subsistence expenses. In 2015, the course was shortened from three weeks to

  14. Nonproliferation and safeguards aspects of the DUPIC fuel cycle concept

    Energy Technology Data Exchange (ETDEWEB)

    Persiani, P. K. [Argonne National Lab., IL (United States)

    1997-07-01

    The purpose of the study is to comment on the proliferation characteristic profiles of some of the proposed fuel cycle alternatives to help ensure that nonproliferation concerns are introduced into the early stages of a fuel cycle concept development program, and to perhaps aid in the more effective implementation of the international nonproliferation regime initiative and safeguards systems. Alternative recycle concepts proposed by several countries involve the recycle of spent fuel without the separation of plutonium from uranium and fission products. The concepts are alternatives to either the direct long-term storage deposition of or the purex reprocessing of the spent fuels. The alternate fuel cycle concepts reviewed include: the dry-recycle processes such as the direct use of reconfigured PWR spent fuel assemblies into CANDU reactors(DUPIC); low-decontamination, single-cycle co-extraction of fast reactor fuels in a wet-purex type of reprocessing; and on a limited scale the thorium-uranium fuel cycle. The nonproliferation advantages usually associated with the above non-separation processes are: the highly radioactive spent fuel presents a barrier to the physical diversion of the nuclear material; avoid the need to dissolve and chemically separate the plutonium from the uranium and fission products; and that the spent fuel isotopic quality of the plutonium vector is further degraded. Although the radiation levels and the need for reprocessing may be perceived as barriers to the terrorist or the subnational level of safeguards, the international level of nonproliferation concerns is addressed primarily by material accountancy and verification activities. On the international level of nonproliferation concerns, the non-separation fuel cycle concepts involved have to be evaluated on the bases of the impact the processes may have on nuclear materials accountancy. (author).

  15. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the

  16. Recent advances in the molecular genetics of resin biosynthesis and genetic engineering strategies to improve defenses in conifers

    Institute of Scientific and Technical Information of China (English)

    TANGWei

    2003-01-01

    Since the first terpenoid synthase cDNA was obtained by the reverse genetic approach from grand fir, great pro-gress in the molecular genetics of terpenoid formation has been made with angiosperms and genes encoding a monoterpene synthase, a sesquiterpene synthase, and a diterpene synthase. Tree killing bark beetles and their vectored fungal pathogens are the most destructive agents of conifer forests worldwide. Conifers defend against attack by the constitutive and inducible production of oleoresin that accumulates at the wound site to kill invaders and both flush and seal the injury. Although toxic to the bark beetle and fungal pathogen, oleoresin also plays a central role in the chemical ecology of these boring insects. Re-cent advances in the molecular genetics of terpenoid biosynthesis provide evidence for the evolutionary origins of oleoresin and permit consideration of genetic engineering strategies to improve conifer defenses as a component of modern forest bio-technology. This review described enzymes of resin biosynthesis, structural feathers of genes genomic intron and exon or-ganization, pathway organization and evolution, resin production and accumulation, interactions between conifer and bark beetle, and engineering strategies to improve conifer defenses.

  17. Defense Advanced Research Projects Agency Properly Awarded Contracts for Disc-Rotor Research and Development

    Science.gov (United States)

    2013-07-19

    Boeing. Contract Solicitation DARPA personnel properly issued BAA 06-15, “DARPA Tactical Technology Office ( TTO ),” to solicit proposals for advanced R...technology. The BAA 06-15 published on the Federal Business Opportunities website https://www.fedbizopps.gov, stated that DARPA TTO personnel would...submission. DARPA contracting personnel provided letters of “Discouraged” to 122 white papers submissions based on the relevance to the TTO mission

  18. An Introduction to Nuclear Non-Proliferation and Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Haakansson, Ane; Jonter, Thomas

    2007-06-15

    The purpose of this project was to compile a course material that covers how the nuclear safeguards system has emerged and how it works today. The produced compendium is directed to both university students and people concerned by safeguards from the industry. The primary aim of the first part of this paper is to describe the historical development of this global non-proliferation system and its central tasks. A second purpose is to discuss the advantages and disadvantages of its current design in order to answer the following question: Can we today say that we have a functioning global non-proliferation system? Does it require further strengthening, and, if so, how can this be achieved? In the second section we review the verification regime within nuclear safeguards, i. e. describe the methods and techniques that are available to reassure the world community that concluded treaties are adhered to

  19. The international nuclear non-proliferation system: Challenges and choices

    Energy Technology Data Exchange (ETDEWEB)

    Simpson, J.; McGrew, A.G.

    1984-01-01

    When a topic has been under discussion for almost 40 years there is a danger that the literature will become excessively esoteric and that, as Philip Grummett suggests, '...a new scholasticism will arise' (p.79). Originating in a November l982 seminar co-sponsored by the British International Studies Association and the Foreign and Commonwealth Office, this volume is a refreshing, well conceived, and well written antidote to that trend. It is also well timed for the 1985 NPT Review Conference. The eight chapters of the volume are divided into three sections. Following an introduction by Anthony McGrew that touches on all the major themes of the volume, the first section deals with the existing non-proliferation system. In three chapters the historical, institutional and policy-making elements of the present system are outlined. There is a vignette on the Nuclear Suppliers Group in Wilmshurst's chapter one (pp. 28-33). Fischer's informative chapter on the IAEA is followed by Gummett's examination of policy options, including, for example, the linking of conventional weapons transfer to non-proliferation policies. The second section, also of three chapters, examines current issues: the state of the international nuclear industry, and the non-proliferation policies of the United States and Britain. Walker's chapter focuses chiefly on change in the industry-from monopoly to pluralism in suppliers, the effect of the economic recession, and the combined effect of these two factors on international politics. Devine's American non-proliferation chapter is a statement of the State Department view, whilst Keohane's chapter on Britain attempts to put the Trident procurement into a proliferation context. The British chapter is present because of ethnocentric considerations.

  20. INTEGRATION OF FACILITY MODELING CAPABILITIES FOR NUCLEAR NONPROLIFERATION ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    Gorensek, M.; Hamm, L.; Garcia, H.; Burr, T.; Coles, G.; Edmunds, T.; Garrett, A.; Krebs, J.; Kress, R.; Lamberti, V.; Schoenwald, D.; Tzanos, C.; Ward, R.

    2011-07-18

    Developing automated methods for data collection and analysis that can facilitate nuclear nonproliferation assessment is an important research area with significant consequences for the effective global deployment of nuclear energy. Facility modeling that can integrate and interpret observations collected from monitored facilities in order to ascertain their functional details will be a critical element of these methods. Although improvements are continually sought, existing facility modeling tools can characterize all aspects of reactor operations and the majority of nuclear fuel cycle processing steps, and include algorithms for data processing and interpretation. Assessing nonproliferation status is challenging because observations can come from many sources, including local and remote sensors that monitor facility operations, as well as open sources that provide specific business information about the monitored facilities, and can be of many different types. Although many current facility models are capable of analyzing large amounts of information, they have not been integrated in an analyst-friendly manner. This paper addresses some of these facility modeling capabilities and illustrates how they could be integrated and utilized for nonproliferation analysis. The inverse problem of inferring facility conditions based on collected observations is described, along with a proposed architecture and computer framework for utilizing facility modeling tools. After considering a representative sampling of key facility modeling capabilities, the proposed integration framework is illustrated with several examples.

  1. Nonproliferation, Nuclear Security, and the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  2. On the U.S. Post-Cold War Non-proliferation Policy

    Institute of Scientific and Technical Information of China (English)

    Liu; Zikui

    2014-01-01

    Since the end of the Cold War, the importance of non-proliferation of weapons of mass destruction(WMD) has been enhanced constantly in the U.S. national security strategy and on the agenda of the U.S. foreign policy, and non-proliferation gradually has becomes one of its most important policy objectives. As the sole superpower, the U.S. non-proliferation policy has not only influenced and changed the international non-proliferation regime dramatically, but also greatly affected the non-proliferation effect of the international community. To prevent WMD proliferation, the United States has to abandon the practice of selective non-proliferation, group politics, prejudice on different ideologies and social systems, and maintenance of the U.S. hegemony. While pursuing its and allies interests, it must also attach great importance to other countries interests.

  3. Report of a workshop on nuclear forces and nonproliferation Woodrow Wilson international center for scholars, Washington, DC October 28, 2010

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2010-12-08

    A workshop sponsored by the Los Alamos National Laboratory in cooperation with the Woodrow Wilson International Center for Scholars was held at the Wilson Center in Washington, DC, on October 28, 2010. The workshop addressed evolving nuclear forces and their impacts on nonproliferation in the context of the new strategic environment, the Obama Administration's Nuclear Posture Review and the 2010 NPT Review Conference. The discussions reflected the importance of the NPR for defining the role of US nuclear forces in dealing with 21st century threats and providing guidance for National Nuclear Security Administration (NNSA) and Department of Defense (DoD) programs and, for many but not all participants, highlighted its role in the successful outcome of the NPT RevCon. There was widespread support for the NPR and its role in developing the foundations for a sustainable nuclear-weapon program that addresses nuclear weapons, infrastructure and expertise in the broader nonproliferation, disarmament and international security contexts. However, some participants raised concerns about its implementation and its long-term effectiveness and sustainability.

  4. Considerations on nonproliferation regime meeting in a changing world

    Energy Technology Data Exchange (ETDEWEB)

    Kurihara, Hiroyoshi; Kikuchi, Masahiro [Nuclear Material Control Center, Tokyo (Japan)

    1994-12-31

    This paper summarizes the past history of worldwide nonproliferation regime, then proposes the future improvements on the regime. Present worldwide nonproliferation regime have been formulated during the cold war era. Therefore, the structure and measures of the regime were heavily influenced by the features of cold war era. Though the cold war was over, still new international order does not seem to be on the horizon, we need to review the present regime and to improve the regime compatible to new world situation. Generally speaking, the nonproliferation regime have gained moderate success so far. We could point out the following features as a kind of success: (1) No increase of overt Nuclear Weapon State (NWS), (2) All five NWSs have finally participated to the NPT, (3) South Africa has destroyed its nuclear weapons and became Non-Nuclear Weapon State (NNWS), (4) Successful conclusions of some regional arrangements, such as Tlatelolco, Ralotonga, and (5) Strengthening of export control on sensitive items. On the other hand, we recognize the following points as the failures of the regime. (6) India, Pakistan and Israel reject to join the NPT, (7) Existence of some violation against NPT regime, i.e. Iraqi case and DPRK case, (8) Insufficient effective measures against brain drain problem, (9) Risk exists for the long term extension of NPT, and (10) Insufficient flexibility to meet changing boundary conditions. We would propose the various measures for strengthening to meet changing boundary conditions, as follows: (11) Measures to be taken along with future civil use of Plutonium, (12) Strengthening and rationalizing international safeguards, (13) Countermeasures for emerging new types of nuclear proliferation, (14) Strengthening nuclear material control in NWS, (15) Measures to be taken for nuclear material from dismantled nuclear weapons, and (16) Nuclear disarmament. (author).

  5. Restriction of Civilian Nuclear Fuel Cycle and Effectiveness of Nuclear Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Ryu, JaeSoo; Lee, HanMyung; Ko, HanSuk; Yang, MaengHo; Oh, KunBae [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2006-07-01

    Many efforts have been made to prevent the spread of nuclear weapons since the nuclear era. Recent revelation such as Dr. A.Q. Khan Network showed that some states had acquired sensitive nuclear technologies including uranium enrichment which could be used for making nuclear weapons. In addition, with the advancement of industrial technology, it has become easier to have access to those technologies. In this context, proliferation risks are being increased more and more. As a result, various proposals to respond to proliferation risks by sensitive technologies have been made: Multilateral Nuclear Approaches (MNAs) by IAEA Director General El Baradei, non-transfer of sensitive nuclear technologies by the U.S. President George W. Bush, international center for nuclear fuel cycle service by Russian President Vladimir V. Putin, Global Nuclear Energy Partnership (GNEP) by Bush's administration and a concept for a multilateral mechanism for reliable access to nuclear fuel by 6 member states of the IAEA. Theses proposals all share the idea that the best way to reduce risk is to prevent certain states from having control over an indigenous civilian fuel cycle while still finding ways to confer the benefits of nuclear energy, and seem to imply that the current nonproliferation regime is fundamentally flawed and needs to be altered. However, these proposals are a center of controversy because they can restrict the inalienable right for the peaceful purposes of nuclear energy inscribed in Article IV of the NPT. Therefore, this paper analyzes the key challenges of these proposals and effectiveness of the goal of nuclear nonproliferation in practical term by restricting civilian nuclear fuel cycle.

  6. Saving the NPT: past and future non-proliferation bargains

    Energy Technology Data Exchange (ETDEWEB)

    Tertrais, B

    2005-07-01

    In this thorough study of the Nuclear Nonproliferation Treaty (NPT), the author looks at the origins of the NPT, its original bargains, and the current 'global crisis of compliance'. Then he looks to the 2005 NPT Review Conference for approaches 'to preserve the integrity and the credibility of the Treaty'. He suggests a new set of bargains centered around two issues: increase rewards for members in good standing of their obligations, but promote sanctions for those cheating; and recognize that nuclear disarmament is a distant goal, but satisfy the legitimate worries of NNWS (Non-Nuclear Weapon States)

  7. 75 FR 11223 - Lifting of Nonproliferation Measures Against One Russian Entity

    Science.gov (United States)

    2010-03-10

    ... FR 42089). Dated: March 4, 2010. Vann H. Van Diepen, Acting Assistant Secretary of State for... of Nonproliferation Measures Against One Russian Entity AGENCY: Department of State. ACTION: Notice..., 1994, as amended, to remove nonproliferation measures on one Russian entity. DATES: Effective...

  8. 75 FR 5836 - Lifting of Nonproliferation Measures Against One Russian Entity

    Science.gov (United States)

    2010-02-04

    ... July 30, 1998 (see 63 FR 42089). Dated: January 29, 2010. C.S. Eliot Kang, Acting Assistant Secretary... of Nonproliferation Measures Against One Russian Entity AGENCY: Department of State. ACTION: Notice..., 1994, as amended, to remove nonproliferation measures on one Russian entity. DATES: Effective...

  9. The Nuclear Non-Proliferation Treaty: Regulating Nuclear Weapons around the World

    Science.gov (United States)

    Middleton, Tiffany Willey

    2010-01-01

    In May 2010, scientists, national security experts, and state delegates from nations around the world will convene in New York for the 2010 Nuclear Non-Proliferation Treaty Review Conference. They will review current guidelines for nuclear testing and possession of nuclear weapons in accordance with the Nuclear Non-Proliferation Treaty of 1968,…

  10. The Nuclear Non-Proliferation Treaty: Regulating Nuclear Weapons around the World

    Science.gov (United States)

    Middleton, Tiffany Willey

    2010-01-01

    In May 2010, scientists, national security experts, and state delegates from nations around the world will convene in New York for the 2010 Nuclear Non-Proliferation Treaty Review Conference. They will review current guidelines for nuclear testing and possession of nuclear weapons in accordance with the Nuclear Non-Proliferation Treaty of 1968,…

  11. Detection Technologies, Arms control and nonproliferation technologies. Third/fourth quarters 1993

    Energy Technology Data Exchange (ETDEWEB)

    Staehle, G; Stull, S; Talaber, C; Moulthrop, P [eds.

    1993-12-31

    This issue of Arms Control and Nonproliferation Technologies is another in a series of issues about specific means for detecting and identifying proliferation and other suspect activities outside the realm of arms control treaties. All the projects discussed are funded by the Office of Research and Development of the Department of Energy`s Office of Nonproliferation and National Security.

  12. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type.

    Science.gov (United States)

    Perkins, A M; Ettinger, U; Weaver, K; Schmechtig, A; Schrantee, A; Morrison, P D; Sapara, A; Kumari, V; Williams, S C R; Corr, P J

    2013-04-16

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test to date by investigating the effects of 1 and 2 mg of the anti-anxiety drug lorazepam on the intensity of threat-avoidance behavior in 40 healthy adult volunteers (20 females). We found lorazepam modulated the intensity of participants' threat-avoidance behavior in a dose-dependent manner. However, the pattern of effects depended upon two factors: type of threat-avoidance behavior and theoretically relevant measures of personality. In the case of flight behavior (one-way active avoidance), lorazepam increased intensity in low scorers on the Fear Survey Schedule tissue-damage fear but reduced it in high scorers. Conversely, in the case of risk-assessment behavior (two-way active avoidance), lorazepam reduced intensity in low scorers on the Spielberger trait anxiety but increased it in high scorers. Anti-anxiety drugs do not systematically affect rodent flight behavior; therefore, we interpret this new finding as suggesting that lorazepam has a broader effect on defense in humans than in rodents, perhaps by modulating general perceptions of threat intensity. The different patterning of lorazepam effects on the two behaviors implies that human perceptions of threat intensity are nevertheless distributed across two different neural streams, which influence effects observed on one-way or two-way active avoidance demanded by the situation.

  13. Supporting the President's Arms Control and Nonproliferation Agenda: Transparency and Verification for Nuclear Arms Reductions

    Energy Technology Data Exchange (ETDEWEB)

    Doyle, James E [Los Alamos National Laboratory; Meek, Elizabeth [Los Alamos National Laboratory

    2009-01-01

    across the near-term (1-4) years and longer-term (5-10) years planning horizons. Some final observations include acknowledging the enduring nature of several key objectives on the Obama Administration's arms control and nonproliferation agenda. The CTBT, FMCT, bilateral nuclear arms reductions and strengthening the NPT have been sought by successive U.S. Administrations for nearly thirty years. Efforts towards negotiated arms control, although de-emphasized by the G.W. Bush Administration, have remained a pillar of U.S. national security strategy for decades and are likely to be of enduring if not increasing importance for decades to come. Therefore revitalization and expansion of USG capabilities in this area can be a positive legacy no matter what near-term arms control goals are achieved over the next four years. This is why it is important to reconstruct integrated bureaucratic, legislative, budgetary and diplomatic strategies to sustain the arms control and nonproliferation agenda. In this endeavor some past lessons must be taken to heart to avoid bureaucratic overkill and keep interagency policy-making and implementation structures lean and effective. On the Technical side a serious, sustained multilateral program to develop, down select and performance test nuclear weapons dismantlement verification technologies and procedures should be immediately initiated. In order to make this happen the United States and Russia should join with the UK and other interested states in creating a sustained, full-scale research and development program for verification at their respective nuc1ear weapons and defense establishments. The goals include development of effective technologies and procedures for: (1) Attribute measurement systems to certify nuclear warheads and military fissile materials; (2) Chain-of-custody methods to track items after they are authenticated and enter accountability; (3) Transportation monitoring; (4) Storage monitoring; (5) Fissile materials

  14. A study on the development of nuclear policy to respond to international non-proliferation regimes

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Wook; Oh, K. B.; Yang, M. H.; Lee, H. M.; Ko, H. S.; Ryu, J. S.; Jung, W. H.; Lim, C. Y

    2006-01-15

    This study analyzed the trends of the nonproliferation regimes in the following three aspects. First, this study analyzed the trends of the international nuclear non-proliferation regime, which includes the NPT, the IAEA safeguards system, the international nuclear export control regime and multilateral nuclear approach. Second, this study forecast the future trends of the nonproliferation systems with the reflection of current international situations. Third, this study also analyzed outstanding issues in nuclear control regimes and derived some factors to reflect national nuclear foreign policy.

  15. Sharing knowledge, shaping Europe US technological collaboration and nonproliferation

    CERN Document Server

    Krige, John

    2016-01-01

    In the 1950s and the 1960s, U.S. administrations were determined to prevent Western European countries from developing independent national nuclear weapons programs. To do so, the United States attempted to use its technological pre-eminence as a tool of “soft power” to steer Western European technological choices toward the peaceful uses of the atom and of space, encouraging options that fostered collaboration, promoted nonproliferation, and defused challenges to U.S. technological superiority. In Sharing Knowledge, Shaping Europe, John Krige describes these efforts and the varying degrees of success they achieved. Krige explains that the pursuit of scientific and technological leadership, galvanized by America’s Cold War competition with the Soviet Union, was also used for techno-political collaboration with major allies. He examines a series of multinational arrangements involving shared technological platforms and aimed at curbing nuclear proliferation, and he describes the roles of the Department ...

  16. Improving Capture-gamma Libraries for Nonproliferation Applications

    Energy Technology Data Exchange (ETDEWEB)

    Sleaford, Brad W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Hurst, Aaron M. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Univ. of California, Berkeley, CA (United States)

    2016-11-01

    This report describes the measurement, evaluation and incorporation of new -ray spectroscopic data into the Evaluated Nuclear Data File (ENDF) for nonproliferation applications. Analysis and processing techniques are described along with key deliverables that have been met over the course of this project. A total of nine new ENDF libraries have been submitted to the National Nuclear Data Center at the Brookhaven National Laboratory and are now available in the ENDF/B-VIII.beta2 release. Furthermore, this project has led to more than ten peer-reviewed publications and provided theses for ve graduate students. This project is a component of the NA-22 venture collaboration on \\Correlated Nuclear Data in Fission Events" (LA14-V-CorrData-PD2Jb).

  17. Computer Language Choices in Arms Control and Nonproliferation Regimes

    Energy Technology Data Exchange (ETDEWEB)

    White, G K

    2005-06-10

    The U.S. and Russian Federation continue to make substantive progress in the arms control and nonproliferation transparency regimes. We are moving toward an implementation choice for creating radiation measurement systems that are transparent in both their design and in their implementation. In particular, the choice of a programming language to write software for such regimes can decrease or significantly increase the costs of authentication. In this paper, we compare procedural languages with object-oriented languages. In particular, we examine the C and C++ languages; we compare language features, code generation, implementation details, and executable size and demonstrate how these attributes aid or hinder authentication and backdoor threats. We show that programs in lower level, procedural languages are more easily authenticated than are object-oriented ones. Potential tools and methods for authentication are covered. Possible mitigations are suggested for using object-oriented programming languages.

  18. A Summary of the Rendezvous, Proximity Operations, Docking, and Undocking (RPODU) Lessons Learned from the Defense Advanced Research Project Agency (DARPA) Orbital Express (OE) Demonstration System Mission

    Science.gov (United States)

    Dennehy, Cornelius J.; Carpenter, James R.

    2011-01-01

    The Guidance, Navigation, and Control (GN&C) Technical Discipline Team (TDT) sponsored Dr. J. Russell Carpenter, a Navigation and Rendezvous Subject Matter Expert (SME) from NASA's Goddard Space Flight Center (GSFC), to provide support to the Defense Advanced Research Project Agency (DARPA) Orbital Express (OE) rendezvous and docking flight test that was conducted in 2007. When that DARPA OE mission was completed, Mr. Neil Dennehy, NASA Technical Fellow for GN&C, requested Dr. Carpenter document his findings (lessons learned) and recommendations for future rendezvous missions resulting from his OE support experience. This report captures lessons specifically from anomalies that occurred during one of OE's unmated operations.

  19. Application of INPRO Methodology in Evaluation of Nonproliferation Features of TWR

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    Through the once-through fuel cycle mode, the Traveling Wave Reactor (TWR) concept can utilize the uranium resources much effectively. The once-through fuel cycle has the inherent characteristics of the non-proliferation. In this project,

  20. Nuclear proliferation and civilian nuclear power: report of the Nonproliferation Alternative Systems Assessment Program. Volume 1. Program summary

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-01

    This report summarizes the Nonproliferation Alternative Systems Assessment Program (NASAP): its background, its studies, and its results. This introductory chapter traces the growth of the issue of nuclear weapons proliferation and the organization and objectives of NASAP. Chapter 2 summarizes the program's assessments, findings and recommendations. Each of Volumes II-VII reports on an individual assessment (Volume II: Proliferation Resistance; Volume III: Resources and Fuel Cycle Facilities; Volume IV: Commercial Potential; Volume V: Economics and Systems Analysis; Volume VI: Safety and Environmental Considerations for Licensing; Volume VII: International Perspectives). Volume VIII (Advanced Concepts) presents a combined assessment of several less fully developed concepts, and Volume IX (Reactor and Fuel Cycle Descriptions) provides detailed descriptions of the reactor and fuel-cycle systems studied by NASAP.

  1. An Important Issue: Non-Proliferation of Nuclear Weapons

    Science.gov (United States)

    Castellano, Doc

    2001-03-01

    Historic Facts and Philosophy: In August, 1947, I participated in a secret meeting concerning the validity and use of a hydrogen bomb. I vigorously supported a ``Super Manhattan Project" to build an ``H" bomb. My philosophy at the time was `bigger and better,' to ensure that no nation attacked the U.S. Our retaliation with ``H" bombs vs. ``A" bombs would be too overwhelming for any nation to risk attacking us should they obtain their own ``A" bombs. Thus, all nations would be forced to use diplomacy. I am older and wiser, and am now convinced that World Test Ban Treaties, non-proliferation of nuclear weapons, and space free of any military weapons is the best policy for all nations and humanity. With current nuclear testing at nearby Yucca Flats, Nevada, Vandenberg AF/Missile site, Cal Tech, etc., I therefore propose that our new APS California Division form a three-person committee to tabulate all pertinent data and submit it to a qualified expert for review and further action. Comments and suggestions are invited.

  2. Atoms for peace and the nonproliferation treaty: unintended consequences

    Energy Technology Data Exchange (ETDEWEB)

    Streeper, Charles Blamires [Los Alamos National Laboratory

    2009-01-01

    In April 2009, President Obama revived nonproliferation and arms control efforts with a speech calling for the worldwide abolition of nuclear weapons. His speech correctly acknowledged the threat of nuclear terrorism and the vulnerabilities of the related unsecure nuclear materials. Unfortunately, the president did not mention and has not mentioned in any speech the threat posed by at-risk radiological materials. Nonproliferation efforts have a well documented history of focus on special nuclear materials (fissionable weapons usable materials or SNM), and other key materials (chemical and biological) and technologies for a Weapon of Mass Destruction (WMD). Such intense focus on WMD related materials/technologies is essential for international safety and security and merit continued attention and funding. However, the perception that radioactive sealed sources (sources) are of less concern than WMD is unfortunate. These perceptions are based solely on the potentially enormous and tragic consequences associated with their deliberate or accidental misuse and proliferation concerns. However, there is a documented history of overemphasis on the nuclear threat at the expense of ignoring the far more likely and also devastating chemical and biological threats. The radiological threat should not be minimized or excluded from policy discussions and decisions on these far ranging scopes of threat to the international community. Sources have a long history of use; and a wider distribution worldwide than fissile materials. Pair this with their broad ranges in isotopes/activities along with scant national and international attention and mechanisms for their safe and secure management and it is not difficult to envision a deadly threat. Arguments that minimize or divert attention away from sources may have the effect of distracting necessary policy attention on preventing/mitigating a radiological dispersal event. The terrorist attacks on 9/11 should be a clear reminder of the

  3. Development of Computer-Aided Learning Programs on Nuclear Nonproliferation and Control

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Chul [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2011-10-15

    The fulfillment of international norms for nuclear nonproliferation is indispensable to the promotion of nuclear energy. The education and training for personnel and mangers related to the nuclear material are one of crucial factors to avoid unintended non-compliance to international norms. Korea Institute of Nuclear Nonproliferation and Control (KINAC) has been providing education and training on nuclear control as its legal duty. One of the legally mandatory educations is 'nuclear control education' performed since 2006 for the observation of the international norms on nuclear nonproliferation and the spread of the nuclear control culture. The other is 'physical protection education' performed since 2010 for maintaining the national physical protection regime effectively and the spread of the nuclear security culture. The 2010 Nuclear Security Summit was held in Washington, DC to enhance international cooperation to prevent nuclear terrorism. During the Summit, the South Korea was chosen to host the second Nuclear Summit in 2012. South Korean President announced that South Korea would share its expertise and support the Summit's mission by setting up an international education and training center on nuclear security in 2014. KINAC is making a full effort to set up the center successfully. An important function of the center is education and training in the subjects of nuclear nonproliferation, nuclear safeguards, nuclear security, and nuclear export/import control. With increasing importance of education and training education on nuclear nonproliferation and control, KINAC has been developing computer-aided learning programs on nuclear nonproliferation and control to overcome the weaknesses in classroom educations. This paper shows two learning programs. One is an e-learning system on the nuclear nonproliferation and control and the other is a virtual reality program for training nuclear material accountancy inspection of light water

  4. Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume IX. Reactor and fuel cycle description

    Energy Technology Data Exchange (ETDEWEB)

    1980-06-01

    The Nonproliferation Alterntive Systems Assessment Program (NASAP) has characterized and assessed various reactor/fuel-cycle systems. Volume IX provides, in summary form, the technical descriptions of the reactor/fuel-cycle systems studied. This includes the status of the system technology, as well as a discussion of the safety, environmental, and licensing needs from a technical perspective. This information was then used in developing the research, development, and demonstration (RD and D) program, including its cost and time frame, to advance the existing technology to the level needed for commercial use. Wherever possible, the cost data are given as ranges to reflect the uncertainties in the estimates.

  5. Improved uncertainty quantification in nondestructive assay for nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Burr, Tom; Croft, Stephen; Jarman, Ken; Nicholson, Andrew; Norman, Claude; Walsh, Stephen

    2016-12-01

    This paper illustrates methods to improve uncertainty quantification (UQ) for non-destructive assay (NDA) measurements used in nuclear nonproliferation. First, it is shown that current bottom-up UQ applied to calibration data is not always adequate, for three main reasons: (1) Because there are errors in both the predictors and the response, calibration involves a ratio of random quantities, and calibration data sets in NDA usually consist of only a modest number of samples (3–10); therefore, asymptotic approximations involving quantities needed for UQ such as means and variances are often not sufficiently accurate; (2) Common practice overlooks that calibration implies a partitioning of total error into random and systematic error, and (3) In many NDA applications, test items exhibit non-negligible departures in physical properties from calibration items, so model-based adjustments are used, but item-specific bias remains in some data. Therefore, improved bottom-up UQ using calibration data should predict the typical magnitude of item-specific bias, and the suggestion is to do so by including sources of item-specific bias in synthetic calibration data that is generated using a combination of modeling and real calibration data. Second, for measurements of the same nuclear material item by both the facility operator and international inspectors, current empirical (top-down) UQ is described for estimating operator and inspector systematic and random error variance components. A Bayesian alternative is introduced that easily accommodates constraints on variance components, and is more robust than current top-down methods to the underlying measurement error distributions.

  6. Impact of Monoenergetic Photon Sources on Nonproliferation Applications Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Geddes, Cameron [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ludewigt, Bernhard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Valentine, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Quiter, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Descalle, Marie-Anne [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Warren, Glen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kinlaw, Matt [Idaho National Lab. (INL), Idaho Falls, ID (United States); Thompson, Scott [Idaho National Lab. (INL), Idaho Falls, ID (United States); Chichester, David [Idaho National Lab. (INL), Idaho Falls, ID (United States); Miller, Cameron [Univ. of Michigan, Ann Arbor, MI (United States); Pozzi, Sara [Univ. of Michigan, Ann Arbor, MI (United States)

    2017-03-01

    Near-monoenergetic photon sources (MPSs) have the potential to improve sensitivity at greatly reduced dose in existing applications and enable new capabilities in other applications, particularly where passive signatures do not penetrate or are insufficiently accurate. MPS advantages include the ability to select energy, energy spread, flux, and pulse structures to deliver only the photons needed for the application, while suppressing extraneous dose and background. Some MPSs also offer narrow angular divergence photon beams which can target dose and/or mitigate scattering contributions to image contrast degradation. Current bremsstrahlung photon sources (e.g., linacs and betatrons) produce photons over a broad range of energies, thus delivering unnecessary dose that in some cases also interferes with the signature to be detected and/or restricts operations. Current sources must be collimated (reducing flux) to generate narrow divergence beams. While MPSs can in principle resolve these issues, they remain at relatively low TRL status. Candidate MPS technologies for nonproliferation applications are now being developed, each of which has different properties (e.g. broad vs. narrow angular divergence). Within each technology, source parameters trade off against one another (e.g. flux vs. energy spread), representing a large operation space. This report describes a broad survey of potential applications, identification of high priority applications, and detailed simulations addressing those priority applications. Requirements were derived for each application, and analysis and simulations were conducted to define MPS parameters that deliver benefit. The results can inform targeting of MPS development to deliver strong impact relative to current systems.

  7. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    Energy Technology Data Exchange (ETDEWEB)

    Husler, R.O. (Westinghouse Savannah River Co., Aiken, SC (United States)); Weir, T.J. (Pentek, Inc., Coraopolis, PA (United States))

    1991-01-01

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility.

  8. The National Ignition Facility (NIF) and the issue of nonproliferation. Final study

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-19

    NIF, the next step proposed by DOE in a progression of Inertial Confinement Fusion (ICF) facilities, is expected to reach the goal of ICF capsule ignition in the laboratory. This report is in response to a request of a Congressman that DOE resolve the question of whether NIF will aid or hinder U.S. nonproliferation efforts. Both technical and policy aspects are addressed, and public participation was part of the decision process. Since the technical proliferation concerns at NIF are manageable and can be made acceptable, and NIF can contribute positively to U.S. arms control and nonproliferation policy goals, it is concluded that NIF supports the nuclear nonproliferation objectives of the United States.

  9. Cooperative Remote Monitoring, Arms control and nonproliferation technologies: Fourth quarter 1995

    Energy Technology Data Exchange (ETDEWEB)

    Alonzo, G M [ed.

    1995-01-01

    The DOE`s Cooperative Remote Monitoring programs integrate elements from research and development and implementation to achieve DOE`s objectives in arms control and nonproliferation. The contents of this issue are: cooperative remote monitoring--trends in arms control and nonproliferation; Modular Integrated Monitoring System (MIMS); Authenticated Tracking and Monitoring Systems (ATMS); Tracking and Nuclear Materials by Wide-Area Nuclear Detection (WAND); Cooperative Monitoring Center; the International Remote Monitoring Project; international US and IAEA remote monitoring field trials; Project Dustcloud: monitoring the test stands in Iraq; bilateral remote monitoring: Kurchatov-Argonne-West Demonstration; INSENS Sensor System Project.

  10. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    Energy Technology Data Exchange (ETDEWEB)

    Husler, R.O. [Westinghouse Savannah River Co., Aiken, SC (United States); Weir, T.J. [Pentek, Inc., Coraopolis, PA (United States)

    1991-12-31

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I&C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility.

  11. Arms Control and nonproliferation technologies: Technology options and associated measures for monitoring a Comprehensive Test Ban, Second quarter

    Energy Technology Data Exchange (ETDEWEB)

    Casey, Leslie A.

    1994-01-01

    This newsletter contains reprinted papers discussing technology options and associated measures for monitoring a Comprehensive Test Ban Treaty (CTBT). These papers were presented to the Conference on Disarmament (CD) in May and June 1994. An interagency Verification Monitoring Task Force developed the papers. The task force included participants from the Arms Control and Disarmament Agency, the Department of Defense, the Department of Energy, the Intelligence Community, the Department of Interior, and the Department of State. The purpose of this edition of Arms Control and Nonproliferation Technologies is to share these papers with the broad base of stakeholders in a CTBT and to facilitate future technology discussions. The papers in the first group discuss possible technology options for monitoring a CTBT in all environments (underground, underwater, atmosphere, and space). These technologies, along with on-site inspections, would facilitate CTBT monitoring by treaty participants. The papers in the second group present possible associated measures, e.g., information exchanges and transparency measures, that would build confidence among states participating in a CTBT.

  12. A Sustainable WMD Nonproliferation Strategy for East Africa: Connecting the WMD Nonproliferation Agenda with Local Border Security Needs to Achieve Mutually Beneficial Outcomes

    Science.gov (United States)

    2014-01-01

    this light , it is clear that we need a wider discussion on WMD nonproliferation capacity building, which considers the higher priorities of emerging...Administration Police Service, Immigration, Kenya National Focal Point on Small Arms & Light Weapons, National Steering Committee on Peacebuilding & Conflict...consumer goods production, agriculture, horticulture , oil refining, metals, cement, commercial ship repair and tourism. Kenya’s main commodity exports are

  13. Nuclear trade and non-proliferation: report by working group; Commerce nucleaire et non-proliferation: rapport du groupe de travail

    Energy Technology Data Exchange (ETDEWEB)

    Kerever, M.

    1995-12-31

    The paper is organized in three parts. The first one analyses the Treaty on the Non-proliferation of Nuclear Weapons (NPT) mentioning the arrangements and registered agreements between the IAEA and Member States. Also, the most important international legal instruments concerned the peaceful uses of nuclear energy are considered. In the second part, other international, regional or national legal instruments are discussed, particularly the London Club Guidelines, Treaty of Tlatelolco, the EURATOM and the Commission of the European Communities (CEC) Treaties, besides the American law of 18 Mars, 1978 - Nuclear Non-proliferation Act (NNPA) about the exportation of materials and services or nuclear technology; An appreciation about the laws and treaties are presented in the third part. Special attention is given to reinforce the non-proliferation dispositives face the actions after Iraq`s event (1990): new installations and nuclear activities moratorium extension export controls extension established by the London Club Guidelines and full scope safeguards adoption to accomplish controls and protect of dual-use nuclear-related technologies. 3 refs.

  14. 78 FR 9768 - Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two...

    Science.gov (United States)

    2013-02-11

    ... of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign.... SUMMARY: A determination has been made that two foreign persons in China have engaged in activities that...) . Accordingly, the following sanctions are being imposed on these foreign persons for two years: (A) Denial of...

  15. 15 CFR Supplement No. 1 to Part 742 - Nonproliferation of Chemical and Biological Weapons

    Science.gov (United States)

    2010-01-01

    ... Biological Weapons No. Supplement No. 1 to Part 742 Commerce and Foreign Trade Regulations Relating to...—Nonproliferation of Chemical and Biological Weapons Note: Exports and reexports of items in performance of...: (i) Equipment (for producing chemical weapon precursors and chemical warfare agents) described in...

  16. Miscalculated Ambiguity: The Effects of US Nuclear Declaratory Policy on Deterrence and Nonproliferation

    Science.gov (United States)

    2010-06-01

    MIRVs) and anti-ballistic missile ( ABM ) technology began to re-invigorate thinking regarding nuclear warfighting explored under McNamara‘s counter...Nuclear Weapons and Nonproliferation: A Reference Handbook. Contemporary World Issues. ( ABC -CLIO, 2008), 6. policy proved deadly for this initial non

  17. China's Case Against the Nuclear Non-Proliferation Treaty: Rationality and Morality.

    Science.gov (United States)

    Hunt, Geoffrey

    1986-01-01

    China and other major Third World nations have refused to sign the Nuclear Non-Proliferation Treaty (NPT). While this position appears morally unjustified and even irrational, their claim that the treaty is discriminatory merits serious attention. Only if certain aspects of this claim are accepted by the nuclear weapons signatories, does a moral…

  18. 76 FR 818 - Bureau of Nonproliferation; Determination Under the Arms Export Control Act

    Science.gov (United States)

    2011-01-06

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF STATE Bureau of Nonproliferation; Determination Under the Arms Export Control Act AGENCY: Department of State... determination pursuant to Section 73 of the Arms Export Control Act and has concluded that publication of...

  19. Back-end of the fuel cycle and non-proliferation strategies

    Energy Technology Data Exchange (ETDEWEB)

    Chebeskov, A.N.; Oussanov, V.I.; Iougai, S.V.; Pshakin, G.M. [Institute of Physics and Power Engineering, State Scientific Center of Russian Federation, Obninsk (Russian Federation)

    2001-07-01

    The paper focuses on the problem of fissile materials proliferation risk estimation. Some methodological approaches to the solution of this task and results of their application for comparison of different nuclear fuel cycle strategies are discussed. The results of comparative assessment of non-proliferation aspects of plutonium utilization alternatives in Russia using system analysis approach are presented. (author)

  20. The Situation of International Arms Control and Non-proliferation in 2003

    Institute of Scientific and Technical Information of China (English)

    Hou; Hongyu

    2014-01-01

    The international non-proliferation efforts have achieved some positive results. The Iran nuclear issue has taken the first step towards solution; the abolition of Syrian chemical weapon is going ahead according the plan and the UN has adopted the Arms Trade Treaty. However, the DPRK nuclear issue has made no progress yet.

  1. International Relations and HRD Activities of the International Nuclear Nonproliferation and Security Academy of the ROK

    Directory of Open Access Journals (Sweden)

    Kwan Kyoo Choe

    2015-07-01

    Full Text Available The objective of this article is to explain the HRD activities on nuclear nonproliferation and security area of the International Nuclear Nonproliferation and Security Academy (INSA of the Korea Institute of Nuclear Nonproliferation and Control (KINAC. The HRD activities on nuclear security in international society have moved gradually from military dimension to the aspect of social management of conflict and threat. The paper would be developed in the following ways; First, the main concept of nuclear security in the Republic of Korea(ROK will be touched, which could show us why and how the ROK has put its step forward into the HRD efforts. Second, the background in conjunction with international relations and its developing process how the Korea Center of Excellence (COE, named as INSA, had been set would be described. Third, the detailed efforts of the ROK to build a COE in Korea in connection with the 2nd Nuclear Security Summit (NSS will be touched with a detailed explanation on its main activities, direction and the perspective. Finally, the aspect of nuclear culture issues and lessons learned in the first year of the nuclear nonproliferation and security HRD activities of the INSA would be developed.

  2. Fukushima Daiichi: implications for carbon-free energy, nuclear nonproliferation, and community resilience.

    Science.gov (United States)

    Hall, Howard L

    2011-07-01

    Implications of the nuclear power plant accidents at Fukushima Daiichi are explored in this commentary. In addition to questions of nuclear reactor regulatory standards, broader implications on noncarbon-emitting energy production, nuclear nonproliferation objectives, and community resilience and emergency response against catastrophic events are explored. Copyright © 2011 SETAC.

  3. The Global Diffusion of Societal Verification Tools: A Quantitative Assessment of the Public’s Ability to Engage Nonproliferation Treaty Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Sayre, Amanda M.; Kreyling, Sean J.; West, Curtis L.

    2015-07-11

    The spread of nuclear and dual-use technologies and the need for more robust, effective and efficient nonproliferation and arms control treaties has led to an increasing need for innovative verification approaches and technologies. This need, paired with advancements in online computing, mobile devices, commercially available satellite imagery and the evolution of online social networks, has led to a resurgence of the concept of societal verification for arms control and nonproliferation treaties. In the event a country accepts its citizens’ assistance in supporting transparency, confidence-building and societal verification, the host government will need a population that is willing and able to participate. While scholarly interest in societal verification continues to grow, social scientific research on the topic is lacking. The aim of this paper is to begin the process of understanding public societal verification capabilities, extend the availability of quantitative research on societal verification and set in motion complementary research to increase the breadth and depth of knowledge on this topic. This paper presents a potential framework and outlines a research roadmap for the development of such a societal verification capability index.

  4. Iran's Relations to the East: Nonproliferation and Regional Security in a Changing Southwest Asia

    Energy Technology Data Exchange (ETDEWEB)

    Tehsin, Muhammad [Quaid-I-Azam Univ., Islamabad (Pakistan)

    2014-11-01

    This study attempts to answer the following questions: would a successful JPOA result in nuclear nonproliferation and regional security in Southwest Asia; and could the Middle East and South Asia work together to contain the threat of Salafi jihadism?

  5. NNSA Nonproliferation Graduate Fellowship Program Annual Report June 2008 - May 2009

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.

    2010-03-01

    In 2009, the Nonproliferation Graduate Fellowship Program (NGFP) completed its 16th successful year in support of the NNSA’s mission by developing future leaders in nonproliferation and promoting awareness of career opportunities. We provide this annual report to review program activities from June 2008 through May 2009 - the fellowship term for the Class of 2008. Contents include: Welcome Letter Introduction The NGFP Team Program Management Highlights Class of 2008 Incoming Fellows Orientation Travel Career Development Management of the Fellows Performance Highlights Closing Ceremony Encore Performance Where They Are Now Alumnus Career Highlights: Christine Buzzard Class of 2009 Applicant Database Upgrades Fall Recruitment Activities Interviews Hiring and Clearances Introducing the Class of 2009 Class of 2010 Recruitment Strategy On the Horizon Appendix A: Class of 2009 Fellows

  6. NNSA Nonproliferation Graduate Fellowship Program Annual Report June 2009 - May 2010

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.

    2011-04-01

    In 2009, the Nonproliferation Graduate Fellowship Program (NGFP) completed its 17th successful year in support of the NNSA’s mission by developing future leaders in nonproliferation and promoting awareness of career opportunities. This annual report to reviews program activities from June 2009 through May 2010 - the fellowship term for the Class of 2009. Contents include: Welcome Letter (Mission Driven: It’s all about results), Introduction, Structure of the NGFP, Program Management Highlights, Annual Lifecycle, Class of 2009 Incoming Fellows, Orientation, Global Support of the Mission, Career Development, Management of the Fellows, Performance Highlights, Closing Ceremony, Where They Are Now, Alumni Highlight - Mission Success: Exceptional Leaders from the NGFP, Class of 2009 Fall Recruitment Activities, Established Partnerships, Face-to-Face, Recruiting Results, Interviews, Hiring and Clearances, Introducing the Class of 2010, Class of 2011 Recruitment Strategy, On the Horizon, Appendix A: Class of 2010 Fellow Biographies

  7. The Physics and Nuclear Nonproliferation Goals of WATCHMAN: A WAter CHerenkov Monitor for ANtineutrinos

    CERN Document Server

    Askins, M; Bernstein, A; Dazeley, S; Dye, S T; Handler, T; Hatzikoutelis, A; Hellfeld, D; Jaffke, P; Kamyshkov, Y; Land, B J; Learned, J G; Marleau, P; Mauger, C; Gann, G D Orebi; Roecker, C; Rountree, S D; Shokair, T M; Smy, M B; Svoboda, R; Sweany, M; Vagins, M R; van Bibber, K A; Vogelaar, R B; Wetstein, M J; Yeh, M

    2015-01-01

    This article describes the physics and nonproliferation goals of WATCHMAN, the WAter Cherenkov Monitor for ANtineutrinos. The baseline WATCHMAN design is a kiloton scale gadolinium-doped (Gd) light water Cherenkov detector, placed 13 kilometers from a civil nuclear reactor in the United States. In its first deployment phase, WATCHMAN will be used to remotely detect a change in the operational status of the reactor, providing a first- ever demonstration of the potential of large Gd-doped water detectors for remote reactor monitoring for future international nuclear nonproliferation applications. During its first phase, the detector will provide a critical large-scale test of the ability to tag neutrons and thus distinguish low energy electron neutrinos and antineutrinos. This would make WATCHMAN the only detector capable of providing both direction and flavor identification of supernova neutrinos. It would also be the third largest supernova detector, and the largest underground in the western hemisphere. In a...

  8. Problems of the nuclear non-proliferation policy. Probleme der nuklearen Nichtverbreitungspolitik; Beitraege zur internationalen Diskussion

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Butler, P. von; Fischer, W.; Caccia Dominioni, F.; Frick, H.; Gmelin, W.; Haeckel, E.; Lauppe, W.D.; Mueller, H.; Richter, B.; Stein, G.

    1994-05-01

    The volume assembles a number of essays wherein basic problems of nonproliferation are identified and discussed in view of recent developments and future policy requirements. What is the role of multilateral institutions in the containment of nuclear proliferation How are Western Europe's security needs to be reconciled with the tenets of the global nonproliferation regime How can international safeguards be upgraded so as to increase confidence among states What kinds of disciplinary instruments are needed for the international community to prevent an unco-operative state from gaining access to nuclear weapons What kinds of obstacles stand in the way of smooth co-operation between the European Union and the United States in the nuclear field How does the demise of global bipolarity impinge on the need to pursue an international nuclear order The essays in this volume seek to combine structural analysis of conceptual issues with substantive policy recommendations. (orig./HP)

  9. Framework for Proliferation Resistance and Physical Protection for Nonproliferation Impact Assessments.

    Energy Technology Data Exchange (ETDEWEB)

    Bari,R.

    2008-03-01

    This report describes a framework for proliferation resistance and physical protection evaluation for the fuel cycle systems envisioned in the expansion of nuclear power for electricity generation. The methodology is based on an approach developed as part of the Generation IV technical evaluation framework and on a qualitative evaluation approach to policy factors similar to those that were introduced in previous Nonproliferation Impact Assessments performed by DOE.

  10. NSAIDs induce apoptosis in nonproliferating ovarian cancer cells and inhibit tumor growth in vivo.

    Science.gov (United States)

    Duncan, Kristal; Uwimpuhwe, Henriette; Czibere, Akos; Sarkar, Devanand; Libermann, Towia A; Fisher, Paul B; Zerbini, Luiz F

    2012-07-01

    Ovarian cancer (OC) is one of the most lethal gynaecological cancers, which usually has a poor prognosis due to late diagnosis. A large percentage of the OC cell population is in a nonproliferating and quiescent stage, which poses a barrier to success when using most chemotherapeutic agents. Recent studies have shown that several nonsteroidal anti-inflammatory drugs (NSAIDs) are effective in the treatment of OC. Furthermore, we have previously described the molecular mechanisms of NSAIDs' induction of cancer apoptosis. In this report, we evaluated various structurally distinct NSAIDs for their efficacies in inducing apoptosis in nonproliferating OC cells. Although several NSAIDs-induced apoptosis, Flufenamic Acid, Flurbiprofen, Finasteride, Celocoxib, and Ibuprofen were the most potent NSAIDs inducing apoptosis. A combination of these agents resulted in an enhanced effect. Furthermore, we demonstrate that the combination of Flurbiprofen, which targets nonproliferative cells, and Sulindac Sulfide, that affects proliferative cells, strongly reduced tumor growth when compared with a single agent treatment. Our data strongly support the hypothesis that drug treatment regimens that target nonproliferating and proliferating cells may have significant efficacy against OC. These results also provide a rationale for employing compounds or even chemically modified NSAIDs, which selectively and efficiently induce apoptosis in cells during different stages of the cell cycle, to design more potent anticancer drugs.

  11. Finland and nuclear non-proliferation: The evolution and cultivation of a norm

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, L. van [Uppsala Univ. (Sweden). Dept. of Peace and Conflict Research

    1998-03-01

    Finland``s entrance on the non-proliferation scene was in 1963 when President Kekkonen suggested a Nordic nuclear-weapons-free zone (NWFZ). This started a debate in and among the Nordic countries and it created a Finnish profile towards the Soviet Union. In most cases, the Soviets tried to bring Finland into a much closer relationship with the USSR. The mere prospect and debate on a Nordic NWFZ reduced the incentive for the Soviets to undermine Finnish neutrality or their desire to suggest consultations according to the Treaty of Friendship, Cooperation and Mutual Assistance on military assistance in the case of a threat to Soviet and/or Finnish security. During the negotiations on the Non-Proliferation Treaty, 1965-1968, Finland played a very active role as a bridge-builder, first between the superpowers and later between the developed and the developing world. This activity gave Finland a name in the UN, strengthened its neutrality and established good relations with the West as well. In 1978, Kekkonen brought up the Nordic NWFZ once more, this time under influence of certain strategic challenges to Finland and general East-West developments. In this Kekkonen had much backing by the public in Finland whereas other states reacted very reluctantly. Politics in Finland has to a large extent been marked by the relations with Russia and later the Soviet Union. However, nuclear non-proliferation was used to ease the weight of this imposing neighbour; a strategy that certainly must be regarded as successful. While achieving this, it was also possible to increase contacts with western states and remain accepted as a neutral state. For Finland, non-proliferation policy was initially a suitable issue to solve other problems than those related exclusively to proliferation. But it was also a policy with a high degree of persistence, pragmatism and willingness to work with concrete issues that maybe do not reach the international limelight in the short run but that work in

  12. Swedish support programme on nuclear non-proliferation in Central and Eastern Europe and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Ek, P.; Andersson, Sarmite [Swedish Nuclear Power Inspectorate, Stockholm (Sweden); Wredberg, L. [ILG Consultant Ltd., Vienna (Austria)

    2000-06-15

    At the request of the Swedish Government, the Swedish Nuclear Power Inspectorate has established a support and co-operation programme in the area of nuclear non-proliferation with Russia and several of the republics of the former Soviet Union. The Programme was initiated in 1991 and an overall goal is to accomplish national means and measures for control and protection of nuclear material and facilities, in order to minimise the risk of proliferation of nuclear weapons and illicit trafficking of nuclear material and equipment. The objective of the Swedish Support Programme is to help each, so called, recipient State to be able to, independently and without help from outside, take the full responsibility for operating a national non-proliferation system and thereby fulfil the requirements imposed through the international legal instruments. This would include both the development and implementation of a modern nuclear legislation system, and the establishment of the components making up a national system for combating illicit trafficking. The support and co-operation projects are organised in five Project Groups (i.e. nuclear legislation, nuclear material control, physical protection, export/import control, and combating of illicit trafficking), which together cover the entire non-proliferation area. Up till June 2000, support and co-operation projects, completed and on-going, have been carried out in ten States, namely Armenia, Azerbaijan, Belarus, Georgia, Kazakstan, Latvia, Lithuania, Moldova, Russia and Ukraine. Furthermore, programmes have been initiated during the first part of 2000 with Estonia, Uzbekistan, Kyrgyzstan and Tajikistan. In addition, assistance has been given to Poland on a specific nuclear material accountancy topic. All projects are done on request by and in co-operation with these States. The total number of projects initiated during the period 1991 to June 2000 is 109, thereof 77 have been completed and 32 are currently on-going. It is the

  13. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  14. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  15. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  16. Sweden and the making of nuclear non-proliferation: from indecision to assertiveness

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, L. van [Uppsala Univ. (Sweden). Dept. of Peace and Conflict Research

    1998-03-01

    Swedish research on nuclear weapons started at a modest scale in 1945 but was soon expanded. By the early 1950s the research programme started to face some of the problems that were going to accompany it for the rest of its life: different priorities and cost-estimates were made by the sectors that wanted to develop nuclear energy and those working on the bomb. Moreover, an introduction of nuclear weapons would lead to a major redistribution of resources to the disadvantage of the navy and army. The public and political debates intensified during the 1950s and culminated in 1960. At first, pro-nuclear voices had been strongest but were soon challenged by interest groups, unions and peace movements. 1960, a committee within the government had established a compromise: Nuclear weapons research for production of weapons would be terminated, while research on the consequences of nuclear weapons would continue. It was a cosmetic decision that could cover for a continued research on weapons design. Nevertheless, there are some general qualities from the debates that indicate why the outcome was that Sweden signed the NPT in 1968. First, the number of interested persons, groups movements and party politicians engaged in the issue increased every time the issue came up. Secondly, the segments of society that supported the nuclear option remained roughly the same. No strong movements rallied to the defence of this position. On the other hand, the anti-nuclear wing received more and more followers. Third, there was a marked tendency by virtually all actors (except the military) to include every sign of progress in international disarmament and non-proliferation efforts as arguments against Swedish proliferation. Since 1968, the non-proliferation choice has ben manifested through Sweden``s adherence to the NPT and this has been accompanied by a strong commitment to other non-proliferation initiatives. Refs.

  17. Leo Szilard Lectureship Award: Science Matters - Technical Dimensions of Arms Control and Non-Proliferation Agreements

    Science.gov (United States)

    Timbie, James

    2017-01-01

    Agreements to reduce nuclear arms and prevent proliferation of nuclear weapons are technical as well as political documents. They must be both technically sound and politically acceptable. This presentation illustrates technical aspects of arms control and non-proliferation agreements, with examples from SALT I, INF, the HEU Agreement, START, and the Iran nuclear negotiations, drawing on 44 years of personal experience in the negotiation of these agreements. The lecture is designed to convey an appreciation of the role that individuals with technical training can play in diplomatic efforts to reduce nuclear forces and prevent nuclear proliferation.

  18. Selected Examples of LDRD Projects Supporting Test Ban Treaty Verification and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Al-Ayat, R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Walter, W. R. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-02-23

    The Laboratory Directed Research and Development (LDRD) Program at the DOE National Laboratories was established to ensure the scientific and technical vitality of these institutions and to enhance the their ability to respond to evolving missions and anticipate national needs. LDRD allows the Laboratory directors to invest a percentage of their total annual budget in cutting-edge research and development projects within their mission areas. We highlight a selected set of LDRD-funded projects, in chronological order, that have helped provide capabilities, people and infrastructure that contributed greatly to our ability to respond to technical challenges in support of test ban treaty verification and nonproliferation.

  19. Predicting linear and nonlinear time series with applications in nuclear safeguards and nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.

    1994-04-01

    This report is a primer on the analysis of both linear and nonlinear time series with applications in nuclear safeguards and nonproliferation. We analyze eight simulated and two real time series using both linear and nonlinear modeling techniques. The theoretical treatment is brief but references to pertinent theory are provided. Forecasting is our main goal. However, because our most common approach is to fit models to the data, we also emphasize checking model adequacy by analyzing forecast errors for serial correlation or nonconstant variance.

  20. Predicting linear and nonlinear time series with applications in nuclear safeguards and nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Burr, T.L.

    1994-04-01

    This report is a primer on the analysis of both linear and nonlinear time series with applications in nuclear safeguards and nonproliferation. We analyze eight simulated and two real time series using both linear and nonlinear modeling techniques. The theoretical treatment is brief but references to pertinent theory are provided. Forecasting is our main goal. However, because our most common approach is to fit models to the data, we also emphasize checking model adequacy by analyzing forecast errors for serial correlation or nonconstant variance.

  1. Increasing Inspectability of Hardware and Software for Arms Control and Nonproliferation Regimes

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2001-07-18

    As the U.S. and the Russian Federation get closer to deploying systems for monitoring nuclear material within arms control and nonproliferation transparency regimes, the level of inspectability of the system hardware and software must increase beyond the systems demonstrated to date. These systems include the Trilateral Initiative prototype, the Fissile Material Transparency Technology Demonstration (FMTTD) system, and the Trusted Radiation Attribute Demonstration System (TRADS). Toward this goal, several alternative technologies will be discussed along with ways in which they would increase inspectability. Some examples of such technologies include the use of microcontrollers instead of fully capable computers, open source operating systems, rantime environments, and compilers.

  2. Post-Cold War Effects on the Non-proliferation Regime

    Energy Technology Data Exchange (ETDEWEB)

    Kessler, Carol E.

    2006-03-31

    This journal article analyzes nuclear and security related events of the past 15 years to illustrate the changes in geopolitics and the shifting balance of power following the collapse of the Soviet Union. Reflection upon these events establishes the context for strengthening the nonproliferation regime. The author concludes that post Soviet communism hastened the movement towards a unipolar system with hegemonic power vested in the United States, and this geopolitical imbalance fostered insecurities and greater threats. Multilateral cooperation and commitment from the US would help this leader achieve its goal of security through increased global confidence in the international system.

  3. Nuclear proliferation and civilian nuclear power: report of the Nonproliferation Alternative Systems Assessment Program. Volume VII. International perspectives

    Energy Technology Data Exchange (ETDEWEB)

    None

    1979-12-01

    The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations. While any final assessment of such measures and alternatives would have to examine the circumstances particular to each nation, it is hoped that the more generic assessments conducted here will be useful in suggesting guidelines for developing an improved nonproliferation regime which also helps to meet nuclear-energy needs. One chapter outlines the existing nonproliferation regime, including the Treaty for the Non-Proliferation of Nuclear Weapons (NPT), International Atomic Energy Agency (IAEA) safeguards, bilateral and multilateral requirements for agreements of cooperation and transfers of technology, and existing provisons for sanctions for violation of nonproliferation commitments. The chapter then proceeds to an assessment of various alternatives for providing assurance of fuel supply in light of this current regime. Another chapter examines a set of technical and institutional measures and alternatives for various components of once-through and closed fuel cycles. The components of the once-through fuel cycle assessed are enrichment services and spent-fuel management; the components of closed fuel cycles assessed are reprocessing and plutonium management and fast-breeder reactor (FBR) deployment.

  4. Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume VII. International perspectives

    Energy Technology Data Exchange (ETDEWEB)

    1980-06-01

    The purpose of this volume is to assess the proliferation vulnerabilities of the present deployment of civilian nuclear-power systems within the current nonproliferation regime and, in light of their prospective deployment, to consider technical and institutional measures and alternatives which may contribute to an improved regime in which nuclear power could play a significant part. An assessment of these measures must include consideration of their nonproliferation effectiveness as well as their bearing upon energy security, and their operational, economic, and political implications. The nature of these considerations can provide some measure of their likely acceptability to various nations.

  5. The year 2000 examination conference of the non-proliferation treaty and the future of the nuclear non-proliferation regime; La conference d'examen 2000 du TNP et l'avenir du regime de non-proliferation nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Grand, C. [Institut d' Etudes Politiques de Paris, 75 (France); Ecole Speciale Militaire de Saint-Cyr-Coetquidan (France)

    2001-07-01

    The nuclear weapons non-proliferation treaty (NPT), signed on July 1, 1968 and enforced on March 5, 1970, has been progressively considered as the headstone of the international non-proliferation and disarmament regime. The sixth NPT examination conference took place at New York (USA) in the year 2000, 5 years after the previous conference but also after the first nuclear weapon tests of India and Pakistan. This article recalls up the main non-proliferation events that took place between the 1995 and 2000 conferences and presents the progresses and results of the New York conference. Finally, it wonders about the ambiguities in the conclusions of this last conference. (J.S.)

  6. The Non-Proliferation Treaty increases security; Pysyvae ydinsulkusopimus lisaeae kansainvaelistae vakautta

    Energy Technology Data Exchange (ETDEWEB)

    Kahiluoto, K.

    1995-12-31

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.).

  7. Myeloid dendritic cells induce HIV-1 latency in non-proliferating CD4+ T cells.

    Science.gov (United States)

    Evans, Vanessa A; Kumar, Nitasha; Filali, Ali; Procopio, Francesco A; Yegorov, Oleg; Goulet, Jean-Philippe; Saleh, Suha; Haddad, Elias K; da Fonseca Pereira, Candida; Ellenberg, Paula C; Sekaly, Rafick-Pierre; Cameron, Paul U; Lewin, Sharon R

    2013-01-01

    Latently infected resting CD4(+) T cells are a major barrier to HIV cure. Understanding how latency is established, maintained and reversed is critical to identifying novel strategies to eliminate latently infected cells. We demonstrate here that co-culture of resting CD4(+) T cells and syngeneic myeloid dendritic cells (mDC) can dramatically increase the frequency of HIV DNA integration and latent HIV infection in non-proliferating memory, but not naïve, CD4(+) T cells. Latency was eliminated when cell-to-cell contact was prevented in the mDC-T cell co-cultures and reduced when clustering was minimised in the mDC-T cell co-cultures. Supernatants from infected mDC-T cell co-cultures did not facilitate the establishment of latency, consistent with cell-cell contact and not a soluble factor being critical for mediating latent infection of resting CD4(+) T cells. Gene expression in non-proliferating CD4(+) T cells, enriched for latent infection, showed significant changes in the expression of genes involved in cellular activation and interferon regulated pathways, including the down-regulation of genes controlling both NF-κB and cell cycle. We conclude that mDC play a key role in the establishment of HIV latency in resting memory CD4(+) T cells, which is predominantly mediated through signalling during DC-T cell contact.

  8. Myeloid dendritic cells induce HIV-1 latency in non-proliferating CD4+ T cells.

    Directory of Open Access Journals (Sweden)

    Vanessa A Evans

    Full Text Available Latently infected resting CD4(+ T cells are a major barrier to HIV cure. Understanding how latency is established, maintained and reversed is critical to identifying novel strategies to eliminate latently infected cells. We demonstrate here that co-culture of resting CD4(+ T cells and syngeneic myeloid dendritic cells (mDC can dramatically increase the frequency of HIV DNA integration and latent HIV infection in non-proliferating memory, but not naïve, CD4(+ T cells. Latency was eliminated when cell-to-cell contact was prevented in the mDC-T cell co-cultures and reduced when clustering was minimised in the mDC-T cell co-cultures. Supernatants from infected mDC-T cell co-cultures did not facilitate the establishment of latency, consistent with cell-cell contact and not a soluble factor being critical for mediating latent infection of resting CD4(+ T cells. Gene expression in non-proliferating CD4(+ T cells, enriched for latent infection, showed significant changes in the expression of genes involved in cellular activation and interferon regulated pathways, including the down-regulation of genes controlling both NF-κB and cell cycle. We conclude that mDC play a key role in the establishment of HIV latency in resting memory CD4(+ T cells, which is predominantly mediated through signalling during DC-T cell contact.

  9. Seven law concepts on nuclear non-proliferation suggested by the International Group of Legal Experts (ILG)

    Energy Technology Data Exchange (ETDEWEB)

    Steen, G. [Djursholm (Sweden); Wredberg, L. [ILG Consultant LTD, Vienna (Austria)

    2001-03-01

    The ILG has worked as an independent group under the Swedish Support Programme on Nuclear Non-Proliferation in Central and Eastern Europe and Central Asia. The ILG's mission is concluded with this report. When developing the seven Law Concepts on national nuclear legislation that are presented in this report, the ILG has applied certain basic principles, which are firmly established in modern Western legislation. A summary of these principles is made here. They are essential cornerstones in laws and regulations that apply both to the nuclear industry and to other high technology areas, characterised by advanced safety and security requirements. Of essential importance is that the Operator alone is responsible for the fulfilment of requirements stipulated in laws and authority directives. The technical complexity of the nuclear industry and the far-reaching requirements on safety and security necessitate a qualified and complete national system of legislation and regulations. As all legislation in general, the nuclear legislation should be clear, easy to understand and give little room for misunderstandings and loopholes. It should also present the legally established requirements on safety and security in a form that facilitates the application and implementation by both state authorities, facility operators and individuals. The investigations of the causes of the Three Mile Island and Chernobyl accidents brought into focus the impact on nuclear safety from human failure. As a consequence, increased emphasis has since then been put on the development of an overall high safety culture in the nuclear field. It is recognised that a good safety culture also promotes the non-proliferation systems and safeguards measures and helps to reduce the risk of illicit trafficking. In a high safety culture environment, each individual facility employee has to be motivated and encouraged to carry out the assigned duties and responsibilities in accordance with rules and

  10. Report of a Workshop in Nuclear Forces and Nonproliferation held at the Woodrow Wilson International Center for Scholars, Washington, DC

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2009-01-01

    The workshop addressed evolving nuclear forces and their impacts on nonproliferation in the context of the new strategic environment, the Obama Administration's Nuclear Posture Review (NPR) Review and the 2010 Conference (RevCon) of the Parties to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). The issues discussed are at the heart of the debate on nuclear policy issues such asfuture nuclear weapons requirements and nonproliferation, but also the stockpile stewardship program and infrastructure modernization. The workshop discussions reflected the importance of the NPRfor defining the role of US nuclear forces in dealing with 21s1 century threats and providing guidance that will shape NNSA and DoD programs. They also highlighted its importancefor NPT diplomacy. The discussion noted the report of the bipartisan Congressional Commission on the Strategic Posture of the United States, and the expectation that the NPR would likely reflect its consensus to a large degree (although the Administration was not bound by the report). There was widespread support for developing thefoundationsfor a sustainable nuclear-weapon program that addresses nuclear weapons, infrastructure and expertise in the broader nonproliferation, disarmament and international security contexts. The discussion also revealed a convergence of views, but no consensus, on a number of important issues, including the diminished role but continued importance of nuclear weapons; the need to take action to ensure the sustainability of the stockpile, and the recapitalization of the infrastructure and expertise; and the need to take action to promote nonproliferation, arms control and disarmament objectives.

  11. Nonproliferation impacts assessment for the management of the Savannah River Site aluminum-based spent nuclear fuel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-12-01

    On May 13, 1996, the US established a new, 10-year policy to accept and manage foreign research reactor spent nuclear fuel containing uranium enriched in the US. The goal of this policy is to reduce civilian commerce in weapons-usable highly enriched uranium (HEU), thereby reducing the risk of nuclear weapons proliferation. Two key disposition options under consideration for managing this fuel include conventional reprocessing and new treatment and packaging technologies. The Record of Decision specified that, while evaluating the reprocessing option, ``DOE will commission or conduct an independent study of the nonproliferation and other (e.g., cost and timing) implications of chemical separation of spent nuclear fuel from foreign research reactors.`` DOE`s Office of Arms Control and Nonproliferation conducted this study consistent with the aforementioned Record of Decision. This report addresses the nonproliferation implications of the technologies under consideration for managing aluminum-based spent nuclear fuel at the Savannah River Site. Because the same technology options are being considered for the foreign research reactor and the other aluminum-based spent nuclear fuels discussed in Section ES.1, this report addresses the nonproliferation implications of managing all the Savannah River Site aluminum-based spent nuclear fuel, not just the foreign research reactor spent nuclear fuel. The combination of the environmental impact information contained in the draft EIS, public comment in response to the draft EIS, and the nonproliferation information contained in this report will enable the Department to make a sound decision regarding how to manage all aluminum-based spent nuclear fuel at the Savannah River Site.

  12. Nuclear disarmament. Options for the coming non-proliferation treaty surveillance cycle; Nukleare Abruestung. Optionen fuer den kommenden Ueberpruefungszyklus des NVV

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Harald

    2011-07-01

    The report is aimed on the nuclear disarmament discussion with respect to the disagreement of nuclear weapon states and those without nuclear weapons, esp. the non-aligned movement (NAM) concerning the non-proliferation treaty. The report covers the following issues: The role of the non-proliferation treaty, nuclear disarmament in the last surveillance conference 2010, the different disarmament philosophies, the possibilities of bridging the disagreement, further disarmament options for the future non-proliferation treaty surveillance cycle, German options for the future surveillance cycle.

  13. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  14. The European Safeguards Research and Development Association Addresses Safeguards and Nonproliferation

    Energy Technology Data Exchange (ETDEWEB)

    Janssens-Maenhout, Greet; Kusumi, R.; Daures, Pascal A.; Janssens, Willem; Dickman, Deborah A.

    2010-06-16

    The renaissance of efforts to expand the use of nuclear energy requires the parallel development of a renewed and more sophisticated work force. Growth in the nuclear sector with high standard of safety, safeguards and security requires skilled staff for design, operations, inspections etc. High-quality nuclear technology educational programs are diminished from past years, and the ability of universities to attract students and to meet future staffing requirements of the nuclear industry is becoming seriously compromised. Thus, education and training in nuclear engineering and sciences is one of the cornerstones for the nuclear sector. Teaching in the nuclear field still seems strongly influenced by national history but it is time to strengthen resources and collaborate. Moreover with the current nuclear security threats it becomes critical that nuclear technology experts master the basic principles not only of safety, but also of nuclear safeguards, nonproliferation and nuclear security. In Europe the European Nuclear Education Network (ENEN) Association has established the certificate 'European Master of Science in Nuclear Engineering (EMSNE)' as the classic nuclear engineering program covering reactor operation and nuclear safety. However, it does not include courses on nonproliferation, safeguards, or dual-use technologies. The lack of education in nuclear safeguards was tackled by the European Safeguards Research and Development Association (ESARDA), through development and implementation of safeguards course modules. Since 2005 the ESARDA Working Group, called the Training and Knowledge Management Working Group, (TKMWG) has worked with the Joint Research Centre (JRC) in Ispra, Italy to organize a Nuclear Safeguards and Nonproliferation course. This five-day course is held each spring at the JRC, and continues to show increasing interest as evidenced by the positive responses of international lecturers and students. The standard set of lectures

  15. Airborne Multisensor Pod System, Arms control and nonproliferation technologies: Second quarter 1995

    Energy Technology Data Exchange (ETDEWEB)

    Alonzo, G M; Sanford, N M [eds.

    1995-01-01

    This issue focuses on the Airborne Multisensor Pod System (AMPS) which is a collaboration of many of the DOE national laboratories to provide a scientific environment to research multiple sensors and the new information that can be derived from them. The bulk of the research has been directed at nonproliferation applications, but it has also proven useful in environmental monitoring and assessment, and land/water management. The contents of this issue are: using AMPS technology to detect proliferation and monitor resources; combining multisensor data to monitor facilities and natural resources; planning a AMPS mission; SAR pod produces images day or night, rain or shine; MSI pod combines data from multiple sensors; ESI pod will analyze emissions and effluents; and accessing AMPS information on the Internet.

  16. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  17. Stabilization and immobilization of military plutonium: A non-proliferation perspective

    Energy Technology Data Exchange (ETDEWEB)

    Leventhal, P. [Nuclear Control Institute, Washington, DC (United States)

    1996-05-01

    The Nuclear Control Institute welcomes this DOE-sponsored technical workshop on stabilization and immobilization of weapons plutonium (W Pu) because of the significant contribution it can make toward the ultimate non-proliferation objective of eliminating weapons-usable nuclear material, plutonium and highly enriched uranium (HEU), from world commerce. The risk of theft or diversion of these materials warrants concern, as only a few kilograms in the hands of terrorists or threshold states would give them the capability to build nuclear weapons. Military plutonium disposition questions cannot be addressed in isolation from civilian plutonium issues. The National Academy of Sciences has urged that {open_quotes}further steps should be taken to reduce the proliferation risks posed by all of the world`s plutonium stocks, military and civilian, separated and unseparated...{close_quotes}. This report discusses vitrification and a mixed oxide fuels option, and the effects of disposition choices on civilian plutonium fuel cycles.

  18. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Moore, L.R. [Lawrence Livermore National Lab., CA (United States)

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.

  19. Molecular strategies of plant defense and insect counter-defense

    Institute of Scientific and Technical Information of China (English)

    KEYANZHU-SALZMAN; JIAN-LONGBI; TONG-XIANLIU

    2005-01-01

    The prediction of human population growth worldwide indicates there will be a need to substantially increase food production in order to meet the demand on food supply.This can be achieved in part by the effective management of insect pests. Since plants have co-evolved with herbivorous insects for millions of years, they have developed an array of defense genes to protect themselves against a wide variety of chewing and sucking insects.Using these naturally-occurring genes via genetic engineering represents an environmentally friendly insect pest-control measure. Insects, however, have been actively evolving adaptive mechanisms to evade natural plant defenses. Such evolved adaptability undoubtedly has helped insects during the last century to rapidly overcome a great many humanimposed management practices and agents, including chemical insecticides and genetically engineered plants. Thus, better understanding of the molecular and genetic basis of plant defense and insect counter-defense mechanisms is imperative, not only from a basic science perspective, but also for biotechnology-based pest control practice. In this review, we emphasize the recent advance and understanding of molecular strategies of attack-counterattack and defense-counter-defense between plants and their herbivores.

  20. Serious Games: Defense Advanced Research Projects Agency: An Interview with Innovation Information Office Program Manager CAPT Russell Shilling, PhD.

    Science.gov (United States)

    2012-04-01

    Dr. Shilling received his Doctor of Philosophy in Experimental Psychology (Auditory Psychophysics/Neuroscience) from the University of North Carolina at Greensboro in 1992 and his Bachelor of Arts in Psychology at Wake Forest University in 1985. In 1993 he graduated with top honors from Aerospace Experimental Psychologist training-Naval Flight Surgeon Class 93002. In 1996, he served as an Assistant/Associate Professor at the U.S. Air Force Academy in the Department of Behavioral Sciences and Leadership. In 2000, he arrived at the Naval Postgraduate School as an Associate Professor in the Operations Research and Systems Engineering Departments and became Technical Director for Immersive Technologies in the Modeling, Virtual Environments, and Simulation Institute. His military decorations include the Defense Superior Service Medal, Meritorious Service Medal (three awards), the Navy Commendation Medal, and the Navy Achievement Medal. He is also the recipient of the American Hospital Association's 2009 Executive Award for Excellence.

  1. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim.

  2. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  3. Nonproliferation and arms control assessment of weapons-usable fissile material storage and excess plutonium disposition alternatives

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-01-01

    This report has been prepared by the Department of Energy`s Office of Arms Control and Nonproliferation (DOE-NN) with support from the Office of Fissile Materials Disposition (DOE-MD). Its purpose is to analyze the nonproliferation and arms reduction implications of the alternatives for storage of plutonium and HEU, and disposition of excess plutonium, to aid policymakers and the public in making final decisions. While this assessment describes the benefits and risks associated with each option, it does not attempt to rank order the options or choose which ones are best. It does, however, identify steps which could maximize the benefits and mitigate any vulnerabilities of the various alternatives under consideration.

  4. Nuclear proliferation and civilian nuclear power: report of the Nonproliferation Alternative Systems Assessment Program. Volume IX. Reactor and fuel cycle descriptions

    Energy Technology Data Exchange (ETDEWEB)

    1979-12-01

    The Nonproliferation Alternative Systems Assessment Program (NASAP) has characterized and assessed various reactor/fuel-cycle systems. Volume IX provides, in summary form, the technical descriptions of the reactor/fuel-cycle systems studied. This includes the status of the system technology, as well as a discussion of the safety, environmental, and licensing needs from a technical perspective. This information was then used in developing the research, development, and demonstration (RD and D) program, including its cost and time frame, to advance the existing technology to the level needed for commercial use. Wherever possible, the cost data are given as ranges to reflect the uncertainties in the estimates. Volume IX is divided into three sections: Chapter 1, Reactor Systems; Chapter 2, Fuel-Cycle Systems; and the Appendixes. Chapter 1 contains the characterizations of the following 12 reactor types: light-water reactor; heavy-water reactor; water-cooled breeder reactor; high-temperature gas-cooled reactor; gas-cooled fast reactor; liquid-metal fast breeder reactor; spectral-shift-controlled reactor; accelerator-driven reactor; molten-salt reactor; gaseous-core reactor; tokamak fusion-fisson hybrid reactor; and fast mixed-spectrum reactor. Chapter 2 contains similar information developed for fuel-cycle facilities in the following categories: mining and milling; conversion and enrichment; fuel fabrication; spent fuel reprocessing; waste handling and disposal; and transportation of nuclear materials.

  5. The new role of non-proliferation surveillance; Safeguards - die neue Rolle der Nichtverbreitungsueberwachung

    Energy Technology Data Exchange (ETDEWEB)

    Weh, R. [GNS Gesellschaft fuer Nuklear-Service mbH, Essen (Germany)

    2001-10-01

    Non-proliferation and nuclear safeguards are intimately connected with the peaceful development and use of nuclear power. The contractual obligation to forgo any misuse aimed at the construction of atom boms has been, and is, an important basis of all activities in the nuclear field. For the Federal Republic of Germany and the other participating states, subdivided into nuclear weapon states and non-nuclear-weapon states, the 1954 Brussels Treaty, which contains a fundamental clause waiving the production of nuclear weapons, the establishment of the European Atomic Energy Community, EURATOM, within the framework of the 1957 Treaties of Rome, and the Treaty on the Non-proliferation of Nuclear Weapons (Non-proliferation Treaty) within the framework of IAEA are the underlying basic legal instruments. These treaties, and the extended agreements based on them, operated on the basis of the 'old' system of surveillance of fissile material (nuclear safeguards). Both the inspection effort to be coped with by IAEA, which has kept rising steadily since the eighties and for which no additional budget funds were made available, and the violation by Iraq of the treaty as corroborated by a UN inspection team discovering a program for the production of weapons of mass destruction, boosted efforts in the early nineties to revise the existing system of treaties and controls. The International Atomic Energy Agency, among other measures, decided to improve nuclear safeguards by introducing immediate measures and optimization programs and upgrading inspection possibilities by a new model agreement. The model protocol, INFCIRC/153, adopted by the Board of Governors in September 1997 among other things serves to supplement the existing system of verification of the correctness of information received by another system verifying the completeness of such information. It incorporates an extended duty to supply information and extended rights of access. This includes activities not

  6. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  7. Assessment of Impact of Monoenergetic Photon Sources on Prioritized Nonproliferation Applications: Simulation Study Report

    Energy Technology Data Exchange (ETDEWEB)

    Geddes, Cameron [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ludewigt, Bernhard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Valentine, John [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Quiter, Brian [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Descalle, Marie-Anne [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Warren, Glen [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Kinlaw, Matt [Idaho National Lab. (INL), Idaho Falls, ID (United States); Thompson, Scott [Idaho National Lab. (INL), Idaho Falls, ID (United States); Chichester, David [Idaho National Lab. (INL), Idaho Falls, ID (United States); Miller, Cameron [Univ. of Michigan, Ann Arbor, MI (United States); Pozzi, Sara [Univ. of Michigan, Ann Arbor, MI (United States)

    2016-12-30

    Near-monoenergetic photon sources (MPSs) have the potential to improve sensitivity at greatly reduced dose in existing applications and enable new capabilities in other applications. MPS advantages include the ability to select energy, energy spread, flux, and pulse structures to deliver only the photons needed for the application, while suppressing extraneous dose and background. Some MPSs also offer narrow divergence photon beams which can target dose and/or mitigate scattering contributions to image contrast degradation. Current broad-band, bremsstrahlung photon sources (e.g., linacs and betatrons) deliver unnecessary dose that in some cases also interferes with the signature to be detected and/or restricts operations, and must be collimated (reducing flux) to generate narrow divergence beams. While MPSs can in principle resolve these issues, they are technically challenging to produce. Candidate MPS technologies for nonproliferation applications are now being developed, each of which have different properties (e.g. broad divergence vs. narrow). Within each technology, source parameters trade off against one another (e.g. flux vs. energy spread), representing a large operation space. To guide development, requirements for each application of interest must be defined and simulations conducted to define MPS parameters that deliver benefit relative to current systems. The present project conducted a broad assessment of potential nonproliferation applications where MPSs may provide new capabilities or significant performance enhancement (reported separately), which led to prioritization of several applications for detailed analysis. The applications prioritized were: cargo screening and interdiction of Special Nuclear Materials (SNM), detection of hidden SNM, treaty/dismantlement verification, and spent fuel dry storage cask content verification. High resolution imaging for stockpile stewardship was considered as a sub-area of the treaty topic, as it is also of

  8. Germany and the nuclear non-proliferation; Current situation and prospects; Deutschland und die nukleare Nichtverbreitung; Zwischenbilanz und Ausblick

    Energy Technology Data Exchange (ETDEWEB)

    Preisinger, J.

    1993-07-01

    A summary is given of the consequences, both positive and negative, of international non-proliferation policy. The numerous, complex branches and connections of national measures and inter-stake agreements for the peaceful, controlled uses of nuclear technology and related military technologies are expertly described, and assessed on their effectiveness. Weak aspects of the nuclear non-proliferation regime are pointed out and past reforms are illustrated and assessed in the light of recent developments. The interests of the German Federal Republic from the centre of this analysis. The author shows that, after a certain hesitary, German diplomacy has now become active in the establishment of an international non-proliferation regime. He concludes that Germany should take a strong initiative role in maintaining a peaceful international nuclear order. (orig.) [Deutsch] Es wird ein Resuemee der bisherigen Erfolge und Misserfolge internationaler Nichtverbreitungspolitik gezogen. Die komplexen, vielfach veraestelten und verschachtelten nationalen Massnahmen und zwischenstaatlichen Vereinbarungen zur Ueberwachung und friedlichen Zweckbindung von Nukleartechnologie und militaerisch relevanten Anschlusstechnologien werden sachkundig erlaeutert und auf ihre Wirksamkeit ueberprueft. Schwachstellen des nuklearen Nichtverbreitungsregimes werden offengelegt, Reformschritte der vergangenen Jahre werden dargestellt und im Lichte der juengsten Entwicklungen bewertet. Dabei steht die Interessenlage der Bundesrepublik Deutschland im Zentrum der Analyse. Der Autor zeigt, dass die deutsche Diplomatie sich nach einer gewissen Zurueckhaltung schliesslich aktiv in die Gestaltung des internationalen Nichtverbreitungsregimes eingeschaltet hat. Er plaediert fuer eine kraftvolle Initiativrolle Deutschlands zur Erhaltung einer friedlichen internationalen Nuklearordnung. (orig.)

  9. Comparison of chemical and nuclear explosions: Numerical simulations of the Non-Proliferation Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J.R.; Bos, R.J.

    1995-06-01

    In this paper the authors discuss numerical simulations of the Non-Proliferation Experiment (NPE), which was an underground explosion conducted in September 1993 in the volcanic tuff of the Nevada Test Site. The NPE source consisted of 1.29 {times} 10{sup 6} kg of ANFO-emulsion blasting agent, with the approximate energy of 1.1 kt, emplaced 389 m beneath the surface of Rainier Mesa. The authors compare detailed numerical simulations of the NPE with data collected from that experiment, and with calculations of an equally energetic nuclear explosion in identical geology. Calculated waveforms, at ranges out to approximately 1 km, agree moderately well in the time domain with free-field data, and are in qualitative agreement with free-surface records. Comparison of computed waveforms for equally energetic chemical and nuclear sources reveals relatively minor differences beyond the immediate near-source region, with the chemical source having an {approximately}25% greater seismic moment but otherwise indistinguishable (close-in) seismic source properties. 41 refs., 67 figs., 7 tabs.

  10. National independence and nonproliferation in the new states of Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Gleason, G.

    1993-12-01

    Five independent states emerged in Central Asia from the breakup of the USSR. One of these states, Kazakhstan, possesses nuclear weapons. The other four of these states, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan, are not known to possess nuclear weapons, however they occupy a geostrategic position which makes them important to non-proliferation efforts. The present report profiles the capabilities and intentions of these four Central Asian states. The analysis of capabilities suggests that none of these states has the capability to develop a usable nuclear weapon. However, all of these countries-- especially Uzbekistan--have components of the old Soviet nuclear weapons complex which are now orphans. They have no use for these facilities and must either re-profile them, destroy them, or transfer them. The analysis of intentions suggests that the dynamics of national independence have created a situation in which Uzbekistan has hegemonic designs in the region. Implications for retarding nuclear proliferation in the Central Asian region are examined. Opportunities for outside influence are assessed.

  11. Economic and Non-proliferation Policy Considerations of Uranium Enrichment in Brazil and Argentina

    Energy Technology Data Exchange (ETDEWEB)

    Short, Steven M.; Phillips, Jon R.; Weimar, Mark R.; Mahy, Heidi A.

    2008-09-01

    The nuclear development programs of both Argentina and Brazil have, since the 1970s, been premised on the desire for self-sufficiency and assurance of nuclear fuel supply. While military rivalry and mutual distrust led to nuclear weapons related development programs in the 1970s and 1980s, both countries have since terminated these programs. Furthermore, the governments of both countries have pledged their commitment to exclusively non-explosive use of nuclear energy and have signed the Non Proliferation Treaty (NPT). Utilizing rights provided for under the NPT, both Argentina and Brazil have nuclear fuel production facilities, with the notable exception of enrichment plants, that provide much of the current indigenous fuel requirements for their nuclear power plants. However, both countries are actively developing enrichment capability to fill this gap. The purpose of this report is to assess the economic basis and non-proliferation policy considerations for indigenous enrichment capability within the context of their desired self-sufficiency and to evaluate possible United States Government policy options.

  12. Defense Science Board Summer Study on Autonomy

    Science.gov (United States)

    2016-06-01

    Autonomy completed  its information gathering in August 2015. The report was cleared for open  publication by the DoD Office of  Security  Review on June 1...operation  CRASH  Clean‐Slate Design of Resilient, Adaptive,  Secure  Hosts  DARPA  Defense Advanced Research and Projects Agency  DCA  defensive counter air...DIA  Defense Intelligence Agency  DISA  Defense Information Systems Agency  DLA  Defense Logistics Agency  DNS   domain name service  DoD  Department

  13. Seven law concepts on nuclear non-proliferation suggested by the International Group of Legal Experts (ILG)

    Energy Technology Data Exchange (ETDEWEB)

    Steen, G. [Djursholm (Sweden); Wredberg, L. [ILG Consultant LTD, Vienna (Austria)

    2001-03-01

    The ILG has worked as an independent group under the Swedish Support Programme on Nuclear Non-Proliferation in Central and Eastern Europe and Central Asia. The ILG's mission is concluded with this report. When developing the seven Law Concepts on national nuclear legislation that are presented in this report, the ILG has applied certain basic principles, which are firmly established in modern Western legislation. A summary of these principles is made here. They are essential cornerstones in laws and regulations that apply both to the nuclear industry and to other high technology areas, characterised by advanced safety and security requirements. Of essential importance is that the Operator alone is responsible for the fulfilment of requirements stipulated in laws and authority directives. The technical complexity of the nuclear industry and the far-reaching requirements on safety and security necessitate a qualified and complete national system of legislation and regulations. As all legislation in general, the nuclear legislation should be clear, easy to understand and give little room for misunderstandings and loopholes. It should also present the legally established requirements on safety and security in a form that facilitates the application and implementation by both state authorities, facility operators and individuals. The investigations of the causes of the Three Mile Island and Chernobyl accidents brought into focus the impact on nuclear safety from human failure. As a consequence, increased emphasis has since then been put on the development of an overall high safety culture in the nuclear field. It is recognised that a good safety culture also promotes the non-proliferation systems and safeguards measures and helps to reduce the risk of illicit trafficking. In a high safety culture environment, each individual facility employee has to be motivated and encouraged to carry out the assigned duties and responsibilities in accordance with rules and

  14. Nonproliferation, arms control and disarmament and extended deterrence in the new security environment

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2009-01-01

    With the end of the Cold War, in a dramatically changed security environment, the advances in nonnuclear strategic capabilities along with reduced numbers and roles for nuclear forces has altered the calculus of deterrence and defense, at least for the United States. For many, this opened up a realistic possibility of a nuclear-free world. It soon became clear that the initial post-Cold War hopes were exaggerated. The world did change fundamentally, but it did not become more secure and stable. In place of the old Soviet threat, there has been growing concern about proliferation and terrorism involving nuclear and other weapons of mass destruction (WMD), regional conflicts, global instability and increasingly serious new and emerging threats, including cyber attacks and attacks on satellites. For the United States at least, in this emerging environment, the political rationales for nuclear weapons, from deterrence to reassurance to alliance management, are changing and less central than during the Cold War to the security of the United States, its friends and allies. Nuclear weapons remain important for the US, but for a far more limited set of roles and missions. As the Perry-Schlesinger Commission report reveals, there is a domestic US consensus on nuclear policy and posture at the highest level and for the near term, including the continued role of nuclear arms in deterring WMD use and in reassuring allies. Although the value of nuclear weapons has declined for the United States, the value of these weapons for Russia, China and so-called 'rogue' states is seen to be rising. The nuclear logic of NATO during Cold War - the need for nuclear weapons to counter vastly superior conventional capabilities of the Soviet Union and the Warsaw Pact - is today heard from Russians and even some proliferants. Moreover, these weapons present a way for rogues to achieve regional hegemony and possibly to deter interventions by the United States or others. While the

  15. Nuclear nonproliferation and safety: Challenges facing the International Atomic Energy Agency

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-01

    The Chairman of the Senate Committee on Govermental Affairs asked the United States General Accounting Office (GAO) to review the safeguards and nuclear power plant safety programs of the International Atomic Energy Agency (IAEA). This report examines (1) the effectiveness of IAEA`s safeguards program and the adequacy of program funding, (2) the management of U.S. technical assistance to the IAEA`s safeguards program, and (3) the effectiveness of IAEA`s program for advising United Nations (UN) member states about nuclear power plant safety and the adequacy of program funding. Under its statute and the Treaty on the Non-Proliferation of Nuclear Weapons, IAEA is mandated to administer safeguards to detect diversions of significant quantities of nuclear material from peaceful uses. Because of limits on budget growth and unpaid contributions, IAEA has had difficulty funding the safeguards program. IAEA also conducts inspections of facilities or locations containing declared nuclear material, and manages a program for reviewing the operational safety of designated nuclear power plants. The U.S. technical assistance program for IAEA safeguards, overseen by an interagency coordinating committee, has enhanced the agency`s inspection capabilities, however, some weaknesses still exist. Despite financial limitations, IAEA is meeting its basic safety advisory responsibilities for advising UN member states on nuclear safety and providing requested safety services. However, IAEA`s program for reviewing the operational safety of nuclear power plants has not been fully effective because the program is voluntary and UN member states have not requested IAEA`s review of all nuclear reactors with serious problems. GAO believes that IAEA should have more discretion in selecting reactors for review.

  16. The Nuclear Non-Proliferation Treaty and the Comprehensive Nuclear-Test-Ban Treaty, the relationship

    Science.gov (United States)

    Graham, Thomas, Jr.

    2014-05-01

    The Nuclear Non-Proliferation Treaty (NPT) is the most important international security arrangement that we have that is protecting the world community and this has been true for many years. But it did not happen by accident, it is a strategic bargain in which 184 states gave up the right forever to acquire the most powerful weapon ever created in exchange for a commitment from the five states allowed to keep nuclear weapons under the NPT (U.S., U.K., Russia, France and China), to share peaceful nuclear technology and to engage in disarmament negotiations aimed at the ultimate elimination of their nuclear stockpiles. The most important part of this is the comprehensive nuclear test ban (CTBT); the thinking by the 184 NPT non-nuclear weapon states was and is that they understand that the elimination of nuclear weapon stockpiles is a long way off, but at least the NPT nuclear weapon states could stop testing the weapons. The CTBT has been ratified by 161 states but by its terms it can only come into force if 44 nuclear potential states ratify; 36 have of the 44 have ratified it, the remaining eight include the United States and seven others, most of whom are in effect waiting for the United States. No state has tested a nuclear weapon-except for complete outlier North Korea-in 15 years. There appears to be no chance that the U.S. Senate will approve the CTBT for ratification in the foreseeable future, but the NPT may not survive without it. Perhaps it is time to consider an interim measure, for the UN Security Council to declare that any future nuclear weapon test any time, anywhere is a "threat to peace and security", in effect a violation of international law, which in today's world it clearly would be.

  17. Advanced Missile Signature Center

    Data.gov (United States)

    Federal Laboratory Consortium — The Advanced Missile Signature Center (AMSC) is a national facility supporting the Missile Defense Agency (MDA) and other DoD programs and customers with analysis,...

  18. The history of the early years of metamaterials in USA and UK defense agencies

    Science.gov (United States)

    Derov, John S.; Hammond, Richard; Youngs, Ian J.

    2017-08-01

    This article discusses the historical events that occurred in the early years of metamaterials leading to the current development of metamaterials in the Defense Advanced Research Projects Agency, Department of Defense, and Ministry of Defence.

  19. Use of open source information and commercial satellite imagery for nuclear nonproliferation regime compliance verification by a community of academics

    Science.gov (United States)

    Solodov, Alexander

    The proliferation of nuclear weapons is a great threat to world peace and stability. The question of strengthening the nonproliferation regime has been open for a long period of time. In 1997 the International Atomic Energy Agency (IAEA) Board of Governors (BOG) adopted the Additional Safeguards Protocol. The purpose of the protocol is to enhance the IAEA's ability to detect undeclared production of fissile materials in member states. However, the IAEA does not always have sufficient human and financial resources to accomplish this task. Developed here is a concept for making use of human and technical resources available in academia that could be used to enhance the IAEA's mission. The objective of this research was to study the feasibility of an academic community using commercially or publicly available sources of information and products for the purpose of detecting covert facilities and activities intended for the unlawful acquisition of fissile materials or production of nuclear weapons. In this study, the availability and use of commercial satellite imagery systems, commercial computer codes for satellite imagery analysis, Comprehensive Test Ban Treaty (CTBT) verification International Monitoring System (IMS), publicly available information sources such as watchdog groups and press reports, and Customs Services information were explored. A system for integrating these data sources to form conclusions was also developed. The results proved that publicly and commercially available sources of information and data analysis can be a powerful tool in tracking violations in the international nuclear nonproliferation regime and a framework for implementing these tools in academic community was developed. As a result of this study a formation of an International Nonproliferation Monitoring Academic Community (INMAC) is proposed. This would be an independent organization consisting of academics (faculty, staff and students) from both nuclear weapon states (NWS) and

  20. Nuclear proliferation and civilian nuclear power. Report of the Nonproliferation Alternative Systems Assessment Program. Volume IV. Commercial potential

    Energy Technology Data Exchange (ETDEWEB)

    1980-06-01

    This volume of the Nonproliferation Alternative Systems Assessment Program (NASAP) report provides time and cost estimates for positioning new nuclear power systems for commercial deployment. The assessment also estimates the rates at which the new systems might penetrate the domestic market, assuming the continuing viability of the massive light-water reactor network that now exists worldwide. This assessment does not recommend specific, detailed program plans and budgets for individual systems; however, it is clear from this analysis that any of the systems investigated could be deployed if dictated by national interest.

  1. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plant

  2. Defense Exportability Features Initiative: A New Paradigm for International Cooperation

    Science.gov (United States)

    2015-02-01

    exportability process. Consequently DEF should en- hance these traditional benefits in two important ways: • By providing advanced capability to allies and...Defense AT&L: January–February 2015 24 Defense Exportability Features Initiative A New Paradigm for International Cooperation Frank D. Kenlon n...Jay Mandelbaum Kenlon is a professor of international acquisition management (intermittent) in the Defense Systems Management College’s International

  3. Organic Scintillators in Nonproliferation Applications With a Hybridized Double-Pulse Rejection Technique

    Science.gov (United States)

    Bourne, Mark Mitchell

    Alternative detection technologies are crucial to meeting demand for neutron detectors, for the current production of He-3, which has been the classical neutron choice, is insufficient. Organic scintillators are a strong candidate as a He-3 alternative due to their high efficiency, fast timing properties, and capabilities for separately identifying gamma-rays and neutrons through pulse shape discrimination (PSD). However, the use of organic scintillators in environments with numerous gamma rays can be limited because overlapping gamma-ray events can be misclassified as neutron events during PSD. To solve this problem, a new, hybridized double-pulse cleaning technique, consisting of three separate cleaning algorithms, was developed. The technique removes gamma-ray double pulses while preserving as many neutron pulses as possible. This technique was applied to separate experiments of Cf-252 and a gamma-ray source when measuring at a 100-kHz count rate and a field of 1000 incident gamma rays per incident neutron. It was found that stilbene scintillators were capable of intrinsic neutron efficiencies between 15-19% when measuring bare Cf-252 and 13-17% when exposed to the gamma-ray field. Misclassification rates ranged from 10-6-10-5, a factor-of-5 better than both the EJ-309 liquid and BB3-5 plastic. Next, plutonium experiments were performed with stilbene to determine which cleaning algorithm was best for each sample. A clear correlation was found that related the correct method of cleaning to the measured gamma ray-to-neutron ratio. When the measured gamma ray-to-neutron ratio is 10 or below, the template cleaning algorithm is preferred, while the fractional and hybrid cleaning algorithms are preferred when the gamma ray-to-neutron ratio is 100 or greater. Discriminating neutron sources such as Cf-252 or AmLi from SNM samples such as plutonium is a top priority in nonproliferation. We demonstrate that time-correlated experiments, utilizing both PSD-capable plastic

  4. Active Cyber Defense Dynamics Exhibiting Rich Phenomena

    CERN Document Server

    Zheng, Ren; Xu, Shouhuai

    2016-01-01

    The Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In this paper, we explore the rich phenomena that can be exhibited when the defender employs active defense to combat cyber attacks. To the best of our knowledge, this is the first study that shows that {\\em active cyber defense dynamics} (or more generally, {\\em cybersecurity dynamics}) can exhibit the bifurcation and chaos phenomena. This has profound implications for cyber security measurement and prediction: (i) it is infeasible (or even impossible) to accurately measure and predict cyber security under certain circumstances; (ii) the defender must manipulate the dynamics to avoid such {\\em unmanageable situations} in real-life defense operations.

  5. Defense Advanced Research Projects Agency: Strategic Plan

    Science.gov (United States)

    2009-05-01

    ground vehicles, and ships, DARPA’s BioFuels program is working to develop an affordable surrogate for military jet fuel (JP8) derived from oil ...Thermal Exchange Device takes advantage of the special blood vessels in the palm of one’s hand that can readily transfer warmth to or from the bloodstream...rich crops such as rapeseed and other plants, algae, fungi, and bacteria. Initial efforts in the BioFuels program have already delivered BioFuel

  6. Advanced Development for Defense Science and Technology

    Science.gov (United States)

    2010-01-20

    hazard detection in the atmosphere by unmanned air vehicles (UAV). Specifically, the study seeks to discover if and where the placement of sensors on UAV’s can maximize the volume of space that is brought into contact with the sensor. A hybrid gridfree/finite volume numerical flow simulation methodology that is adept at modeling complex flow scenarios provides the basis for the analysis. This study focuses on the use of an unmanned helicopter in collecting particle data. Clear evidence is found that the judicious placement of sensors on the UAV can profoundly affect

  7. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  8. NASAP: a computer code for the evaluation of the Non-proliferation Alternative Systems Assessment Program concepts. Final report in support of Task 2. [PWR; BWR

    Energy Technology Data Exchange (ETDEWEB)

    Maul, B.A.

    1979-09-01

    The Non-Proliferation Alternative Systems Assessment Program (NASAP) computer code was developed to calculate the LWR and NASAP choice reactor cost through an arbitrary year T/sub N/. The final cost is arrived at by calculation of cost contributory factors for both LWR and NASAP choice reactors.

  9. Demonstrating Predictive Confidence for a Paradigm Dissolver Model Using Methods for Evaluating Higher Order Moments: A “Case Study” for Nuclear Nonproliferation

    OpenAIRE

    Peltz, James J.

    2016-01-01

    This dissertation performs sensitivity analysis, uncertainty quantification up to 3rd-order (including covariance and skewness), and forward and inverse predictive modeling for a dissolver model of interest to nonproliferation. The original results presented in this dissertation highlight the effects of uncertainties which necessarily characterize measurements and computations, and the reduction in the predicted uncertainties by combining optimally the experimental and computational information.

  10. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  11. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  12. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  13. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  14. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  15. Nuclear non proliferation and disarmament; Non-proliferation nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    In the framework of the publication of a document on the ''weapons mastership, disarmament and non proliferation: the french action'', by the ministry of Foreign Affairs and the ministry of Defense, the French Documentation organization presents a whole document. This document describes and details the following topics: the conference on the treaty of non proliferation of nuclear weapons, the France, Usa and Non Governmental Organizations position, the threats of the proliferation, the french actions towards the disarmament, the disarmament in the world, a chronology and some bibliographic resources. (A.L.B.)

  16. Nuclear non-proliferation: the U.S. obligation to accept spent fuel from foreign research reactors

    Energy Technology Data Exchange (ETDEWEB)

    Shapar, Howard K.; Egan, Joseph R. [Shaw, Pittman, Potts and Trowbridge (United States)

    1995-12-31

    The U.S. Department of Energy (DOE) had a 35-year program for the sale and receipt (for reprocessing) of high-enriched research reactor fuel for foreign research reactors, executed pursuant to bilateral agreements with nuclear trading partners. In 1988, DOE abruptly let this program lapse, citing environmental obstacles. DOE promised to renew the program upon completion of an environmental review which was to take approximately six months. After three and a half years, an environmental assessment was finally produced.Over a year and half elapsed since publication of the assessment before DOE finally took action to renew the program. The paper sets forth the nuclear non-proliferation and related foreign policy considerations which support renewal of the program. It also summarized the contractual and other commitments made to foreign research reactors and foreign governments and aspects of U.S. environmental law as they apply to continuation of the program. (author).

  17. [Immunohistochemical study of human breast tumors using monoclonal antibodies to intermediate filament proteins (nonproliferating epithelial structures in breast dysplasia)].

    Science.gov (United States)

    Gel'shteĭn, V I; Chipysheva, T A; Litvinova, L V; Ermilova, V D; Bannikov, G A

    1985-01-01

    An immunohistochemical analysis of nonproliferating epithelial structures was carried out in 10 samples of human breast dysplasia and in 4 samples of tissue surrounding mammary gland carcinoma. Monoclonal mouse antibodies against individual prekeratins of rat monolayer epithelial antibodies of clone C12 against rat prekeratin with the molecular mass 49 kilodalton and antibodies of clone E3 against rat prekeratin with the molecular mass 40 kilodalton-monoclonal antibodies against vimentin (clone 30), as well as polyclonal antibodies against smooth muscle myosin and against the basement membrane glycoprotein laminin were used. The lining epithelium of all glandular structures reacted only with C12 antibodies. Two variants of myoepithelial cells containing myosin were detected. Variant I contains myosin and vimentin and is localized in intralobular ducts. Variant 2 contains myosin and prekeratin, recognized by E3 antibodies and is found in extralobular ducts.

  18. The fight against international terrorism and changes in the U.S. nuclear non-proliferation and disarmament strategy

    Directory of Open Access Journals (Sweden)

    Inmaculada Marrero Rocha

    2003-12-01

    Full Text Available This article examines how the the fight against international terrorism, as a new organising principle in U.S. foreign policy and security policy, has conditioned and modified the American conception of and strategy for combatting nuclear arms proliferation. On the one hand, it analyses the concepts of “axis of evil” or “rogue states” as instruments of automatic and forced connection between international terrorism and nuclear armsproliferating states. On the other hand, it also deals with the changes in American nonproliferation and disarmament strategy, characterised by a distrust towards international cooperation and a clear preference for using means of a unilateral nature, which challenge, and even scorn, international institutions and the rules of international law in this area.

  19. THE ROLE AND RATIONALE OF THE NUCLEAR NON-PROLIFERATION TREATY IN THE TWENTY-FIRST CENTURY

    Directory of Open Access Journals (Sweden)

    Tom COPPEN

    2012-12-01

    Full Text Available Much has been written about perceived weaknesses of the NPT and the challenges it has been facing over the last decades. Analysing the most important provisions of the NPT, this article demonstrates how the treaty has managed to maintain its central role in the non-proliferation regime since its conclusion, and how it retains enough flexibility within its review mechanism and its managerial approach to supervision to keep this position for the decades to come. The theoretical framework of the article is formed by theory of arms control law, relevant features of which are: a large influence of politics and national interests of states on the rule of law; its flexible yet treaty-based nature; and the distinctive role of supervision in order to ensure compliance with primary rules. The article analyses key NPT provisions. Based on Article VIII, the NPT Review Conferences have both an important political and legal function. They are the NPT’s mechanism for review, implementation and supervision; in legal terms, they enable the evolution of the NPT based on subsequent agreement and practice. The NPT articles on non-proliferation and disarmament illustrate how the NPT has evolved to close off loopholes (Articles I and II and retains its flexibility whilst providing a global platform for negotiations on nuclear disarmament (Article VI. Article III evolved and must be understood to oblige NPT states to sign an Additional Protocol (AP with the IAEA. Article IV sets the parameters for the peaceful uses of nuclear energy, but leaves room for negotiation and conflict. The supervision of the NPT, illustrated by the case of Iran, is a complicated process involving international organisations such as the IAEA and the UNSC; while these may play important roles, however, the enforcement of the NPT is ultimately left to the NPT states themselves.

  20. TOWARDS FULFILLMENT OF FUNDAMENTAL RULES OF HUMANITARIAN LAW IN THE CONTEXT OF THE NUCLEAR NON-PROLIFERATION TREATY

    Directory of Open Access Journals (Sweden)

    s. Bagheri

    2016-01-01

    Full Text Available The Non-Proliferation Treaty (NPT is an international treaty that should be implemented during both peace and wartime. However, the obligations included in the treaty are dependent upon states' attitudes regarding other issues. Non-use of nuclear weapons is directly related to negotiations done for the purpose of non-proliferation of nuclear weapons, non-production or accumulation by other means and disarmament. In our day, prevention of the proliferation of nuclear weapons has been one of the issues of international law.The present study is of crucial significance due to its endeavor to clarify the general principles of Humanitarian Law in a relationship to the threat of nuclear weapons' up to now, a special norm; significantly limiting or completely prohibiting the use of nuclear weapons, has not been accepted in international law. However, customary international humanitarian law regarding the use of nuclear weapons holds great value because of its purpose in eliminating nuclear weapons as a means of war through ascertaining their non-use and also appeasing the importance of nuclear ascendancy. In this respect, the NPT regime and its relationship with international humanitarian law will be discussed. Firstly, the NPT background, formation, main objectives and principles will be analyzed. In order to evaluate the relationship between the NPT and humanitarian law, the humanitarian obligations in general, humanitarian obligations in the context of the NPT and fulfillmen t of these obligations under the NPT should be studied. One of the main parts of the study is nuclear disarmament obligation included in the NPT. In this section, nuclear disarmament obligation in the context of the NPT and the legal framework of possible, general and comprehensive disarmament will be examined.

  1. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  2. Defense and the Economy

    Science.gov (United States)

    1993-01-01

    AD A 66 28 o’py 9of 27 copiesII AD-A266 288-co, .o,,,, I IDA PAPER P-28 10I * DEFENSE AND THE ECONOMY David R. Graham An-Jen Tai Barbara A...TYPE AND DATES COVERED January 1993 4. TITLE AND SUBTITLE S. FUNDING NUMBERS Defense and the Economy C-MDA 903 89C 0003i...Fomr 298 (Rev 2-4g) 3Preserked by ANSI Sid, Z39- 2I0 I I I IDA PAPER P-2810() 3 DEFENSE AND THE ECONOMY I I David R. Graham An-Jen Tai Barbara A

  3. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  4. Surfing China's National Defense

    Institute of Scientific and Technical Information of China (English)

    Ji Guilin

    2010-01-01

    @@ Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People's Republic of China has logged more than 2 billion hits,from many countries and regions including China, the United States,the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website's Editor in Chief, on its performance and the feedback of netizens.

  5. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  6. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board...

  7. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  8. Implementing nuclear non-proliferation in Finland. Regulatory control, international cooperation and the Comprehensive Nuclear-Test-Ban Treaty. Annual report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Okko, O. (ed.)

    2012-07-01

    The regulatory control of nuclear materials (i.e. nuclear safeguards) is a prerequisite for the peaceful use of nuclear energy in Finland. Safeguards are required for Finland to comply with international agreements on nuclear non-proliferation - mainly the Non-Proliferation Treaty (NPT). This regulatory control is exercised by the Nuclear Materials Section of the Finnish Radiation and Nuclear Safety Authority (STUK). The results of STUK's nuclear safeguards inspection activities in 2011 continued to demonstrate that the Finnish licence holders take good care of their nuclear materials. There were no indications of undeclared nuclear materials or activities and the inspected materials and activities were in accordance with the licence holders' declarations.

  9. EXAMINING THE ROLE AND RESEARCH CHALLENGES OF SOCIAL MEDIA AS A TOOL FOR NONPROLIFERATION AND ARMS CONTROL TREATY VERIFICATION

    Energy Technology Data Exchange (ETDEWEB)

    Henry, Michael J.; Cramer, Nicholas O.; Benz, Jacob M.; Gastelum, Zoe N.; Kreyling, Sean J.; West, Curtis L.

    2014-05-13

    Traditional arms control treaty verification activities typically involve a combination of technical measurements via physical and chemical sensors, state declarations, political agreements, and on-site inspections involving international subject matter experts. However, the ubiquity of the internet, and the electronic sharing of data that it enables, has made available a wealth of open source information with the potential to benefit verification efforts. Open source information is already being used by organizations such as the International Atomic Energy Agency to support the verification of state-declared information, prepare inspectors for in-field activities, and to maintain situational awareness . The recent explosion in social media use has opened new doors to exploring the attitudes, moods, and activities around a given topic. Social media platforms, such as Twitter, Facebook, and YouTube, offer an opportunity for individuals, as well as institutions, to participate in a global conversation at minimal cost. Social media data can also provide a more data-rich environment, with text data being augmented with images, videos, and location data. The research described in this paper investigates the utility of applying social media signatures as potential arms control and nonproliferation treaty verification tools and technologies, as determined through a series of case studies. The treaty relevant events that these case studies touch upon include detection of undeclared facilities or activities, determination of unknown events recorded by the International Monitoring System (IMS), and the global media response to the occurrence of an Indian missile launch. The case studies examine how social media can be used to fill an information gap and provide additional confidence to a verification activity. The case studies represent, either directly or through a proxy, instances where social media information may be available that could potentially augment the evaluation

  10. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  11. Transport of defense compounds from source to sink

    DEFF Research Database (Denmark)

    Jørgensen, Morten Egevang; Nour-Eldin, Hussam Hassan; Halkier, Barbara Ann

    2015-01-01

    Plants synthesize a plethora of defense compounds crucial for their survival in a challenging and changing environment. Transport processes are important for shaping the distribution pattern of defense compounds, albeit focus hitherto has been mostly on their biosynthetic pathways. A recent...... identification of two glucosinolate transporters represents a breakthrough in our understanding of glucosinolate transport in Arabidopsis and has advanced knowledge in transport of defense compounds. In this review, we discuss the role of the glucosinolate transporters in establishing dynamic glucosinolate...... distribution patterns and source-sink relations. We focus on lessons learned from glucosinolate transport that may apply to transport of other defense compounds and discuss future avenues in the emerging field of defense compound transport....

  12. Report of a workshop on nuclear power growth and nonproliferation held at the Woodrow Wilson international center for scholars, Washington, DC, April 21, 2010

    Energy Technology Data Exchange (ETDEWEB)

    Pilat, Joseph F [Los Alamos National Laboratory

    2010-01-01

    The workshop addressed the future of nuclear power and nonproliferation in light of global nuclear energy developments, changing US policy and growing concerns about nuclear proliferation and terrorism. The discussion reflected wide agreement on the need for nuclear power, the necessity of mitigating any proliferation and terrorism risks and support for international cooperation on solutions. There were considerable differences on the nature and extent of the risks of differing fuel cycle choices. There was some skepticism about the prospects for a global nuclear energy renaissance, but there was a recognition that nuclear power would expand somewhat in the decades ahead with some states expanding capacity dramatically (e.g., China) and at least a few new states developing nuclear power programs. It was also argued by some participants that under the right conditions, a genuine renaissance could occur some decades from now. The prospects for a dramatic growth in nuclear power will depend on the ability of governments and industry to address these concerns, including the effectiveness of, and the resources devoted to, plans to develop and implement technologies and approaches that strengthen nonproliferation, nuclear materials accountability and nuclear security Several participants noted that the United States will not be able to continue to lead global nonproliferation efforts and to shape the growth of nuclear power as well as the global environment and energy debates without a robust US nuclear energy program. Some participants argued that fully integrating nuclear energy growth and nonproliferation, proliferation resistance and physical protection objectives was possible. The growing consensus on these objectives and the growing concern about the potential impact of further proliferation on the industry was one reason for optimism. The Blue Ribbon commission led by Scowcroft and Hamilton was seen as going far beyond the need to find an alternative to Yucca

  13. Cooperation in Nuclear Waste Management, Radiation Protection, Emergency Preparedness, Reactor Safety and Nuclear Non-Proliferation in Eastern Europe

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, Lars van; Delalic, Zlatan; Ekblad, Christer; Keyser, Peter; Turner, Roland; Rosengaard, Ulf; German, Olga; Grapengiesser, Sten; Andersson, Sarmite; Sandberg, Viviana; Olsson, Kjell; Stenberg, Tor

    2009-10-15

    The Swedish Radiation Safety Authority (SSM) is trusted with the task of implementing Sweden's bilateral assistance to Russia, Ukraine, Georgia, Belarus and Armenia in the fields of reactor safety, nuclear waste management, nuclear non-proliferation as well as radiation protection and emergency preparedness. In these fields, SSM also participates in various projects financed by the European Union. The purpose of this project-oriented report is to provide the Swedish Government and other funding agencies as well as other interested audiences in Sweden and abroad with an encompassing understanding of our work and in particular the work performed during 2008. the activities are divided into four subfields: Nuclear waste management; Reactor safety; Radiation safety and emergency preparedness; and, Nuclear non-proliferation. SSM implements projects in the field of spent nuclear fuel and radioactive waste management in Russia. The problems in this field also exist in other countries, yet the concentration of nuclear and radioactive materials are nowhere higher than in north-west Russia. And given the fact that most of these materials stem from the Cold War era and remain stored under conditions that vary from 'possibly acceptable' to 'wildly appalling' it is obvious that Sweden's first priority in the field of managing nuclear spent fuel and radioactive waste lies in this part of Russia. The prioritisation and selection of projects in reactor safety are established following thorough discussions with the partners in Russia and Ukraine. For specific guidance on safety and recommended safety improvements at RBMK and VVER reactors, SSM relies on analyses and handbooks established by the IAEA in the 1990s. In 2008, there were 16 projects in reactor safety. SSM implements a large number of projects in the field of radiation protection and emergency preparedness. The activities are at a first glance at some distance from the activities covered and

  14. Biosafety and biosecurity as essential pillars of international health security and cross-cutting elements of biological nonproliferation

    Directory of Open Access Journals (Sweden)

    Perkins Dana

    2010-12-01

    Full Text Available Abstract The critical aspects of biosafety, biosecurity, and biocontainment have been in the spotlight in recent years. There have also been increased international efforts to improve awareness of modern practices and concerns with regard to the safe pursuit of life sciences research, and to optimize current oversight frameworks, thereby resulting in decreased risk of terrorist/malevolent acquisition of deadly pathogens or accidental release of a biological agent, and increased safety of laboratory workers. Our purpose is to highlight how the World Health Organization’s (WHO revised International Health Regulations (IHR[2005], the Biological Weapons Convention (BWC, and the United Nations Security Council Resolution (UNSCR 1540 overlap in their requirements with regard to biosafety and biosecurity in order to improve the understanding of practitioners and policymakers and maximize the use of national resources employed to comply with internationally-mandated requirements. The broad range of goals of these international instruments, which are linked by the common thread of biosafety and biosecurity, highlight their significance as essential pillars of international health security and cross-cutting elements of biological nonproliferation. The current efforts of the Republic of Georgia to enhance biosafety and biosecurity in accordance with these international instruments are summarized.

  15. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  16. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  17. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  18. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  19. Robust Preallocated Preferential Defense.

    Science.gov (United States)

    1985-08-01

    Frye , W.H. and Ullman, L.L., Methodology for Calculating Minuteman Defense Effectiveness, SRD-EGI4, Stanford Research Institute, October 1973. 4. Hogg...Corporation 1500 Wilson Boulevard Arlington, VA 22209 ATTN: Dr. Tucker Battle Dr. James Skouras Dr. Iram Weinstein Northrop Corporation 8900 E. Washington

  20. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record

  1. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  2. RISK-INFORMED BALANCING OF SAFETY, NONPROLIFERATION, AND ECONOMICS FOR THE SFR

    Energy Technology Data Exchange (ETDEWEB)

    Apostolakis, George; Driscoll, Michael; Golay, Michael; Kadak, Andrew; Todreas, Neil; Aldmir, Tunc; Denning, Richard; Lineberry, Michael

    2011-10-20

    A substantial barrier to the implementation of Sodium-cooled Fast Reactor (SFR) technology in the short term is the perception that they would not be economically competitive with advanced light water reactors. With increased acceptance of risk-informed regulation, the opportunity exists to reduce the costs of a nuclear power plant at the design stage without applying excessive conservatism that is not needed in treating low risk events. In the report, NUREG-1860, the U.S. Nuclear Regulatory Commission describes developmental activities associated with a risk-informed, scenario-based technology neutral framework (TNF) for regulation. It provides quantitative yardsticks against which the adequacy of safety risks can be judged. We extend these concepts to treatment of proliferation risks. The objective of our project is to develop a risk-informed design process for minimizing the cost of electricity generation within constraints of adequate safety and proliferation risks. This report describes the design and use of this design optimization process within the context of reducing the capital cost and levelized cost of electricity production for a small (possibly modular) SFR. Our project provides not only an evaluation of the feasibility of a risk-informed design process but also a practical test of the applicability of the TNF to an actual advanced, non-LWR design. The report provides results of five safety related and one proliferation related case studies of innovative design alternatives. Applied to previously proposed SFR nuclear energy system concepts We find that the TNF provides a feasible initial basis for licensing new reactors. However, it is incomplete. We recommend improvements in terms of requiring acceptance standards for total safety risks, and we propose a framework for regulation of proliferation risks. We also demonstrate methods for evaluation of proliferation risks. We also suggest revisions to scenario-specific safety risk acceptance standards

  3. Research on the Field Distribution and Technical Potential of Information Technology in the United States In the Case of US Defense Advanced Research Proj ects Agency (DARPA)%美国信息技术领域分布与技术潜能研究以美国国防高级研究计划局(DARPA)为例∗

    Institute of Scientific and Technical Information of China (English)

    贾珍珍

    2016-01-01

    以美国国防高级研究计划局(DARPA)为例,从DARPA对信息技术的领域分布、技术潜能与影响方面,对美国信息技术的发展情况进行探讨,并在最后提出信息技术对于我国军事技术发展的有关思考。%The US Defense Advanced Research Proj ects Agency (DARPA)was used as an example. from the fields of information technology distribution,potential technology in DARPA,the development of the US information technology was discussed,and the final related thinking about information technolo-gy for the development of China's military technology was proposed.

  4. Insect response to plant defensive protease inhibitors.

    Science.gov (United States)

    Zhu-Salzman, Keyan; Zeng, Rensen

    2015-01-07

    Plant protease inhibitors (PIs) are natural plant defense proteins that inhibit proteases of invading insect herbivores. However, their anti-insect efficacy is determined not only by their potency toward a vulnerable insect system but also by the response of the insect to such a challenge. Through the long history of coevolution with their host plants, insects have developed sophisticated mechanisms to circumvent antinutritional effects of dietary challenges. Their response takes the form of changes in gene expression and the protein repertoire in cells lining the alimentary tract, the first line of defense. Research in insect digestive proteases has revealed the crucial roles they play in insect adaptation to plant PIs and has brought about a new appreciation of how phytophagous insects employ this group of molecules in both protein digestion and counterdefense. This review provides researchers in related fields an up-to-date summary of recent advances.

  5. Avian host defense peptides.

    Science.gov (United States)

    Cuperus, Tryntsje; Coorens, Maarten; van Dijk, Albert; Haagsman, Henk P

    2013-11-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense of many organisms. It is becoming increasingly clear that in the animal kingdom the functions of HDPs are not confined to direct antimicrobial actions. Research in mammals has indicated that HDPs have many immunomodulatory functions and are also involved in other physiological processes ranging from development to wound healing. During the past five years our knowledge about avian HDPs has increased considerably. This review addresses our current knowledge on the evolution, regulation and biological functions of HDPs of birds.

  6. Historical Survey of Nuclear Non-Proliferation Treaty%《不扩散核武器条约》的历史审视

    Institute of Scientific and Technical Information of China (English)

    费赫夫

    2012-01-01

    Although Nuclear Non-Proliferation Treaty is a product of power politics, it objectively plays an active role in the prevention of nuclear proliferation. As the foundation stone of nuclear non-proliferation regime, the treaty has experienced a lot of severe tests and nowadays is facing many challenges, which will have a bright future. In order to achieve the goal of Nuclear Non-Proliferation Treaty, nuclear disarmament and the right of non-nuclear states to peacefully use nuclear energy should be paid more attention in the future. Only in this way can the glorious desire of nuclear-free world be realized.%《不扩散核武器条约》虽然是强权政治的产物,但它在客观上为防止核扩散起着积极作用,是核不扩散体制的基石。该条约经历了许多严峻的考验,当今也面临不少的挑战,不扩散核武器条约的未来还是美好的。为了实现不扩散核武器条约的目标,今后更应关注核裁军和无核国家和平利用核能的权利。只有这样,无核世界的美好愿望才能实现。

  7. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  8. Defensive Minefield Planning

    Science.gov (United States)

    1989-06-01

    Minefield Planning by Carlos Vallejo Game Lieutenant, Ecuadorian Navy B. S., Escuela Superior Naval, Ecuador 1980 Submitted in partial fulfillment of...was a superior open-ocean naval force to the North Koreans, defensive minewarfare was able to, at least temporarily, defeat U.S. Navy objectives in...Oswaldo Rosero 1 Unit 8 Coastal Route 1 Monterey, California 93940 77 11. Office of the N’aval Attache 4 Direccion de Educacion 2535 15th. st. N. W

  9. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  10. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  11. Defense Modernization Plans Through the 2020s: Addressing the Bow Wave

    Science.gov (United States)

    2016-04-30

    Johns Hopkins University’s School of Advanced International Studies. He is a term member of the Council on Foreign Relations and was named one of...45 p.m. Chair: Andrew Hunter, Senior Fellow in the International Security Program, Director of Defense-Industrial Initiatives Group, Center for...Strategic International Studies Defense Modernization Plans Through the 2020s: Addressing the Bow Wave Todd Harrison, Director, Defense Budget Analysis

  12. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections.

  13. Hormone defense networking in rice: tales from a different world.

    Science.gov (United States)

    De Vleesschauwer, David; Gheysen, Godelieve; Höfte, Monica

    2013-10-01

    Recent advances in plant immunity research underpin the pivotal role of small-molecule hormones in regulating the plant defense signaling network. Although most of our understanding comes from studies of dicot plants such as Arabidopsis thaliana, new studies in monocots are providing additional insights into the defense-regulatory role of phytohormones. Here, we review the roles of both classical and more recently identified stress hormones in regulating immunity in the model monocot rice (Oryza sativa) and highlight the importance of hormone crosstalk in shaping the outcome of rice-pathogen interactions. We also propose a defense model for rice that does not support a dichotomy between the pathogen lifestyle and the effectiveness of the archetypal defense hormones salicylic acid (SA) and jasmonic acid (JA).

  14. Defense Advanced Research Projects Agency Fiscal Year 1982 Research & Development Program. Summary Statement by Dr. Robert R. Fossum, Director Before the Research & Development Subcommittee of the House Armed Services Committee

    Science.gov (United States)

    1981-03-12

    methodology offers a structured search for technical innovations or concepts within the private sector that alleviates many of the negative psychological ...wmunications and Control Technology 35.3 41.6 44.2 Distributed Information System (l") (T) T r( ) Advanced Comunications i Control & S IComunications

  15. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  16. Constructing a large-scale 3D Geologic Model for Analysis of the Non-Proliferation Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Wagoner, J; Myers, S

    2008-04-09

    We have constructed a regional 3D geologic model of the southern Great Basin, in support of a seismic wave propagation investigation of the 1993 Nonproliferation Experiment (NPE) at the Nevada Test Site (NTS). The model is centered on the NPE and spans longitude -119.5{sup o} to -112.6{sup o} and latitude 34.5{sup o} to 39.8{sup o}; the depth ranges from the topographic surface to 150 km below sea level. The model includes the southern half of Nevada, as well as parts of eastern California, western Utah, and a portion of northwestern Arizona. The upper crust is constrained by both geologic and geophysical studies, while the lower crust and upper mantle are constrained by geophysical studies. The mapped upper crustal geologic units are Quaternary basin fill, Tertiary deposits, pre-Tertiary deposits, intrusive rocks of all ages, and calderas. The lower crust and upper mantle are parameterized with 5 layers, including the Moho. Detailed geologic data, including surface maps, borehole data, and geophysical surveys, were used to define the geology at the NTS. Digital geologic outcrop data were available for both Nevada and Arizona, whereas geologic maps for California and Utah were scanned and hand-digitized. Published gravity data (2km spacing) were used to determine the thickness of the Cenozoic deposits and thus estimate the depth of the basins. The free surface is based on a 10m lateral resolution DEM at the NTS and a 90m lateral resolution DEM elsewhere. Variations in crustal thickness are based on receiver function analysis and a framework compilation of reflection/refraction studies. We used Earthvision (Dynamic Graphics, Inc.) to integrate the geologic and geophysical information into a model of x,y,z,p nodes, where p is a unique integer index value representing the geologic unit. For seismic studies, the geologic units are mapped to specific seismic velocities. The gross geophysical structure of the crust and upper mantle is taken from regional surface

  17. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  18. Proceedings of the Symposium on the Non-Proliferation Experiment: Results and Implications for Test Ban Treaties, Rockville, Maryland, April 19-21, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Denny, Marvin D

    1994-01-01

    To address a critical verification issue for the current Non-Proliferation Treaty (NPT) and for a possible future Comprehensive Test Ban Treaty (CTBT), the Department of Energy sought to measure certain differences between an underground nuclear test and a chemical test in the same geology, so that other explosions could be identified. This was done in a field experiment code-named the NonProliferation Experiment (NPE).This comprehensive experiment was designed to determine the signatures of chemical explosions for a broad range of phenomena for comparison with those of previous nuclear tests. If significant differences can be measured, then these measures can be used to discriminate between the two types of explosions. In addition, when these differences are understood, large chemical explosions can be used to seismically calibrate regions to discriminate earthquakes from explosions. Toward this end, on-site and off-site measurements of transient phenomena were made, and on-site measurements of residual effects are in progress.Perhaps the most striking result was that the source function for the chemical explosion was identical to that of a nuclear one of about twice the yield. These proceedings provide more detailed results of the experiment.

  19. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  20. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  1. Defensive engagement and perceptual enhancement

    OpenAIRE

    Keil, Andreas; Bradley, Margaret M; Ihssen, Niklas; Heim, Sabine; Vila, Jaime; Guerra, Pedro; Lang, Peter J.

    2010-01-01

    We tested whether visual cortical sensitivity to external cues in the context of an acute defensive reaction is heightened or attenuated. A strong cardiac defense (fear) response was elicited by presenting an abrupt, loud acoustic stimulus following a 10-minute period of quiescence. Electrocortical responses to aversive and neutral pictures following defensive stimulus onset were measured using dense-array EEG. Pictures were flickered at 12.5 Hz to evoke steady-state visual evoked potentials ...

  2. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  3. Department of Defense Research, Development, Test, and Evaluation (RDT and E): Appropriations Structure

    Science.gov (United States)

    2016-12-13

    Department of Defense Research , Development , Test, and Evaluation (RDT&E): Appropriations Structure John F. Sargent Jr. Specialist in...Congressional Research Service Summary The Department of Defense (DOD) conducts research , development , testing, and evaluation (RDT&E) in support...is for applied research ; 6.3 is for advanced technology development ; 6.4 is for advanced component development and prototypes; 6.5 is for systems

  4. Thinking on using advanced technology to defense the academic misconduct in academic journals%学术期刊利用先进技术防范学术不端行为的思考

    Institute of Scientific and Technical Information of China (English)

    刘丽

    2014-01-01

    学术不端文献检测系统(AMLC)开辟了采用技术手段防范学术不端的新方法。我们编辑部于2010年启用学术不端文献检测系统,用于对学报稿件进行初审和终审辅助工作。本文结合期刊界近些年使用比较普遍的学术不端检测系统--知网检测系统在学报的使用情况,总结系统特点、优势和使用过程中的体会,分析了目前存在的问题,提出改进建议,以期对我们在实际应用中,更好地把握和判断学术不端起到一个很好的提示和促进作用。%Academic misconduct literature detection system provides a new technical method to defense the academic misconduct, our editorial department has used it since 2010 to aid our editorial work for the manuscript’s first examination and final editing. Combining with the usage situation of the widely used China National Knowledge Infrastructure (CNKI) AMLC system in recent years, this paper summarizes its characteristics, existing problems, advantages and our using experience to the system, and puts forward suggestions for improvement in order to better promote the understanding and judgment to the academic misconduct in the actual application.

  5. Multilateral Cooperation on Nonproliferation

    Science.gov (United States)

    2012-10-01

    denuclearization , see Jeffrey W. Knopf, “The Importance of International Learning,” Review of International Studies 29, no. 2 (April 2003), 187-209...weapons or the denuclearization of Ukraine, Kazakhstan, and Belarus. She noted that, in contrast to other cases that are multilateral, CTR was...confidence that they could effectively verify mutual denuclearization . ABACC was not sufficient to persuade the rest of the international community about

  6. The Nonproliferation Review

    Energy Technology Data Exchange (ETDEWEB)

    RAJEN,GAURAV; BIRINGER,KENT L.

    2000-07-28

    The aim of this paper is to understand the numerous nuclear-related agreements that involve India and Pakistan, and in so doing identify starting points for future confidence-creating and confidence-building projects. Existing nuclear-related agreements provide a framework under which various projects can be proposed that foster greater nuclear transparency and cooperation in South Asia. The basic assumptions and arguments underlying this paper can be summarized as follows: (1) Increased nuclear transparency between India and Pakistan is a worthwhile objective, as it will lead to the irreversibility of extant nuclear agreements, the prospects of future agreements; and the balance of opacity and transparency required for stability in times of crises; (2) Given the current state of Indian and Pakistani relations, incremental progress in increased nuclear transparency is the most likely future outcome; and (3) Incremental progress can be achieved by enhancing the information exchange required by existing nuclear-related agreements.

  7. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    most senior level—the only one that matters in Russian decisionmaking cul - ture—is also of significance today and will also be re- ferred to later in... org /missile-defense/us-ballistic-missile-defense/p30607. 9. Email exchange with author, July 2013. 10. “Safeguard,” Washington, DC: Federation of Ameri

  8. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  9. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  10. Defense Strategies Against Modern Botnets

    CERN Document Server

    Stankovic, Srdjan

    2009-01-01

    Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.

  11. Quadrennial Defense Review and Ballistic Missile Defense Review

    Science.gov (United States)

    2010-03-11

    global defense posture 3 BMDR Highlights • Outlines a strategy and policy framework to – Defend the homeland against limited ballistic missile attack...abroad – Collaborate closely with allies and partners – Pursue a cooperative and tailored global defense posture – Strengthen US civilian capacity...reviews in 2010 – QDR and BMDR released February 1, 2010 – Nuclear Posture Review to be released this spring – Space Posture Review, with Director of

  12. Nuclear Fuel Cycle Reasoner: PNNL FY12 Report

    Energy Technology Data Exchange (ETDEWEB)

    Hohimer, Ryan E.; Pomiak, Yekaterina G.; Neorr, Peter A.; Gastelum, Zoe N.; Strasburg, Jana D.

    2013-05-03

    Building on previous internal investments and leveraging ongoing advancements in semantic technologies, PNNL implemented a formal reasoning framework and applied it to a specific challenge in nuclear nonproliferation. The Semantic Nonproliferation Analysis Platform (SNAP) was developed as a preliminary graphical user interface to demonstrate the potential power of the underlying semantic technologies to analyze and explore facts and relationships relating to the nuclear fuel cycle (NFC). In developing this proof of concept prototype, the utility and relevancy of semantic technologies to the Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D) has been better understood.

  13. Defense Laboratory Enterprise

    Science.gov (United States)

    2011-07-01

    Effects, Modeling and Simulation • Systems • Mission • Directed Energy Effects Kirtland AFB, New Mexico North Oscura Peak and Salinas...Range Laser and Optics Laboratories (North Oscura Peak (NOP) and Salinas Peak), New Mexico These laboratories are designed to evaluate advanced sensor...capabilities include vacuum: 5 x 10-7 Torr ; Ultraviolet: 1-3 EUVS; Temperature: 80°F - 150°F; Electron: 1012e-/cm/sec @ up to 20 KeVs. It provides space

  14. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  15. Defense Spending and the Economy

    Science.gov (United States)

    1983-12-07

    the first resolution. Our forecast projects continued growth in the economy and moderate inflation for one or possibly two years, despite federal...than provided in the resolution. Additional emphasis on defense would, of course, promote defense-intensive sectors of the economy at the expense of...others, but CBO believes the economy could accommodate such shifts without significant adverse effects on macroeconomic variables such as employment

  16. Theater Missile Defense Integration Issues

    Science.gov (United States)

    1993-06-01

    high endoatmospheric defense interceptor (HEDI) proposed t earlier. EADTB. Extended Air Defense Test Bed. A computer-based analysis center for...for attacking deeper elements of an aggressors’s ground forces. Known in NATO as Follow-on Force Attack ( FOFA ). JSTARS. Joint surveillance target...AFIA/INKS ATTN. INKS AFIS/INT ATTN: INT AIR hORCE CTR FOR STUDIES & ANALYSIS ATTN: AFSAA/SAKI 9 Dist-1 w^mmmm mmmm^-mmmemH

  17. 32 CFR 37.1210 - Advanced research.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Advanced research. 37.1210 Section 37.1210... research. Research that creates new technology or demonstrates the viability of applying existing technology to new products and processes in a general way. Advanced research is most closely analogous...

  18. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  19. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  20. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  1. Defense Systems Management Review. Volume I, Number 4. Autumn 1977

    Science.gov (United States)

    1977-10-03

    LEAD SERVICE DETERMINATION AND JSOR GENERATION The Department of Defense has become increasingly involved with reducing prolifera- tion of...development of a joint requirement. • Required the generation of a joint serv- ice operational requirement ( JSOR ) within 60 working days. *Air Munitions...prepara- tion and coordination of the JSOR . • Authorized both service-advanced de- velopment efforts to continue through fiscal year 1974. The

  2. Offset Implementations for Turkey’s International Defense Acquisitions

    Science.gov (United States)

    2008-12-01

    INTENTIONALLY LEFT BLANK xiii LIST OF TABLES Table 1. Some Examples of “Market Imperfections and Failures” in Defense (From Gansler, 1980, p. 30...AMSL Airbus Military Sociedad Limitada ASEAN Association of Southeast Asian Nations ASTOVL Advanced Short Takeoff And Vertical Landing BDMA British...company was re-structured under its current name, Airbus Military SL ( Sociedad Limitada) prior to the contract signature in May 2003. Its shareholders

  3. American alliances and nuclear non-proliferation. The end of nuclear weapon activities of US allies; Amerikanische Allianzen und nukleare Nichtverbreitung. Die Beendigung von Kernwaffenaktivitaeten bei Verbuendeten der USA

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Jonas

    2016-07-01

    Jonas Schneider tackles a question that is of great interest both to scholars of nuclear proliferation and to practitioners of nonproliferation diplomacy: Why do some political leaders of U.S. allies agree to abandon their nation's nuclear weapons activities, while others - who are often members of the same allied government and sometimes even of the same political party - steadfastly reject such a course reversal? Our existing stock of theories does not fare well in accounting for this important variation in leaders' attitudes. To solve this puzzle, Schneider develops an innovative theory that draws on the individual status conceptions of allied political leaders. Subsequently, the author undertakes to test his theory using four thoroughly researched case studies, and he derives important lessons for international nonproliferation diplomacy toward the Middle East and Northeast Asia.

  4. Analyzing Department of Defense's use of other transactions as a method for accessing non-traditional technology

    OpenAIRE

    Gilliland, John E.

    2001-01-01

    As U.S. Defense budgets and military research and development spending experienced significant decline between 1988 and 1998, the Defense Technology and Industrial Base essentially merged with the national industrial base. DOD reform occurred more slowly than changes in the private sector fueled by advances in technology. U.S. national security relies upon the ability of the military to maintain technological superiority. To attract advanced technology companies that normally do not participa...

  5. Accountability and non-proliferation nuclear regime: a review of the mutual surveillance Brazilian-Argentine model for nuclear safeguards; Accountability e regime de nao proliferacao nuclear: uma avaliacao do modelo de vigilancia mutua brasileiro-argentina de salvaguardas nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, Roberto Salles

    2014-08-01

    The regimes of accountability, the organizations of global governance and institutional arrangements of global governance of nuclear non-proliferation and of Mutual Vigilance Brazilian-Argentine of Nuclear Safeguards are the subject of research. The starting point is the importance of the institutional model of global governance for the effective control of non-proliferation of nuclear weapons. In this context, the research investigates how to structure the current arrangements of the international nuclear non-proliferation and what is the performance of model Mutual Vigilance Brazilian-Argentine of Nuclear Safeguards in relation to accountability regimes of global governance. For that, was searched the current literature of three theoretical dimensions: accountability, global governance and global governance organizations. In relation to the research method was used the case study and the treatment technique of data the analysis of content. The results allowed: to establish an evaluation model based on accountability mechanisms; to assess how behaves the model Mutual Vigilance Brazilian-Argentine Nuclear Safeguards front of the proposed accountability regime; and to measure the degree to which regional arrangements that work with systems of global governance can strengthen these international systems. (author)

  6. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes.

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens.

  7. Adaptation Mechanisms in the Evolution of Moss Defenses to Microbes

    Science.gov (United States)

    Ponce de León, Inés; Montesano, Marcos

    2017-01-01

    Bryophytes, including mosses, liverworts and hornworts are early land plants that have evolved key adaptation mechanisms to cope with abiotic stresses and microorganisms. Microbial symbioses facilitated plant colonization of land by enhancing nutrient uptake leading to improved plant growth and fitness. In addition, early land plants acquired novel defense mechanisms to protect plant tissues from pre-existing microbial pathogens. Due to its evolutionary stage linking unicellular green algae to vascular plants, the non-vascular moss Physcomitrella patens is an interesting organism to explore the adaptation mechanisms developed in the evolution of plant defenses to microbes. Cellular and biochemical approaches, gene expression profiles, and functional analysis of genes by targeted gene disruption have revealed that several defense mechanisms against microbial pathogens are conserved between mosses and flowering plants. P. patens perceives pathogen associated molecular patterns by plasma membrane receptor(s) and transduces the signal through a MAP kinase (MAPK) cascade leading to the activation of cell wall associated defenses and expression of genes that encode proteins with different roles in plant resistance. After pathogen assault, P. patens also activates the production of ROS, induces a HR-like reaction and increases levels of some hormones. Furthermore, alternative metabolic pathways are present in P. patens leading to the production of a distinct metabolic scenario than flowering plants that could contribute to defense. P. patens has acquired genes by horizontal transfer from prokaryotes and fungi, and some of them could represent adaptive benefits for resistance to biotic stress. In this review, the current knowledge related to the evolution of plant defense responses against pathogens will be discussed, focusing on the latest advances made in the model plant P. patens. PMID:28360923

  8. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2017-03-12

    markings are indicated, follow agency authorization procedures, e.g. RD/FRD, PROPIN, ITAR, etc. Include copyright information. 13. SUPPLEMENTARY...Continuous measurements from our lactate sensors were compared to blood lactate measured by gold- standard bench -top analyzers and found to be in the

  9. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2014-02-04

    and human tracheas, with visualization around the entire circumference of the airway, and high resolution visualization of subsurface tissue layers...lumen of excised pig and human tracheas, with visualization around the entire circumference of the airway, and high resolution visualization of...Optical Coherence Tomography in the Rabbit,” JAMA Otolaryngol. Head Neck Surg. 139, 503-8 (2013). 16. Liu, G., W. Jia, V. Sun, B. Choi and Z. Chen

  10. Department of Defense Chemical and Biological Defense Programs: DoD Advance Planning Briefing for Industry

    Science.gov (United States)

    2013-05-16

    deadly diseases . We’ll increase funding to help states and communities train and equip our heroic police and firefighters. ” President George W...Tech Development - Adv Dev for CB Prep at Univ of Med & Dentistry of NJ - Miniaturization of CB Detectors - Biodefense Statewide Med Response - Bio...call for a decisive victory in one of those conflicts- including the possibility of regime change or occupation ; and Conduct a limited number of

  11. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  12. Cooperation in Nuclear Waste Management, Radiation Protection, Emergency Preparedness, Reactor Safety and Nuclear Non-Proliferation with the Russian Federation, Ukraine, Armenia, Georgia and Belarus.

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, Lars van; Andersson, Sarmite; Bejarano, Gabriela; Delalic, Zlatan; Ekblad, Christer; German, Olga; Grapengiesser, Sten; Karlberg, Olof; Olsson, Kjell; Sandberg, Viviana; Stenberg, Tor; Turner, Roland; Zinger, Irene

    2010-06-15

    The Swedish Radiation Safety Authority (SSM) is trusted with the task of implementing Sweden's bilateral cooperation with Russia, Ukraine, Georgia, Belarus and Armenia in the fields of reactor safety, nuclear waste management, nuclear non-proliferation as well as radiation protection and emergency preparedness. In these fields, SSM also participates in a number of projects financed by the European Union. This report gives an overview of the cooperation projects in 2009 as well as the framework in which they are performed. Summaries of each project are given in an Appendix. The project managers in the Section for Cooperation and Development in the Department of International Affairs are responsible for the cooperation projects and the implementation of the bilateral programmes. But the positive outcome of the projects is also dependent on a large number of experts at SSM who work with the regulatory functions in the nuclear and radiation protection fields in a Swedish context as well as on external consultants. Together, their experience is invaluable for the implementation of the projects. But the projects also give experience of relevance for the SSM staff.

  13. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  14. Defense Financial and Investment Review

    Science.gov (United States)

    1985-06-01

    to direct its attention to problems such as profit policy and the management and investment practices of defense contractors. Prorit Study 󈨖 In 1982...I \\-L 10 NO ADJUSTMENT 46- 70 71 72 73 74 75 76 77 78 79 80 81 82 83 Sources: Touche Ross; Prorit 󈨐 V-34

  15. In Defense of Darwin's Theory.

    Science.gov (United States)

    Naylor, Bruce G.; Handford, Paul

    1985-01-01

    Examines issues regarding the defensibility and utility of natural selection as a scientific theory, focusing on the process of population change over time. Topics considered include criticisms of Darwinian theory, tautology and the meaning of fitness, the ability of theories to predict and explain, and the sufficiency of natural selection. (DH)

  16. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  17. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  18. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  19. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  20. Multidimensional Perfectionism and Ego Defenses

    Science.gov (United States)

    Dickinson, Wendy L.; Ashby, Jeffrey S.

    2005-01-01

    This study examined the relationship between multidimensional perfectionism and ego defense style among 130 college students. Cluster analysis results facilitated the identification of groups of adaptive perfectionists, maladaptive perfectionists, and non-perfectionists. The researchers found that identified maladaptive perfectionists used…

  1. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  2. Inflation Adjustments for Defense Acquisition

    Science.gov (United States)

    2014-10-01

    Airframe Total airframe contractor furnished equipment ( CFE ) Total airframe CFE 9 entries (forward fuselage, center fuselage, wing, empennage...etc.) Avionics Total electronics CFE and government- furnished equipment (GFE) Total avionics 16 entries (radar, integrated processor...Relationship CFE Contractor Furnished Equipment CNI Communication, Navigation, Identification DoD Department of Defense FCCM Facilities Capital Cost

  3. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  4. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  5. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  6. Does investment in leaf defenses drive changes in leaf economic strategy? A focus on whole-plant ontogeny.

    Science.gov (United States)

    Mason, Chase M; Donovan, Lisa A

    2015-04-01

    Leaf defenses have long been studied in the context of plant growth rate, resource availability, and optimal investment theory. Likewise, one of the central modern paradigms of plant ecophysiology, the leaf economics spectrum (LES), has been extensively studied in the context of these factors across ecological scales ranging from global species data sets to temporal shifts within individuals. Despite strong physiological links between LES strategy and leaf defenses in structure, function, and resource investment, the relationship between these trait classes has not been well explored. This study investigates the relationship between leaf defenses and LES strategy across whole-plant ontogeny in three diverse Helianthus species known to exhibit dramatic ontogenetic shifts in LES strategy, focusing primarily on physical and quantitative chemical defenses. Plants were grown under controlled environmental conditions and sampled for LES and defense traits at four ontogenetic stages. Defenses were found to shift strongly with ontogeny, and to correlate strongly with LES strategy. More advanced ontogenetic stages with more conservative LES strategy leaves had higher tannin activity and toughness in all species, and higher leaf dry matter content in two of three species. Modeling results in two species support the conclusion that changes in defenses drive changes in LES strategy through ontogeny, and in one species that changes in defenses and LES strategy are likely independently driven by ontogeny. Results of this study support the hypothesis that leaf-level allocation to defenses might be an important determinant of leaf economic traits, where high investment in defenses drives a conservative LES strategy.

  7. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this...

  8. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to foreign persons, whether in the United States or abroad in the design, development, engineering... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9...

  9. Defense Procurement Strategy for a Globalized Industry

    Science.gov (United States)

    2007-11-02

    QDR,” DefenseNews, 8 November 2004, p. 4. 3 Vago Muradain, “Finalizing Transformation,” DefenseNews, 8 November 2004, p. 34. 4 Hugo Posey and Ben...Interavia, Summer 2004, 34-36. Munton, Bob, and Brinley Salzmann. “U.K.’s Growing Contols.” DefenseNews, 25 October 2004, 96. Muradain, Vago

  10. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO should establishmetrics for this assessment. Include Cyber Preparedness in...DoD should evaluate the effectiveness of the resulting defense posturethrough the CCMDs with measurement feedback to the leadership. The DoD CIO...USCYBERCOM Welcome Maj Keffer, USCYBERCOM Chief of Staff Cyber Portfolio Management Decisions Mr. Terry Carter, Deputy Director, Capabilities and Resource

  11. Advanced CCD camera developments

    Energy Technology Data Exchange (ETDEWEB)

    Condor, A. [Lawrence Livermore National Lab., CA (United States)

    1994-11-15

    Two charge coupled device (CCD) camera systems are introduced and discussed, describing briefly the hardware involved, and the data obtained in their various applications. The Advanced Development Group Defense Sciences Engineering Division has been actively designing, manufacturing, fielding state-of-the-art CCD camera systems for over a decade. These systems were originally developed for the nuclear test program to record data from underground nuclear tests. Today, new and interesting application for these systems have surfaced and development is continuing in the area of advanced CCD camera systems, with the new CCD camera that will allow experimenters to replace film for x-ray imaging at the JANUS, USP, and NOVA laser facilities.

  12. Homeland Defense: DOD Needs to Address Gaps in Homeland Defense and Civil Support Guidance

    Science.gov (United States)

    2012-10-01

    tornado, storm, high water , wind-driven water , tidal wave, tsunami, earthquake, volcanic eruption , landslide, mudslide, snowstorm, or drought), or...Secretary of Defense and the Office of the Under Secretary of Defense for Policy on homeland defense and civil support matters, among other things. The...Assistant Secretary of Defense for Global Strategic Affairs is the principal advisor to the Under Secretary of Defense for Policy and the Secretary

  13. Austere Defense: Challenges and Opportunities

    Science.gov (United States)

    2014-01-01

    military advice while acquiescing to divestitures, and effectively executing the austere defense cuts required by current law through 2019 and...Could it be that our assessments of risk have, over time, become too conservative? In- deed, even with the effects of full sequestration the United... crunch . Look- ing at overhead, as Douglas Macgregor of Politico magazine reminds us, during World War II, only four four-star generals commanded a

  14. Western Hemisphere Defense Policy Statement

    Science.gov (United States)

    2012-10-01

    El Salvador, Guatemala, Honduras , Paraguay, Peru and Uruguay have contributed to or led multi-national security operations and United Nations (UN...impact on regional and global peace and security and reflect the new realities of defense cooperation in the hemisphere. Working with Canada and...Mexico, DoD remains prepared to deter and defeat direct threats to our homeland. We partner with Canada on regional security issues such as an evolving

  15. Application of Defense Technology Commonly Used in Boxing Match

    Institute of Scientific and Technical Information of China (English)

    Zhixiao Li[1; Jianjun Liu[2

    2015-01-01

    Boxing defense technology is a kind of techniques to prevent the opponent from attacking successfully. Boxing is a kind of sports that needs close cooperation between attack and defense. Attack is used for defense, where there is no attack, there will be no defense, and vice versa. Defense technology is the foundation of attack technology, therefore, defense is of vital importance in boxing match.

  16. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  17. Advances in upper extremity prosthetics.

    Science.gov (United States)

    Zlotolow, Dan A; Kozin, Scott H

    2012-11-01

    Until recently, upper extremity prostheses had changed little since World War II. In 2006, the Defense Advanced Research Projects Agency responded to an increasing number of military amputees with the Revolutionizing Prosthetics program. The program has yielded several breakthroughs both in the engineering of new prosthetic arms and in the control of those arms. Direct brain-wave control of a limb with 22° of freedom may be within reach. In the meantime, advances such as individually powered digits have opened the door to multifunctional full and partial hand prostheses. Restoring sensation to the prosthetic limb remains a major challenge to full integration of the limb into a patient's self-image.

  18. Survey and discussion of models applicable to the transport and fate thrust area of the Department of Energy Chemical and Biological Nonproliferation Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    The availability and easy production of toxic chemical and biological agents by domestic and international terrorists pose a serious threat to US national security, especially to civilian populations in and around urban areas. To address this threat, the Department of Energy (DOE) has established the Chemical and Biological Nonproliferation Program (CBNP) with the goal of focusing the DOE`s technical resources and expertise on capabilities to deny, deter, mitigate and respond to clandestine releases of chemical and biological agents. With the intent to build on DOE core competencies, the DOE has established six technology thrust areas within the CBNP Program: Biological Information Resources; Point Sensor Systems; Stand-off Detection; Transport and Fate; Decontamination; and Systems Analysis and Integration. The purpose of the Transport and Fate Thrust is to accurately predict the dispersion, concentration and ultimate fate of chemical and biological agents released into the urban and suburban environments and has two major goals: (1) to develop an integrated and validated state-of-the-art atmospheric transport and fate modeling capability for chemical and biological agent releases within the complex urban environment from the regional scale down to building and subway interiors, and (2) to apply this modeling capability in a broad range of simulation case studies of chemical and biological agent release scenarios in suburban, urban and confined (buildings and subways) environments and provide analysis for the incident response user community. Sections of this report discuss subway transport and fate models; buildings interior transport and fate modeling; models for flow and transport around buildings; and local-regional meteorology and dispersion models.

  19. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  20. Persistence of gamma-H2AX and 53BP1 foci in proliferating and nonproliferating human mammary epithelial cells after exposure to gamma-rays or iron ions

    Energy Technology Data Exchange (ETDEWEB)

    Groesser, Torsten; Chang, Hang; Fontenay, Gerald; Chen, James; Costes, Sylvain V.; Barcellos-Hoff, Mary Helen; Parvin, Bahram; Rydberg, Bjorn

    2010-12-22

    To investigate {gamma}-H2AX (phosphorylated histone H2AX) and 53BP1 (tumour protein 53 binding protein No. 1) foci formation and removal in proliferating and non-proliferating human mammary epithelial cells (HMEC) after exposure to sparsely and densely ionizing radiation under different cell culture conditions. HMEC cells were grown either as monolayers (2D) or in extracellular matrix to allow the formation of acinar structures in vitro (3D). Foci numbers were quantified by image analysis at various time points after exposure. Our results reveal that in non-proliferating cells under 2D and 3D cell culture conditions, iron-ion induced {gamma}-H2AX foci were still present at 72 h after exposure, although 53BP1 foci returned to control levels at 48 h. In contrast in proliferating HMEC, both {gamma}-H2AX and 53BP1 foci decreased to control levels during the 24-48 h time interval after irradiation under 2D conditions. Foci numbers decreased faster after {gamma}-ray irradiation and returned to control levels by 12 h regardless of marker, cell proliferation status, and cell culture condition. Conclusions: The disappearance of radiation induced {gamma}-H2AX and 53BP1 foci in HMEC have different dynamics that depend on radiation quality and proliferation status. Notably, the general patterns do not depend on the cell culture condition (2D versus 3D). We speculate that the persistent {gamma}-H2AX foci in iron-ion irradiated non-proliferating cells could be due to limited availability of double strand break (DSB) repair pathways in G0/G1-phase, or that repair of complex DSB requires replication or chromatin remodeling.

  1. Preliminary results of calculations for heavy-water nuclear-power-plant reactors employing 235U, 233U, and 232Th as a fuel and meeting requirements of a nonproliferation of nuclear weapons

    Science.gov (United States)

    Ioffe, B. L.; Kochurov, B. P.

    2012-02-01

    A physical design is developed for a gas-cooled heavy-water nuclear reactor intended for a project of a nuclear power plant. As a fuel, the reactor would employ thorium with a small admixture of enriched uranium that contains not more than 20% of 235U. It operates in the open-cycle mode involving 233U production from thorium and its subsequent burnup. The reactor meets the conditions of a nonproliferation of nuclear weapons: the content of fissionable isotopes in uranium at all stages of the process, including the final one, is below the threshold for constructing an atomic bomb, the amount of product plutonium being extremely small.

  2. Just in time: circadian defense patterns and the optimal defense hypothesis.

    Science.gov (United States)

    Baldwin, Ian T; Meldau, Stefan

    2013-06-01

    The optimal defense hypothesis (ODH) provides a functional explanation for the inhomogeneous distribution of defensive structures and defense metabolites throughout a plant's body: tissues that are most valuable in terms of fitness and have the highest probability of attack are generally the best defended. In a previous review, we argue that ontogenically-controlled accumulations of defense metabolites are likely regulated through an integration of developmental and defense signaling pathways. In this addendum, we extend the discussion of ODH patterns by including the recent discoveries of circadian clock-controlled defenses in plants.

  3. Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals

    Science.gov (United States)

    2016-05-25

    with other nations’ technological advances; and that the Department of Defense lacks the agility and adaptability necessary to support timely...the purposes, values and principles for the operation of OSD, as well as a directive on collaborative behavior. Also ties career progression to

  4. Department of Everything: Department of Defense Spending That Has Little to Do With National Security

    Science.gov (United States)

    2012-11-01

    the Exact Same Research A researcher who plagiarized a grant proposal and progress report received funding from the Defense Advanced Research...either the Air Force or NSF award. DARPA also approved funding for the project. All three proposals contained the same significant plagiarism ”31...individuals or provide military required training that may be available from an academic institution

  5. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    Protection), available from www.gesetze-im-internet.de/gg/art_65a. html, accessed on July 30, 2014. 36. Christian Kahl, Nachrichten, Vom Kampf in der...www.bundeswehr-journal.de/2013/vom- kampf -in-der-funften- dimension/, accessed on July 30, 2014; “Digitaler Truppenein- satz: Bundeswehr meldet sich...www.bundeswehr-journal. de/2013/vom- kampf -in-der-funften-dimension/. 46. “Spionage- und Hackerabwehr: Bundeswehr baut geheime Cy- berwar-Truppe auf” (“Defense of

  6. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  7. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  8. Department of Defense Expenditure Plans

    Science.gov (United States)

    2009-03-20

    Buxton Rd. 1,879 E 88 Redstone Arsenal AL Replace Water Main Along Paton Rd. from H.U. to Martin Rd. 1,857 E 89 Redstone Arsenal AL Fy 2009 Annual Road... Buxton Road E. from Patton to H.U. 1,312 E 25 American Recovery and Reinvestment Act of 2009 Operation and Maintenance, Defense Health Program, and...Meet AR 190-11 75 O 1100 Billings AFRC MT Mechanical System Improvements 188 E 1101 Billings AFRC MT Install Lighting Controls 45 E 1102 Billings

  9. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  10. Secure and defensive high self-esteem.

    Science.gov (United States)

    Jordan, Christian H; Spencer, Steven J; Zanna, Mark P; Hoshino-Browne, Etsuko; Correll, Joshua

    2003-11-01

    Long-standing theories have suggested high self-esteem (SE) can assume qualitatively different forms that are related to defensiveness. The authors explored whether some high-SE individuals are particularly defensive because they harbor negative self-feelings at less conscious levels, indicated by low implicit SE. In Study 1, participants high in explicit SE but low in implicit SE showed the highest levels of narcissism--an indicator of defensiveness. In Studies 2 and 3, the correspondence between implicit and explicit SE predicted defensive behavior (in-group bias in Study 2 and dissonance reduction in Study 3), such that for high explicit-SE participants, those with relatively low implicit SE behaved more defensively. These results are consistent with the idea that high SE can be relatively secure or defensive.

  11. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  12. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground...defenses. Logically an INDS can and should follow the same premise. 3. Integrated Air Defense To model an INDS after an IADS, it is necessary

  13. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  14. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2013-12-01

    Base Year DAMIR - Defense Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense...Schedule Milestones SAR Baseline Dev Est Current APB Development Objective/Threshold Current Estimate MS B DEC 2009 DEC 2009 JUN...2010 DEC 2009 CDR AUG 2011 MAY 2012 MAY 2013 MAY 2012 MS C DEC 2014 JUN 2015 JUN 2016 AUG 2016 1 (Ch-1) IOT &E Start JAN 2016 MAR 2016 MAR 2017 OCT 2017

  15. Offset implementations for Turkey's International Defense Acquisitions

    OpenAIRE

    2008-01-01

    MBA Professional Report "Offsets" is the umbrella term for a broad range of industrial and commercial "compensatory" practices. Specifically, offset agreements in the defense environment are increasing globally as a percentage of exports. Developed countries with established defense industries use offsets to channel work or technology to their domestic defense companies. Countries with newly industrialized economies are utilizing both military and commercial related offsets that involv...

  16. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  17. An Empirical Investigation of Defense Interpretation Depth, Defensive Functioning, and Alliance Strength in Psychodynamic Psychotherapy.

    Science.gov (United States)

    Petraglia, Jonathan; Bhatia, Maneet; De Roten, Yves; Despland, Jean-Nicolas; Drapeau, Martin

    2015-01-01

    The present study examined the relationship between depth of defense interpretations by therapists, and patient defensive functioning, on the therapeutic alliance in a sample of 36 patients undergoing short-term dynamic psychotherapy. Defense interpretation depth was defined as the degree to which therapist interpretations contained information regarding the motivation for patient defenses and historical origins of the defensive processes (Greensen, 1967). Mean depth of interpretation was compared between sessions that were identified beforehand as either high-alliance or low-alliance sessions using the Helping Alliance Questionnaire (HAq-II: Luborsky et al., 1996). Results indicated that defensive functioning was correlated to defense interpretation depth in low-alliance sessions. Moreover, mean depth of interpretation was also higher in low-alliance sessions, pointing to the possible "destabilizing" effects that these interpretations may have on both defensive functioning and the therapeutic alliance. These results are discussed within the context of previous studies of therapeutic technique in dynamic psychotherapy.

  18. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  19. The insanity defense: Related issues

    Science.gov (United States)

    Asokan, T. V.

    2016-01-01

    For the past 150 years, there is no change in the understanding and knowledge other than autonomy and capacity to choose the right and wrong for criminal liability. The alternative concept that human behavior is the result of an interaction between biological and environmental factors other than free choice failed to impress the criminal justice system because of a direct threat to a society's deep seated need to blame someone than themselves for criminal harms that occur. The insanity defense has a long history, and is evolved after many tests that have been tried and tested. McNaughton's rules stressed on “understandability of right and wrong” and “intellectual” rather than a moral or affective definition dominated in its formulation. Lack of control and irresistible drives or impulses were neglected Going by the current understanding of neurological evidences of compulsion and lack of impulse control, rationality tests without the inclusion of lack of control, seem to be outdated. Separate “Control determination” than the “Rationality determination” by the jurors may improve the accuracy of Juror's categorizations. There is a suggestion that Relevance ratio is ideal for ‘Evidentiary relevance” and there should be a quality control on expert testimonies. With progress in neuroscience, the law may need to abandon or alter some of its current assumptions about the nature of voluntary conduct, which underlies various defenses PMID:28216769

  20. Defensive anality and anal narcissism.

    Science.gov (United States)

    Shengold, L

    1985-01-01

    This paper aims at demonstrating a currently beleaguered assumption: the central importance, the continuing vitality, and the appropriate complexity of Freud's theory of the drives and of his idea of the primacy of the body ego. It is not enough to consider man a thinking machine or a social being; his animal nature must be given a central place in psychology. The paper postulates that 'anal or sphincter defensiveness' is one of the precursors of the repression barrier. Anality has been comparatively neglected in recent psychoanalytic literature, and so has its explorer, Karl Abraham. The paper's thesis is that there is a special defensive importance to anal erogeneity and libido, and to those aspects of ego and superego that are functionally operative (as the 'sadistic-anal organization' (Freud, 1917)) during the so-called 'sadistic-anal' developmental phase. Any of the psychic danger situations can evoke regression to manifestations of 'anal narcissim'--an attempt to master overwhelming feeling by a kind of emotional sphincter action, narrowing down the world to the controllable and the predictable. The basic assumption here is Fliess's idea that the attainment of anal sphincter control functions--with, as-it-were, 'psychic resonance'--as a means to master primal (murderous, cannibalistic) affect. For optimal psychic development, a proper balance must be attained between anal control of, and anal expression of, instinctual derivatives--especially of affect laden with aggression.

  1. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  2. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  3. Improvements Needed in the Defense Logistics Agencys Evaluation of Fair and Reasonable Prices for C130 Aircraft Spare Parts (Redacted)

    Science.gov (United States)

    2015-11-16

    of Defense that supports the warfighter; promotes accountability , integrity, and efficiency; advises the Secretary of Defense and Congress; and...years. The legacy C-130H was replaced with the C-130J model, which has significant advances in avionics and performance. According to the DLA...indefinite-quantity, indefinite-delivery contract is firm-fixed price with an estimated base-period value of $60.2 million. The contract’s total

  4. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  5. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness...

  6. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to...

  7. 75 FR 15695 - Renewal of Department of Defense Federal Advisory Committee; Board of Visitors National Defense...

    Science.gov (United States)

    2010-03-30

    ... Defense gives notice that it is renewing the charter for the Board of Visitors National Defense University (hereafter referred to as the Board). FOR FURTHER INFORMATION CONTACT: Jim Freeman, Deputy Committee... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Board of...

  8. 75 FR 13093 - Renewal of Department of Defense Federal Advisory Committee; Defense Acquisition University Board...

    Science.gov (United States)

    2010-03-18

    ... University Board of Visitors AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... amended), and 41 CFR 102-3.50(c), the Department of Defense gives notice that it is renewing the charter for the Defense Acquisition University Board of Visitors (hereafter referred to as the Board)....

  9. Hybrid planar lightwave circuits for defense and aerospace applications

    Science.gov (United States)

    Zhang, Hua; Bidnyk, Serge; Yang, Shiquan; Balakrishnan, Ashok; Pearson, Matt; O'Keefe, Sean

    2010-04-01

    We present innovations in Planar Lightwave Circuits (PLCs) that make them ideally suited for use in advanced defense and aerospace applications. We discuss PLCs that contain no micro-optic components, no moving parts, pose no spark or fire hazard, are extremely small and lightweight, and are capable of transporting and processing a range of optical signals with exceptionally high performance. This PLC platform is designed for on-chip integration of active components such as lasers and detectors, along with transimpedance amplifiers and other electronics. These active components are hybridly integrated with our silica-on-silicon PLCs using fully-automated robotics and image recognition technology. This PLC approach has been successfully applied to the design and fabrication of multi-channel transceivers for aerospace applications. The chips contain hybrid DFB lasers and high-efficiency detectors, each capable of running over 10 Gb/s, with mixed digital and analog traffic multiplexed to a single optical fiber. This highlyintegrated functionality is combined onto a silicon chip smaller than 4 x 10 mm, weighing 125 degC, and more than 2,000 hours operating at 95 degC ambient air temperature. We believe that these recent advancements in planar lightwave circuits are poised to revolutionize optical communications and interconnects in the aerospace and defense industries.

  10. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  11. Protecting the Self: Defense Mechanisms in Action

    Science.gov (United States)

    Cramer, Phebe

    2006-01-01

    Integrating theory, research, and practical applications, this book provides a comprehensive examination of defense mechanisms and their role in both normal development and psychopathology. The author describes how children and adults mobilize specific kinds of defenses to maintain their psychological equilibrium and preserve self-esteem,…

  12. U.S. Cybersecurity Defense Assessment

    Science.gov (United States)

    2013-03-01

    Computer Network Defense ( CND ) actions to include “protecting, monitoring, analyzing, detecting, and responding to unauthorized activity within...such as computer network defense ( CND ), computer network exploitation (CNE), and computer network attack (CNA).38 In this capacity, the institution

  13. Takedown Defenses of Russian Systema

    Directory of Open Access Journals (Sweden)

    Kevin R. Secours

    2012-07-01

    Full Text Available The continuing popularity of mixed martial arts (MMA events has motivated many martial artists to cross train in grappling disciplines. While largely beneficial for the arts as a whole, many practitioners have nevertheless integrated grappling strategies without considering whether or not their applications are simply sportive or appropriate for self-defense tactics. In this article, I will examine some historical perspectives on the role of grappling on the battlefield from published literature and consider the evidence left to us through historical texts and artwork. Based on over 20 years experience in the grappling arts, I will attempt to show that ground fighting and grappling are necessary components of a complete tactical arsenal, while carefully illustrating the difference in street tactics. I will place specific emphasis on the role of defending the takedown in a modern survival scenario, giving particular attention to the approach employed by the Russian art of Systema.

  14. Current developments in laser ablation-inductively coupled plasma-mass spectrometry for use in geology, forensics, and nuclear nonproliferation research

    Energy Technology Data Exchange (ETDEWEB)

    Messerly, Joshua D. [Iowa State Univ., Ames, IA (United States)

    2008-08-26

    This dissertation focused on new applications of laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS). The diverse fields that were investigated show the versatility of the technique. In Chapter 2, LA-ICP-MS was used to investigate the rare earth element (REE) profiles of garnets from the Broken Hill Deposit in New South Wales, Australia. The normalized REE profiles helped to shed new light on the formation of deposits of sulfide ores. This information may be helpful in identifying the location of sulfide ore deposits in other locations. New sources of metals such as Pg, Zn, and Ag, produced from these ores, are needed to sustain our current technological society. The application of LA-ICP-MS presented in Chapter 3 is the forensics analysis of automotive putty and caulking. The elemental analysis of these materials was combined with the use of Principal Components Analysis (PCA). The PCA comparison was able to differentiate the automotive putty samples by manufacturer and lot number. The analysis of caulk was able to show a differentiation based on manufacturer, but no clear differentiation was shown by lot number. This differentiation may allow matching of evidence in the future. This will require many more analyses and the construction of a database made up of many different samples. The 4th chapter was a study of the capabilities of LA-ICP-MS for fast and precise analysis of particle ensembles for nuclear nonproliferation applications. Laser ablation has the ability to spatially resolve particle ensembles which may contain uranium or other actinides from other particles present in a sample. This is of importance in samples obtained from air on filter media. The particle ensembles of interest may be mixed in amongst dust and other particulates. A problem arises when ablating these particle ensembles directly from the filter media. Dust particles other than ones of interest may be accidentally entrained in the aerosol of the ablated particle

  15. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  16. Application of passive defense in urban housing planning

    Directory of Open Access Journals (Sweden)

    H. Kamran

    2013-01-01

    Full Text Available Extended abstract1-IntroductionToday, with advances in the technology of weapons and military equipment, urban areas are most at risk of invasion. Among the most important factors in enhancing human casualties in military attacks on urban areas, one can point to the unrealistic architecture of houses which does not conform to principles such as optimal site selection and layout of the structure of human settlements, proper distribution, principles of concealment, camouflage and deception, the high degree of vulnerability of buildings and interior architecture of buildings with regard to passive defense. Structural arrangement of spaces and their connection with surrounding areas has created great opportunities for saving lives And improves system performance and reduces its vulnerability. This study with a descriptive-qualitative approach, investigates the role of passive defense in urban housing planning and the conclusions are used to create safe city, strong city and deterrent city. Results show that determining the geometric design of house, pop location, availability and predictability of secure spaces are regarded as multi-functional space for each building in times of peace and war are among the optimal components of building architecture and vernacular architecture from the perspective of a passive defense.Crises, threats and disasters are classified into two main categories: natural, including earthquakes, floods, landslides, droughts and human category such as war, accidents and diseases which are more than 50 types. The main objective of this study is investigating crisis caused by war in residential areas. In the full-scale military conflicts, one of the ultimate goals of the parties involved is making an effort to bring the breadth and scope of the battlefield to civilian centers especially to urban centers, which is usually accompanied by heavy air strikes. This act is one of the most effective strategies in the fate of wars

  17. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  18. Defensive externality and blame projection following failure.

    Science.gov (United States)

    Hochreich, D J

    1975-09-01

    This study focuses upon the relationship between internal-external control and defensive blame projection. Trust was used as a moderator variable for making differential predictions concerning the behavior of two subgroups of externals: defensive externals, whose externality is presumed to reflect primarily a verbal technique of defense, and congruent externals, whose externality reflects a more genuine belief that most outcomes are determined by forces beyond their personal control. As predicted, defensive externals showed a stronger tendency than did congruent externals and internals to resort to blame projection following failure at an achievement task. There were no group differences in attribution following task success. Defensive externals were found to be more responsive to negative feedback than were congruent externals.

  19. Primitive defenses: cognitive aspects and therapeutic handling.

    Science.gov (United States)

    Groh, L S

    In this paper the primitive defenses first described by Melanie Klein under the label of "schizoid mechanisms" are examined. The defenses considered are splitting the pathological uses of identification and projective identification, and the psychotic forms of denial. This examination is twofold: (1) the cognitive aspects of these defenses as described in terms of concepts developed by Jean Piaget; (2) concrete examples of the operation of these defenses during the treatment of schizophrenic patients are given and the effects of interventions based on the cognitive analysis are described. It is stressed that at times interventions, such as interpretation and confrontation, based on cognitive analysis, can temporarily and in some instances even permanently stop the operation of these defenses, allowing emotionally meaningful material to emerge which expedites the therapeutic process.

  20. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...... for this pattern would be co-adaptation between host colonies and their vertically transmitted mutualist. These results illustrate the complexity of the selection pressures that affect the expression of multilevel immune defenses....

  1. Optimal defense strategy: storage vs. new production.

    Science.gov (United States)

    Shudo, Emi; Iwasa, Yoh

    2002-12-07

    If hosts produce defense proteins after they are infected by pathogens, it may take hours to days before defense becomes fully active. By producing defense proteins beforehand, and storing them until infection, the host can cope with pathogens with a short time delay. However, producing and storing defense proteins require energy, and the activated defense proteins often cause harm to the host's body as well as to pathogens. Here, we study the optimal strategy for a host who chooses the amount of stored defense proteins, the activation of the stored proteins upon infection, and the new production of the proteins. The optimal strategy is the one that minimizes the sum of the harm by pathogens and the cost of defense. The host chooses the storage size of defense proteins based on the probability distribution of the magnitude of pathogen infection. When the infection size is predictable, all the stored proteins are to be activated upon infection. The optimal strategy is to have no storage and to rely entirely on new production if the expected infection size n(0) is small, but to have a big storage without new production if n(0) is large. The transition from the "new production" phase to "storage" phase occurs at a smaller n(0) when storage cost is small, activation cost is large, pathogen toxicity is large, pathogen growth is fast, the defense is effective, the delay is long, and the infection is more likely. On the other hand, the storage size to produce for a large n(0) decreases with three cost parameters and the defense effectiveness, increases with the likelihood of infection, the toxicity and the growth rate of pathogens, and it is independent of the time delay. When infection size is much smaller than the expected size, some of the stored proteins may stay unused.

  2. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  3. Reviewing the Nuclear Nonproliferation Treaty

    Science.gov (United States)

    2010-05-01

    several examples. At a fuel fabrication plant at Tokai-mura in Japan making mixed-oxide ( MOX ) fuel out of powdered uranium and nuclear weapons... MOX scrap in Japan where at least one bomb’s worth of weapons-usable plutonium went missing and another accounting discrepancy at a Japanese repro...mixed oxide fuels or MOX ) do not fare as well. Here, Dr. Cochran points out that it would take no more than a week and possibly as little as a few

  4. Advance care directives

    Science.gov (United States)

    ... advance directive; Do-not-resuscitate - advance directive; Durable power of attorney - advance care directive; POA - advance care directive; Health care agent - advance care directive; Health care proxy - ...

  5. Experimental research subject and renovation of chemical processing facility (CPF) for advanced fast reactor fuel reprocessing technology development

    Energy Technology Data Exchange (ETDEWEB)

    Koyama, Tomozo; Shinozaki, Tadahiro; Nomura, Kazunori; Koma, Yoshikazu; Miyachi, Shigehiko; Ichige, Yoshiaki; Kobayashi, Tsuguyuki; Nemoto, Shin-ichi [Japan Nuclear Cycle Development Inst., Tokai Works, Tokai, Ibaraki (Japan)

    2002-12-01

    In order to enhance economical efficiency, environmental impact and nuclear nonproliferation resistance, the Advanced Reprocessing Technology, such as simplification and optimization of process, and applicability evaluation of the innovative technology that was not adopted up to now, has been developed for the reprocessing of the irradiated fuel taken out from a fast reactor. Renovation of the hot cell interior equipments, establishment and updating of glove boxes, installation of various analytical equipments, etc. in the Chemical Processing Facility (CPF) was done to utilize the CPF more positivity which is the center of the experimental field, where actual fuel can be used, for research and development towards establishment of the Advanced Reprocessing Technology development. The hot trials using the irradiated fuel pins of the experimental fast reactor 'JOYO' for studies on improved aqueous reprocessing technology, MA separation technology, dry process technology, etc. are scheduled to be carried out with these new equipments. (author)

  6. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  7. Defense Innovation and Industrialization in South Korea

    OpenAIRE

    Moon, Chung-in; Paek, Jae-Ok

    2010-01-01

    South Korea’s defense industrial transformation has been impressive by any standard. It was able to satisfy most of its basic weapons needs within a decade after launching its defense industry. Since the late 1990s, South Korea has been elevated from a third-tier arms producer to the second tier by moving from the stage of imitation and assembly to that of creative imitation and indigenization. It now competes with major arms-supplying countries. In addition, the South Korean defense...

  8. Strategies for Dealing with the Defense Budget

    Science.gov (United States)

    1983-08-17

    UNCLASSIFIED ItCUWIfV CUAWICATIOH O^ T>"» *»C« C.»lt— Omm gnt REPORT D0ajM6NTATI0N PAGE READ rNSTRUCTIO.NS OSFOPC COMWLETTNG FORM DSSW BOA ...documentation. \\ STRATEGIES FOR DEALING WITH THE DEFENSE BUDGET for Defense Systems Management College DSSW BOA No. MDA 903-82-G-0047 BOOZ ALLEN...Frisch, Franz A. and Acker, David D., "Financing Defense System Programs," Concepts (J. Def. Sys. Acq. Mgmt.), Vol. 4, No. 4, Autumn 1981, pp. 7

  9. Strategic research of advanced fuel cycle technologies in JNC

    Energy Technology Data Exchange (ETDEWEB)

    Kawata, T.; Fukushima, M.; Nomura, S. [Japan Nuclear Cycle Development Institute, Tokai Works (Japan)

    2000-07-01

    Key technologies for the future nuclear fuel cycle have been proposed and are being reviewed in JNC as a part of the Feasibility Study for an Advanced Fuel Cycle, which is to achieve a more flexible energy choice to satisfy a sustainable energy security and global environmental protection. The candidate reprocessing technologies are: 1) aqueous simplified PUREX process, 2) oxide or metallic electrowinning, and 3) fluoride volatilization for oxide, metal, or nitride fuels. The fuel fabrication methods being investigated are: 1) simplified pellet process, 2) sphere/vibro-packed process for MOX/MN fuel, and 3) casting for metal fuel. These candidate technologies are currently being compared based on past experiences, technical issues to be solved, industrial applicability for future plants, feasible options for MA/LLFP separation, and nonproliferation aspects. Alter two years of the present reviewing process, selected key technologies will be developed over the next five years to evaluate industrial applicability of reprocessing and fuel manufacturing processes for the advanced fuel cycle. (authors)

  10. CSRF Vulnerabilities and Defensive Techniques

    OpenAIRE

    Rupali D. Kombade; Meshram, B B

    2012-01-01

    Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF). CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is diffic...

  11. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  12. Advance payments

    CERN Multimedia

    Human Resources Division

    2003-01-01

    Administrative Circular N 8 makes provision for the granting of advance payments, repayable in several monthly instalments, by the Organization to the members of its personnel. Members of the personnel are reminded that these advances are only authorized in exceptional circumstances and at the discretion of the Director-General. In view of the current financial situation of the Organization, and in particular the loans it will have to incur, the Directorate has decided to restrict the granting of such advances to exceptional or unforeseen circumstances entailing heavy expenditure and more specifically those pertaining to social issues. Human Resources Division Tel. 73962

  13. ADVANCE PAYMENTS

    CERN Multimedia

    Human Resources Division

    2002-01-01

    Administrative Circular Nº 8 makes provision for the granting of advance payments, repayable in several monthly instalments, by the Organization to the members of its personnel. Members of the personnel are reminded that these advances are only authorized in exceptional circumstances and at the discretion of the Director-General. In view of the current financial situation of the Organization, and in particular the loans it will have to incur, the Directorate has decided to restrict the granting of such advances to exceptional or unforeseen circumstances entailing heavy expenditure and more specifically those pertaining to social issues. Human Resources Division Tel. 73962

  14. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  15. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  16. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  17. The Impact of Declining Defense Budgets on Japan Maritime Self Defense Force

    Science.gov (United States)

    2007-06-01

    structural reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the...reform, the GOJ is trying to reduce all expenditures , including defense expenditures . Conversely, Japan and countries in its vicinity face the threat...reduce expenditures . The alternative was serious financial trouble for Japan in the near future. The impact of these reforms is that defense is no

  18. Defense Downsizing and Blacks in the Military

    Science.gov (United States)

    1993-06-01

    8217IIa NAVAL POSTGRADUATE SCHOOL Monterey, California AD-A272 415 THESIS DEFENSE DOWNSIZING AND BLACKS IN THE MILITARY by Roy L. Nixon June 1993 Thesis...include security classification) DEFENSE DOWNSIZING AND BLACKS IN TIE MILITARY 12 Plersonal Author(s) Roy L. Nixon 1 3a Type of Report I13b Time Covered...end of the draft. However. the armed forces are now engaged in the process of downsizing , and there is some speculation that blacks may be

  19. Guam: U.S. Defense Deployments

    Science.gov (United States)

    2013-11-15

    Gates Views Growth Under Way in Guam,” American Forces Press Service, May 30, 2008. 2 Secretary of Defense Robert Gates, speech at Shangri-La Hotel ...crises; and sea lines of communication (SLOCs), particularly through the Straits of Malacca . Combat aircraft on Guam can reach Taiwan, Japan, Philippines...Remarks by retired Lieutenant General, USMC, George Trautman III, at Heritage Foundation, May 3, 2012. Guam: U.S. Defense Deployments Congressional

  20. [Medical Service of the Estonian Defense Forces].

    Science.gov (United States)

    Anisimov, A S; Golota, A S; Krassii, A B; Soldatov, E A; Shalakin, R A

    2015-06-01

    The article is a brief description of the current state of the Estonian Defense Forces medical service and is based on the study of the open access foreign sources. At the beginning, the general information about Estonia, its Defense Forces, and their medical service is presented. Then the medical service particular features are described with more detail, namely, the organization of the inpatient and outpatient treatment, medical supply, scientific research, combat medicine, medical staff education and training, medical service personnel income.

  1. Surfing China’s National Defense

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Following the start of its first test run on August 20, 2009, the website www.mod.gov.cn of the Ministry of National Defense (MOD) of the People’s Republic of China has logged more than 2 billion hits, from many countries and regions including China, the United States, the United Kingdom, Japan, Australia and Singapore. China National Defense News reporters recently interviewed Ji Guilin, the website’s Editor in Chief, on its performance and the feedback of netizens.

  2. Carp erythrodermatitis: host defense-pathogen interaction.

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to neutralize toxins a...

  3. The Future of Theater Missile Defense

    Science.gov (United States)

    1994-06-01

    withERINT) 1,500 IVf 74C 1998 3.0 Navy Lower-Tier Defense 1,820 SO4 50* 1999° 3* THAAD(withTMD-GBR) 1,313 80 14 2001e 9.1 AdvaaoedCapabflitylMD Systems...Administration cannot, by itself, provide a sufficient buffer between theater and strategic missile defenses. Other limits must be included. Finally, the

  4. Department of Defense Recovering Warrior Task Force

    Science.gov (United States)

    2014-09-02

    233 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out. Retrieved May 26, 2014, from http://www.armytimes.com/article...Coordination briefing to the Defense Advisory Committee on Women in the Services. 244 Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was...2014, from http://www.defense.gov/news/newsarticle.aspx?id=121796.  Baldor , L.C. (April 26, 2010). Top Wounded Warrior official: I was forced out

  5. Plant defense using toxic inorganic ions: conceptual models of the defensive enhancement and joint effects hypotheses.

    Science.gov (United States)

    Boyd, Robert S

    2012-10-01

    The concept of plant defense using toxic mineral elements originated as an explanation for extremely elevated concentrations of some elements (termed hyperaccumulation) in some plant tissues. The Defensive Enhancement Hypothesis suggests that hyperaccumulation evolved because, after an initial defensive benefit accrued from a relatively low initial concentration, increased concentration of an element provided increased plant fitness and drove evolution of higher element concentrations until hyperaccumulation was achieved. The Joint Effects Hypothesis postulates that additive or synergistic effects between element-based defenses, or between toxic element and organic chemical defenses, may have contributed to the evolution of hyperaccumulation. By lessening the concentration of an element necessary to provide an initial defensive benefit to a plant, joint effects could decrease the level of an element that provides an initial defensive benefit, allowing additive or synergistic defensive enhancement to take effect. Recent experimental tests have demonstrated defense at relatively low element concentrations, and tests of metal/metal and metal/organic compound combinations have shown joint effects. These hypotheses suggest how hyperaccumulator plants may have evolved in response to plant-herbivore interactions, and suggest that toxic element levels below those used to define hyperaccumulation may be ecologically effective. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  6. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  7. The Non-Proliferation Treaty of Nuclear Weapons (NPT) and the insertion of the Brazilian State in its regime; O tratado sobre a nao proliferacao de armas nucleares (TNP) e a insercao do Estado brasileiro no regime dele decorrente

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Marcos Valle Machado da

    2010-07-01

    The issue of nuclear weapons continues to appear as a focal point of International Relations. The efforts and concrete actions on disarmament, non-proliferation, and nuclear arms control are still issues that generate recurring tensions between States. However, in Brazil, there is little analysis of an academic nature about these issues and, with respect to current and prospective position of the Brazilian State in the Nuclear Weapons Non- Proliferation Regime, studies and analysis are even more scarce, or incipient. The present dissertation has as its object of study to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), the Regime arisen from NPT, and the Brazilian State insertion process in this Regime. Therefore our research work is structured in three areas: the first one is about the role of nuclear weapons in States security perception, the second is about NPT and its Regime, the third runs over the insertion of the Brazilian state in this regime. So, in summary, the research performed included the reasons that make a State to develop nuclear weapons, the NPT genesis and evolution of the perception of the meaning of that Treaty by the States, and the process and the degree of insertion of Brazil in the Nuclear Weapons Non- Proliferation Regime. The inquiry sought to place this object of study in the broader debate on Foreign Relations, based on the approaches of the discipline devoted to the question of managing the security of States, id est, the two approaches that constitute the mainstream of the discipline: the perspective theoretical liberal (and neoliberal variants) and realistic thinking (and neo-realist). Thus, we have used different theoretical lenses, which we think necessary for understanding the specific parts and causal connections between these parts of a complex issue. (author)

  8. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  9. Advanced nanoelectronics

    CERN Document Server

    Ismail, Razali

    2012-01-01

    While theories based on classical physics have been very successful in helping experimentalists design microelectronic devices, new approaches based on quantum mechanics are required to accurately model nanoscale transistors and to predict their characteristics even before they are fabricated. Advanced Nanoelectronics provides research information on advanced nanoelectronics concepts, with a focus on modeling and simulation. Featuring contributions by researchers actively engaged in nanoelectronics research, it develops and applies analytical formulations to investigate nanoscale devices. The

  10. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  11. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics...

  12. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  13. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...-insurer; to submit a timely, written report to the Department of Labor (DOL) in the event of an employee's... (Defense Base Act), merely clarify the existing requirements set forth in the Defense Base Act of 1941...

  14. AdvancED Flex 4

    CERN Document Server

    Tiwari, Shashank; Schulze, Charlie

    2010-01-01

    AdvancED Flex 4 makes advanced Flex 4 concepts and techniques easy. Ajax, RIA, Web 2.0, mashups, mobile applications, the most sophisticated web tools, and the coolest interactive web applications are all covered with practical, visually oriented recipes. * Completely updated for the new tools in Flex 4* Demonstrates how to use Flex 4 to create robust and scalable enterprise-grade Rich Internet Applications.* Teaches you to build high-performance web applications with interactivity that really engages your users.* What you'll learn Practiced beginners and intermediate users of Flex, especially

  15. 22 CFR 124.15 - Special Export Controls for Defense Articles and Defense Services Controlled under Category XV...

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Special Export Controls for Defense Articles...-SHORE PROCUREMENT AND OTHER DEFENSE SERVICES § 124.15 Special Export Controls for Defense Articles and Defense Services Controlled under Category XV: Space Systems and Space Launches. (a) The export of...

  16. A Laboratory for Characterizing the Efficacy of Moving Target Defense

    Science.gov (United States)

    2016-10-25

    SECURITY CLASSIFICATION OF: Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we at College...Efficacy of Moving Target Defense Report Title Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ...Defense 1 Statement of the Problem Under ARO funded BAA project entitled “Modeling and Analysis of Moving Target Defense Mechanisms in MANET ”, we

  17. Unfolding network communities by combining defensive and offensive label propagation

    CERN Document Server

    Šubelj, Lovro

    2011-01-01

    Label propagation has proven to be a fast method for detecting communities in complex networks. Recent work has also improved the accuracy and stability of the basic algorithm, however, a general approach is still an open issue. We propose different label propagation algorithms that convey two unique strategies of community formation, namely, defensive preservation and offensive expansion of communities. Furthermore, the strategies are combined in an advanced label propagation algorithm that retains the advantages of both approaches; and are enhanced with hierarchical community extraction, prominent for the use on larger networks. The proposed algorithms were empirically evaluated on different benchmarks networks with planted partition and on over 30 real-world networks of various types and sizes. The results confirm the adequacy of the propositions and give promising grounds for future analysis of (large) complex networks. Nevertheless, the main contribution of this work is in showing that different types of...

  18. Recent advances in plant-herbivore interactions

    Science.gov (United States)

    Burkepile, Deron E.; Parker, John D.

    2017-01-01

    Plant-herbivore interactions shape community dynamics across marine, freshwater, and terrestrial habitats. From amphipods to elephants and from algae to trees, plant-herbivore relationships are the crucial link generating animal biomass (and human societies) from mere sunlight. These interactions are, thus, pivotal to understanding the ecology and evolution of virtually any ecosystem. Here, we briefly highlight recent advances in four areas of plant-herbivore interactions: (1) plant defense theory, (2) herbivore diversity and ecosystem function, (3) predation risk aversion and herbivory, and (4) how a changing climate impacts plant-herbivore interactions. Recent advances in plant defense theory, for example, highlight how plant life history and defense traits affect and are affected by multiple drivers, including enemy pressure, resource availability, and the local plant neighborhood, resulting in trait-mediated feedback loops linking trophic interactions with ecosystem nutrient dynamics. Similarly, although the positive effect of consumer diversity on ecosystem function has long been recognized, recent advances using DNA barcoding to elucidate diet, and Global Positioning System/remote sensing to determine habitat selection and impact, have shown that herbivore communities are probably even more functionally diverse than currently realized. Moreover, although most diversity-function studies continue to emphasize plant diversity, herbivore diversity may have even stronger impacts on ecosystem multifunctionality. Recent studies also highlight the role of risk in plant-herbivore interactions, and risk-driven trophic cascades have emerged as landscape-scale patterns in a variety of ecosystems. Perhaps not surprisingly, many plant-herbivore interactions are currently being altered by climate change, which affects plant growth rates and resource allocation, expression of chemical defenses, plant phenology, and herbivore metabolism and behavior. Finally, we conclude by

  19. Defense Science Board Summer Study on Transformation: A Progress Assessment. Volume 1

    Science.gov (United States)

    2006-02-01

    JCS/J7 MULTI-AGENCY INTEGRATION Mr. Michael Bayer, Co-Chairman Private Consultant Ms. Michelle Flournoy CSIS Mr. Alan Schwartz Private Consultant...DEPARTMENT OF DEFENSE BUSINESS PRACTICES Mr. Paul Brinkley Deputy Under Secretary for DoD Business Management Business Transformation Modernization...Discussion JWFC Joint Warfighting Center Demonstration Mr. Alan Shaffer DDR&E Disruptive Technologies Study Dr. Martin Stickley DARPA Advanced

  20. Defense Biometric and Forensic Office Research, Development, Test and Evaluation Strategy

    Science.gov (United States)

    2015-01-06

    for the DBFO investment strategy and ensures that projects the office funds trace back to the DoD’s science and technology (S&T) principles and...Power 3. 0, the DoD Research and Engineering Enterprise and the Reliance 21 operating principles . It also ensures that the DBFO’s approach links...view of biometric and forensic RDT &E investments across the Department of Defense. I look forward to advancing our common efforts to achieve the

  1. Defense Language Institute Russian Basic Course. Volumes XXVIII, Lessons 131-140. Volume XXX, Lessons 151-159.

    Science.gov (United States)

    Defense Language Inst., Washington, DC.

    The 19 lessons in these two volumes are intended for the advanced phase of a 159-lesson intensive audiolingual basic Russian course developed recently by the Defense Language Institute to train native speakers of English to a Level 3 second language proficiency. These third and fifth volumes contain such features as (1) texts on the Russian Civil…

  2. In Defense of the Defense: The Continuing Political Value of Denial of Enemy Aims

    Science.gov (United States)

    2013-01-01

    Space Power Journal | 84 Kraig In Defense of the Defense Feature leaving all of their logistics, population, industrial, energy, food , com- munications...expenditure of effort consists in the wastage of his forces—our destruction of them” (emphases in original).61 He then refers to this de- fensive form of

  3. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Science.gov (United States)

    2010-10-25

    ... Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case 2007-D002) AGENCY: Defense... 3504 addresses requirements that apply to riding gang members and DoD- exempted individuals who perform.... 109-364). Section 3504 addresses requirements that apply to riding gang members and...

  4. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  5. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  6. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated a

  7. Current developments in laser ablation-inductively coupled plasma-mass spectrometry for use in geology, forensics, and nuclear nonproliferation research

    Energy Technology Data Exchange (ETDEWEB)

    Messerly, Joshua D. [Iowa State Univ., Ames, IA (United States)

    2008-08-26

    This dissertation focused on new applications of laser ablation inductively coupled plasma mass spectrometry (LA-ICP-MS). The diverse fields that were investigated show the versatility of the technique. In Chapter 2, LA-ICP-MS was used to investigate the rare earth element (REE) profiles of garnets from the Broken Hill Deposit in New South Wales, Australia. The normalized REE profiles helped to shed new light on the formation of deposits of sulfide ores. This information may be helpful in identifying the location of sulfide ore deposits in other locations. New sources of metals such as Pg, Zn, and Ag, produced from these ores, are needed to sustain our current technological society. The application of LA-ICP-MS presented in Chapter 3 is the forensics analysis of automotive putty and caulking. The elemental analysis of these materials was combined with the use of Principal Components Analysis (PCA). The PCA comparison was able to differentiate the automotive putty samples by manufacturer and lot number. The analysis of caulk was able to show a differentiation based on manufacturer, but no clear differentiation was shown by lot number. This differentiation may allow matching of evidence in the future. This will require many more analyses and the construction of a database made up of many different samples. The 4th chapter was a study of the capabilities of LA-ICP-MS for fast and precise analysis of particle ensembles for nuclear nonproliferation applications. Laser ablation has the ability to spatially resolve particle ensembles which may contain uranium or other actinides from other particles present in a sample. This is of importance in samples obtained from air on filter media. The particle ensembles of interest may be mixed in amongst dust and other particulates. A problem arises when ablating these particle ensembles directly from the filter media. Dust particles other than ones of interest may be accidentally entrained in the aerosol of the ablated particle

  8. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  9. Advanced calculus

    CERN Document Server

    Nickerson, HK; Steenrod, NE

    2011-01-01

    ""This book is a radical departure from all previous concepts of advanced calculus,"" declared the Bulletin of the American Mathematics Society, ""and the nature of this departure merits serious study of the book by everyone interested in undergraduate education in mathematics."" Classroom-tested in a Princeton University honors course, it offers students a unified introduction to advanced calculus. Starting with an abstract treatment of vector spaces and linear transforms, the authors introduce a single basic derivative in an invariant form. All other derivatives - gradient, divergent, curl,

  10. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  11. Insanity Defense: Past, Present, and Future.

    Science.gov (United States)

    Math, Suresh Bada; Kumar, Channaveerachari Naveen; Moirangthem, Sydney

    2015-01-01

    Insanity defense is primarily used in criminal prosecutions. It is based on the assumption that at the time of the crime, the defendant was suffering from severe mental illness and therefore, was incapable of appreciating the nature of the crime and differentiating right from wrong behavior, hence making them not legally accountable for crime. Insanity defense is a legal concept, not a clinical one (medical one). This means that just suffering from a mental disorder is not sufficient to prove insanity. The defendant has the burden of proving the defense of insanity by a "preponderance of the evidence" which is similar to a civil case. It is hard to determine legal insanity, and even harder to successfully defend it in court. This article focuses on the recent Supreme Court decision on insanity defense and standards employed in Indian court. Researchers present a model for evaluating a defendant's mental status examination and briefly discuss the legal standards and procedures for the assessment of insanity defense evaluations. There is an urgent need to initiate formal graduation course, setup Forensic Psychiatric Training and Clinical Services Providing Centers across the country to increase the manpower resources and to provide fair and speedy trail.

  12. Spatial mosaic evolution of snail defensive traits

    Directory of Open Access Journals (Sweden)

    de León Francisco

    2007-03-01

    Full Text Available Abstract Background Recent models suggest that escalating reciprocal selection among antagonistically interacting species is predicted to occur in areas of higher resource productivity. In a putatively coevolved interaction between a freshwater snail (Mexipyrgus churinceanus and a molluscivorous cichlid (Herichthys minckleyi, we examined three components of this interaction: 1 spatial variation in two putative defensive traits, crushing resistance and shell pigmentation; 2 whether abiotic variables or frequency of molariform cichlids are associated with spatial patterns of crushing resistance and shell pigmentation and 3 whether variation in primary productivity accounted for small-scale variation in these defensive traits. Results Using spatial autocorrelation to account for genetic and geographic divergence among populations, we found no autocorrelation among populations at small geographic and genetic distances for the two defensive traits. There was also no correlation between abiotic variables (temperature and conductivity and snail defensive traits. However, crushing resistance and frequency of pigmented shells were negatively correlated with molariform frequency. Crushing resistance and levels of pigmentation were significantly higher in habitats dominated by aquatic macrophytes, and both traits are phenotypically correlated. Conclusion Crushing resistance and pigmentation of M. churinceanus exhibit striking variation at small spatial scales often associated with differences in primary productivity, substrate coloration and the frequency of molariform cichlids. These local geographic differences may result from among-habitat variation in how resource productivity interacts to promote escalation in prey defenses.

  13. Advanced Search

    African Journals Online (AJOL)

    Items 451 - 500 of 500 ... East and Central African Journal of Surgery · Vol 17, No 3 (2012) ... Post-surgical treatment of thyroid carcinoma in dogs with retinoic ... arising in a mature cystic ovarian Teratoma with bladder invasion: A Case Report, Abstract PDF ... of Bicalutamide in Patients with Advanced Prostate Cancer, Abstract.

  14. Advanced ferroelectricity

    CERN Document Server

    Blinc, R

    2011-01-01

    Advances in the field of ferroelectricity have implications both for basic physics and for technological applications such as memory devices, spintronic applications and electro-optic devices, as well as in acoustics, robotics, telecommunications and medicine. This book provides an account of recent developments in the field.

  15. Advanced Search

    African Journals Online (AJOL)

    Items 251 - 300 of 557 ... ... Journal of Africa, Animal Production Research Advances, Animal ..... Frederick Haraka, Ali Mohamed, Gadi Kilonzo, Humphrey Shao ... No 3 (2010), Culture and Belief Systems: A Christian Experience in the 21st Century, Abstract .... on cardiovascular parameters and CD4 cell count of people living ...

  16. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  17. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  18. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense.

  19. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  20. Strategic defense and the Western alliance

    Energy Technology Data Exchange (ETDEWEB)

    Lakoff, S.; Willoughby, R. (Univ. of California, CA (US))

    1987-01-01

    Strategic defense has again become a major item on the agenda of the Western Alliance. Revived by President Ronald Reagan in his Star Wars speech of March 1983, and implemented in his Strategic Defense Initiative, it has achieved renewed emphasis in military spending, in alliance research efforts, and in arms control negotiations. SDI is packaged in a way that makes it the largest single item in the Department of Defense's annual budget. It engages researchers in industrial and military laboratories on both sides of the Atlantic as well as in Japan and Israel. In the arms control negotiations now under way between the United States and the USSR, the conduct of this research and its implications for the strategic balance and the reduction of offensive weapons are critical considerations. The implications of this largely unexpected development are the subject of this book.

  1. Advanced Sensors for Safety and Security

    CERN Document Server

    Khudaverdyan, Surik

    2013-01-01

    This book results from a NATO Advanced Research Workshop titled “Technological Innovations in CBRNE Sensing and Detection for Safety, Security, and Sustainability” held in Yerevan, Armenia in 2012. The objective was to discuss and exchange views as to how fusion of advanced technologies can lead to improved sensors/detectors in support of defense, security, and situational awareness. The chapters range from policy and implementation, advanced sensor platforms using stand-off (THz and optical) and point-contact methods for detection of chemical, nuclear, biological, nuclear and explosive agents and contaminants in water, to synthesis methods for several materials used for sensors.  In view of asymmetric, kinetic, and distributed nature of threat vectors, an emphasis is placed to examine new generation of sensors/detectors that utilize an ecosystems of innovation and advanced sciences convergence in support of effective counter-measures against  CBRNE threats. The book will be of considerable interest and...

  2. Directed Energy Missions for Planetary Defense

    OpenAIRE

    Lubin, P.; Hughes, GB; Eskenazi, M; Kosmo, K.; Johansson, IE; Griswold, J., Ian,;Zhou, Hongjun,;Matison, Mikenzie,;Swanson, V., Ronald,;McIntosh, P., Lawrence,;Simon, I., Melvin,;Dahlquist, W., Frederick,; Pryor, M; O'Neill, H.; Meinhold, P.; Suen, J; J; Riley; Zhang, Q.; Walsh, K.; Melis, C.; Kangas, M

    2016-01-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploRation, is an orbiting stand-of...

  3. Macroevolutionary patterns of glucosinolate defense and tests of defense-escalation and resource availability hypotheses.

    Science.gov (United States)

    Cacho, N Ivalú; Kliebenstein, Daniel J; Strauss, Sharon Y

    2015-11-01

    We explored macroevolutionary patterns of plant chemical defense in Streptanthus (Brassicaceae), tested for evolutionary escalation of defense, as predicted by Ehrlich and Raven's plant-herbivore coevolutionary arms-race hypothesis, and tested whether species inhabiting low-resource or harsh environments invest more in defense, as predicted by the resource availability hypothesis (RAH). We conducted phylogenetically explicit analyses using glucosinolate profiles, soil nutrient analyses, and microhabitat bareness estimates across 30 species of Streptanthus inhabiting varied environments and soils. We found weak to moderate phylogenetic signal in glucosinolate classes and no signal in total glucosinolate production; a trend toward evolutionary de-escalation in the numbers and diversity of glucosinolates, accompanied by an evolutionary increase in the proportion of aliphatic glucosinolates; some support for the RAH relative to soil macronutrients, but not relative to serpentine soil use; and that the number of glucosinolates increases with microhabitat bareness, which is associated with increased herbivory and drought. Weak phylogenetic signal in chemical defense has been observed in other plant systems. A more holistic approach incorporating other forms of defense might be necessary to confidently reject escalation of defense. That defense increases with microhabitat bareness supports the hypothesis that habitat bareness is an underappreciated selective force on plants in harsh environments.

  4. Discussion on advanced manufacturing

    Institute of Scientific and Technical Information of China (English)

    WANG Xiankui

    2007-01-01

    Advanced manufacturing consists of continuity of manufacturing,its broad sense,and the core of the manufacturing process.The technology of continuous manufacturing is discussed according to both historical and modern perspectives.The relationship between human development and manufacturing technology is also discussed.Manufacturing is a continuously evolving topic.It is not only the foundation and means of imagination,conception,the science,and the technology of material change,but also the expression of national economy,national defense,and the support industries.The broad sense of manufacturing theory,which extends the concept of manufacturing,is an important development in the 20th century.The sense is analyzed in connection with design,material forming theory,synthesis of manufacturing technology,manufacturing modes,life cycle of product,hardware and sottware,and support environment,etc.At the same time,the core action and the development of the theory and technology of process is also discussed.At the end of this paper,the development directions of mechanical manufacturing science and technology are mentioned.

  5. Advanced Virgo

    CERN Multimedia

    Virgo, a first-generation interferometric gravitational wave (GW) detector, located in the European Gravitational Observatory, EGO, Cascina (Pisa-Italy) and constructed by the collaboration of French and Italian institutes (CNRS and INFN) has successfully completed its long-duration data taking runs. It is now undergoing a fundamental upgrade that exploits available cutting edges technology to open an exciting new window on the universe, with the first detection of a gravitational wave signal. Advanced Virgo (AdV) is the project to upgrade the Virgo detector to a second-generation instrument. AdV will be able to scan a volume of the Universe 1000 times larger than initial Virgo. AdV will be hosted in the same infrastructures as Virgo. The Advanced VIRGO project is funded and at present carried on by a larger collaboration of institutes belonging to CNRS- France , RMKI - Hungary, INFN- Italy, Nikhef - The Netherlands Polish Academy of Science - Poland.

  6. Advancing Leadership

    Directory of Open Access Journals (Sweden)

    Penny L. Tenuto

    2014-04-01

    Full Text Available Preparing students to become active citizens and contributors to a democratic society is premised on teaching democratic principles and modeling standards of democratic practice at all levels of education. The purpose of this integrative literature review is to establish a conceptual framework grounded in literature and a model for cultivating democratic professional practice in education (DPPE to advance leadership for school improvement. This work is presented in three parts: (a a review of historical references, reports, and legislation that culminated in increased accountability and standards in P-12 public education; (b a discussion of social patterns in education generally associated with bureaucracy versus democracy; and (c a new contribution to the literature, a model for cultivating DPPE is conceptualized to encourage leading and teaching professionals to reflect on beliefs and evaluate practices in advancing leadership for school improvement. Recommendations are included for further research.

  7. Advanced LIGO

    OpenAIRE

    Aasi, J.; Abbott, B.; Abbott, R.; Abbott, T.; Abernathy, M; Ackley, K.; Adams, C.; Adams, T.; Addesso, P; Adhikari, R.; Adya, V.; Affeldt, C.; Aggarwal, N.; Aguiar, O.; Ain, A.

    2014-01-01

    The Advanced LIGO gravitational wave detectors are second-generation instruments designed and built for the two LIGO observatories in Hanford, WA and Livingston, LA, USA. The two instruments are identical in design, and are specialized versions of a Michelson interferometer with 4 km long arms. As in Initial LIGO, Fabry–Perot cavities are used in the arms to increase the interaction time with a gravitational wave, and power recycling is used to increase the effective laser power. Signal recyc...

  8. Advanced Combustion

    Energy Technology Data Exchange (ETDEWEB)

    Holcomb, Gordon R. [NETL

    2013-03-11

    The activity reported in this presentation is to provide the mechanical and physical property information needed to allow rational design, development and/or choice of alloys, manufacturing approaches, and environmental exposure and component life models to enable oxy-fuel combustion boilers to operate at Ultra-Supercritical (up to 650{degrees}C & between 22-30 MPa) and/or Advanced Ultra-Supercritical conditions (760{degrees}C & 35 MPa).

  9. The Full Costs of Ballistic Missile Defense

    Science.gov (United States)

    2003-01-01

    Krepinovich, “Defense Transformation,” and Paul Wolfowitz , “Transformation,” Prepared testimony, Senate Armed Services Committee, April 9, 2002...Massive Cash Infusion,” Aviation Week and Space Technology, April 22, 2002.9 Matthew L. Wald , “White House Cuts 93% of Funds Sought to Guard Atomic Arms

  10. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  11. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  12. Techniques for Combined Arms for Air Defense

    Science.gov (United States)

    2016-07-29

    defense systems. Planning must focus on current threat intelligence capitalizing on suspected and reported enemy information that may shape near term...over short distances as attack and transport platforms because they have exceptional low altitude flight capabilities. These aircraft are easily masked...BALLISTIC MISSILES (TBM) What are the capabilities of threat TBM systems regarding:  Performance ( flight time, speed, trajectory and launch

  13. Enhancing Air Base Defense Through Joint Doctrine

    Science.gov (United States)

    2009-01-01

    Warfare, 258. 40 Tse-Tung, Mao Tse-Tung on Guerrilla Warfare, 27. 41 Maj David P. Briar , USAF, Sharpening the Eagle’s Talons: Assessing Air Base Defense...and Contingency Operations Doctrine 1942-1976, Washington, D.C.: Center ofMilitary History U.S. Army, 2006 (143) Briar , Maj David P., USAF, Sharpening

  14. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    force". The Army’s recent emphasis on maneuver and mobil - ity, and the employment of smaller units, demonstrates the utility of this doctrine...to forgo the use of defensive space systems, since some of the techonology now investigated could at least pro- tect missile sites, and make the

  15. 75 FR 32416 - Defense Science Board

    Science.gov (United States)

    2010-06-08

    ... Systems and Assets to Electromagnetic Pulse (EMP) and other Nuclear Weapons Effects will meet in closed... discuss presentations on: findings and recommendations of the Congressional EMP Commission, the Defense...; implementation to date of DoD Instruction 3150.09; the SECDEF 2009 Report to Congress on EMP Survivability;...

  16. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    Defense Agency, Huntsville, AL; Chief, Materiel Fielding Team ( Automotive ), Materiel Fielding and Training Directorate, TACOM Life Cycle Management...Executive Office Ground Combat Systems, Detroit Arsenal, Michigan; Training With Industry Officer, EADS North America, Huntsville, Alabama; and Product...identify the ways and means to counter this imbalance or risk future erosion of our military effectiveness, diminished allied confidence, and unnecessarily

  17. Carp erythrodermatitis: host defense-pathogen interaction.

    NARCIS (Netherlands)

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense syste

  18. Defense Science and Technology Success Stories

    Science.gov (United States)

    2007-01-01

    program. POC: Mr. Paul Koskey, MDA/ DVI , 703-882-6154 Year: FY 2006/2007 Fiber Grating Sensor for Damage Assessment MISSILE DEFENSE AGENCY (MDA) 43...sulfur, these microorganisms remove a potentially fouling precipitate from the anode. Collective activity of the biofilm and continuous flux of fuel by

  19. Rigorous Cyberspace Defense Expert Training Moves Forward

    Science.gov (United States)

    2012-09-01

    planners to integrate computer network opera- tions into the commander’s opera- tions down to the tactical edge. Aspects of CND by themselves are...also a graduate of the first 255S class October 2010. ACRONYM QuickScan CND - Computer network defense CNO - Computer network operations CTF

  20. Schools Enlisting Defense Industry to Boost STEM

    Science.gov (United States)

    Trotter, Andrew

    2008-01-01

    Defense contractors Northrop Grumman Corp. and Lockheed Martin Corp. are joining forces in an innovative partnership to develop high-tech simulations to boost STEM--or science, technology, engineering, and mathematics--education in the Baltimore County schools. The Baltimore County partnership includes the local operations of two major military…

  1. Host Defense against Opportunist Microorganisms Following Trauma.

    Science.gov (United States)

    1988-06-30

    02ELEMENT NO. NO.3S162 jNO. ACESSION NO. Frdeic, arlnd210150262772A 772A874 AA280 11. TITLF (Include Securrty Classification) (U) Host Defense Against...copy Dean School of Medicine Uniformed Services University of the Hlealth Sciences 4301 Jones Bridge Road’ Bethesda, MD 20814-4799 1 copy Commandant

  2. Defense Acquisition Transformation: Report to Congress

    Science.gov (United States)

    2007-07-25

    acquisition and financial databases . The emphasis is on data integrity in a net-centric, authoritative environment and comprehensive, transparent...resources R&E planning documents, financial databases , and other R&E resources Defense Acquisition Management Information Retrieval (DAMIR): Leverages

  3. Non-Traditional Commercial Defense Contractors

    Science.gov (United States)

    2013-11-01

    have access to shared virtual workspaces and overnight shipping. Virtual tools improve communication among researchers both across the campus and...reports. Retrieved from http://www.fas.org/man/dod-101/sys/ smart /ppcp97c1.htm Office of the Secretary of Defense (OSD). (2002, April 5). Mandatory

  4. The DDN (Defense Data Network) Course,

    Science.gov (United States)

    1986-04-01

    Endtc Proceso H~~~% - ot-opue 5 - 4a 5) Technical Overview of the Defense Data Network a) Design Criteria -= . -%** Low risk, cost effective system that...SOFTWARE: VMS/Ultnx/TOPS-20 Operating System BACKGROUND: Until this past year Digital promoted the use of "DECnet" exclusively , its proprietary networking

  5. The equal effectiveness of different defensive strategies

    Science.gov (United States)

    Zhang, Shuang; Zhang, Yuxin; Ma, Keming

    2015-01-01

    Plants have evolved a variety of defensive strategies to resist herbivory, but at the interspecific level, the relative effectiveness of these strategies has been poorly evaluated. In this study, we compared the level of herbivory between species that depend on ants as indirect defenders and species that rely primarily on their own direct defenses. Using a dataset of 871 species and 1,405 data points, we found that in general, ant-associated species had levels of herbivory equal to those of species that are unattractive to ants; the pattern was unaffected by plant life form, climate and phylogenetic relationships between species. Interestingly, species that offer both food and nesting spaces for ants suffered significantly lower herbivory compared to species that offer either food or nesting spaces only or no reward for ants. A negative relationship between herbivory and latitude was detected, but the pattern can be changed by ants. These findings suggest that, at the interspecific level, the effectiveness of different defensive strategies may be equal. Considering the effects of herbivory on plant performance and fitness, the equal effectiveness of different defensive strategies may play an important role in the coexistence of various species at the community scale. PMID:26267426

  6. Molecular mechanisms of insect adaptation to plant defense:Lessons Iearned from a Bruchid beetle

    Institute of Scientific and Technical Information of China (English)

    Keyan Zhu-Salzman; Ren Sen Zeng

    2008-01-01

    Plants can accumulate,constitutively and/or after induction,a wide variety of defense compounds in their tissues that confer resistance to herbivorous insects.The naturally occurring plant resistance gene pool can serve as an arsenal in pest management via transgenic approaches.As insect-plant interaction research rapidly advances,it has gradually become clear that the effects of plant defense compounds ale determined not only by their toxicity toward target sites,but also by how insects respond to the challenge.Insect digestive tracts age not passive targets of plant defense,but often can adapt to dietary challenge and successfully deal with various plant toxins and anti-metabolites.This adaptive response has posed an obstacle to biotechnology-based pest control approaches,which underscores the importance of understanding insect adaptive mechanisms.Molecular studies on the impact of protease inhibitors on insect digestion have contributed significantly to our understanding of insect adaptation to plant defense.This review will focus on exposing how the insect responds to protease inhibitors by both qualitative and quantitative remod-eling of their digestive proteases using the cowpea bruchid-soybean cysteine protease inhibitor N system.

  7. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  8. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    National Research Council Canada - National Science Library

    Gralepois, Mathilde; Larrue, Corinne; Wiering, Mark; Crabbé, Ann; Tapsell, Sue; Mees, Hannelore; Ek, Kristina; Szwed, Malgorzata

    2016-01-01

    ... (Belgium, England, France, the Netherlands, Poland, and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories...

  9. Reinventing the Arsenal: Defense-Industrial Adaptation in Small States

    National Research Council Canada - National Science Library

    Marc R Devore

    2016-01-01

    .... forced governments to reevaluate their defense-industrial policies. In each case, governments abandoned the pursuit of defense-industrial self-sufficiency and adopted export-dependent defenseindustrial policies...

  10. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  11. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    occlusion , multipath etc.) through the use of inertial measurement systems (Interferometric Fiber Optic Gyro, Dynamically Tuned Gyro) and will...management systems provide mobile and semi- mobile assets (e.g., Abrams, Theater Missile Defense - TMD ) with low cost, low burden survivability...technology for development of an operational high energy Airborne Laser (ABL) for Theater Missile Defense ( TMD ). Address risk reduction issues for develop

  12. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  13. The US-Japan Alliance: Sharing the Burden of Defense

    Science.gov (United States)

    1983-01-01

    expenditures to GNP. Japan Is also far down the list in defense spending per capita, behind nations such as Sweden, Australia, and Canada. Table 1.2 compares...TABLES Figures 1.1 Trends in Japanese Defense Spending ................. 14 Tables 1.1 Defense Expenditures of Major Countries ............... 12 1.2...Percentage Breakdown of Japanese Defense Expenditures by Category, FY 1977-1981 ............ 40 3.3 Disposition of US Forces in Japan

  14. Flotation advances

    Energy Technology Data Exchange (ETDEWEB)

    Clifford, D.

    1998-11-01

    This paper describes recent advances in flotation cell and mechanism design. OutoKumpu have designed larger cells, suitable for the flotation of smaller particles, with differing mechanisms for particles of different types. Froth handling is also closely controlled. Flotation cells from BQR are also described. Flotation columns are also increasingly being adopted, complementing the use of conventional flotation cells. Designs by Wemco, Multotec, VERTI-MIX, Jameson, Suedala, Quinn and Cytec are detailed, giving improvements in fine coal separation coarse particle separation, and other innovations. 8 figs., 2 tabs.

  15. Advanced calculus

    CERN Document Server

    Widder, David V

    2012-01-01

    This classic text by a distinguished mathematician and former Professor of Mathematics at Harvard University, leads students familiar with elementary calculus into confronting and solving more theoretical problems of advanced calculus. In his preface to the first edition, Professor Widder also recommends various ways the book may be used as a text in both applied mathematics and engineering.Believing that clarity of exposition depends largely on precision of statement, the author has taken pains to state exactly what is to be proved in every case. Each section consists of definitions, theorem

  16. Advanced calculus

    CERN Document Server

    Friedman, Avner

    2007-01-01

    This rigorous two-part treatment advances from functions of one variable to those of several variables. Intended for students who have already completed a one-year course in elementary calculus, it defers the introduction of functions of several variables for as long as possible, and adds clarity and simplicity by avoiding a mixture of heuristic and rigorous arguments.The first part explores functions of one variable, including numbers and sequences, continuous functions, differentiable functions, integration, and sequences and series of functions. The second part examines functions of several

  17. Advanced trigonometry

    CERN Document Server

    Durell, C V

    2003-01-01

    This volume will provide a welcome resource for teachers seeking an undergraduate text on advanced trigonometry, when few are readily available. Ideal for self-study, this text offers a clear, logical presentation of topics and an extensive selection of problems with answers. Contents include the properties of the triangle and the quadrilateral; equations, sub-multiple angles, and inverse functions; hyperbolic, logarithmic, and exponential functions; and expansions in power-series. Further topics encompass the special hyperbolic functions; projection and finite series; complex numbers; de Moiv

  18. Advanced calculus

    CERN Document Server

    Fitzpatrick, Patrick M

    2009-01-01

    Advanced Calculus is intended as a text for courses that furnish the backbone of the student's undergraduate education in mathematical analysis. The goal is to rigorously present the fundamental concepts within the context of illuminating examples and stimulating exercises. This book is self-contained and starts with the creation of basic tools using the completeness axiom. The continuity, differentiability, integrability, and power series representation properties of functions of a single variable are established. The next few chapters describe the topological and metric properties of Euclide

  19. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of subsection... hereby given that the Defense Intelligence Agency Advisory Board, will meet on March 22 and 23, 2010....

  20. 76 FR 20336 - Defense Audit Advisory Committee (DAAC)

    Science.gov (United States)

    2011-04-12

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF DEFENSE Office of the Secretary Defense Audit Advisory Committee (DAAC) AGENCY: Under Secretary of Defense... (5 U.S.C., Appendix, as amended), the Government in the Sunshine Act of 1976 (5 U.S.C. 552b, as...

  1. Trusted Defense Microelectronics: Future Access and Capabilities Are Uncertain

    Science.gov (United States)

    2015-10-28

    TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Statement of Marie A. Mak...1. REPORT DATE OCT 2015 2. REPORT TYPE 3. DATES COVERED 00-00-2015 to 00-00-2015 4. TITLE AND SUBTITLE Trusted Defense Microelectronics ...House of Representatives October 2015 TRUSTED DEFENSE MICROELECTRONICS Future Access and Capabilities Are Uncertain Why GAO Did This Study DOD’s

  2. Urban Youth, Fear of Crime, and Resulting Defensive Actions.

    Science.gov (United States)

    Williams, J. Sherwood; And Others

    1994-01-01

    Used data from 1,775 urban youth collected in 1986 to examine fear of crime and defensive actions taken by youth. Results revealed that only 11% reported having taken no defensive actions as result of fear of crime. Nearly three-fifths took precaution of having escort at night. Learning self-defense techniques was reported by 19%; 10% indicated…

  3. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  4. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  5. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  6. Children's Use of Defenses and Self-Esteem Management.

    Science.gov (United States)

    Hay, Deborah

    Children's use of defenses to maintain or enhance self-esteem was investigated. Attention was given to four questions: Do children with different levels of self-esteem differ in (1) the frequency with which they employ defenses? (2) kinds of emotions they defend against? (3) the kinds of social situations which elicit their defensive responses?…

  7. 32 CFR 644.333 - Screening for defense needs.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 4 2010-07-01 2010-07-01 true Screening for defense needs. 644.333 Section 644... Screening for defense needs. Real property which becomes excess to the needs of any element of the Army or... the property is excess to the needs of the using command, without screening for other requirements....

  8. Defense Institution Reform Initiative Program Elements Need to Be Defined

    Science.gov (United States)

    2012-11-09

    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership Strategy...to the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  9. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    Roosenboom, P.; van der Goot, L.R.T.

    2003-01-01

    The central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO investors

  10. Takeover defenses and IPO firm value in the Netherlands

    NARCIS (Netherlands)

    P.G.J. Roosenboom (Peter); T. van der Goot

    2003-01-01

    textabstractThe central question of this study involves the relation between the use of takeover defenses and IPO firm value. We report that management frequently uses takeover defenses before taking the firm public. The use of takeover defenses is primarily motivated by managerial entrenchment. IPO

  11. Department of Defense Fiscal Year (FY) 2005 Budget Estimates. Research, Development, Test and Evaluation, Defense-Wide. Volume 1 - Defense Advanced Research Projects Agency

    Science.gov (United States)

    2004-02-01

    algorithms based on wavelets and superparamagnetic resonance for sorting neuronal spike data; develop a Bayesian network framework for analysis of cellular...nuclear spin sensitivity. − Investigate fundamental issues of nanowire communication with electrically active biological systems ( neurons ) including high...initiative encompasses high-resolution multispectral, multipolarization , radio frequency, electro-optical (EO) and active optical sensors. The program

  12. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  13. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence... a closed meeting of the Defense Intelligence Agency National Intelligence University Board...

  14. The Defense Science Board 1999 Summer Study Task Force on 21st Century Defense Technology Strategies. Volume 1

    Science.gov (United States)

    2016-06-07

    Study Task Force On 21ST Century Defense Technology Strategies Volume 1 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR...3. Defense Technology Strategy and Management PART 4. Strategic Agility PART 5. Analysis and Quantitative Results iii PREFACE The Defense Science...Board (DSB) 1999 Summer Study Task Force on 21st Century Defense Technology Strategies continues a series of studies that have examined key challenges

  15. Advanced LIGO

    CERN Document Server

    ,

    2014-01-01

    The Advanced LIGO gravitational wave detectors are second generation instruments designed and built for the two LIGO observatories in Hanford, WA and Livingston, LA. The two instruments are identical in design, and are specialized versions of a Michelson interferometer with 4 km long arms. As in initial LIGO, Fabry-Perot cavities are used in the arms to increase the interaction time with a gravitational wave, and power recycling is used to increase the effective laser power. Signal recycling has been added in Advanced LIGO to improve the frequency response. In the most sensitive frequency region around 100 Hz, the design strain sensitivity is a factor of 10 better than initial LIGO. In addition, the low frequency end of the sensitivity band is moved from 40 Hz down to 10 Hz. All interferometer components have been replaced with improved technologies to achieve this sensitivity gain. Much better seismic isolation and test mass suspensions are responsible for the gains at lower frequencies. Higher laser power, ...

  16. Advanced LIGO

    Science.gov (United States)

    LIGO Scientific Collaboration; Aasi, J.; Abbott, B. P.; Abbott, R.; Abbott, T.; Abernathy, M. R.; Ackley, K.; Adams, C.; Adams, T.; Addesso, P.; Adhikari, R. X.; Adya, V.; Affeldt, C.; Aggarwal, N.; Aguiar, O. D.; Ain, A.; Ajith, P.; Alemic, A.; Allen, B.; Amariutei, D.; Anderson, S. B.; Anderson, W. G.; Arai, K.; Araya, M. C.; Arceneaux, C.; Areeda, J. S.; Ashton, G.; Ast, S.; Aston, S. M.; Aufmuth, P.; Aulbert, C.; Aylott, B. E.; Babak, S.; Baker, P. T.; Ballmer, S. W.; Barayoga, J. C.; Barbet, M.; Barclay, S.; Barish, B. C.; Barker, D.; Barr, B.; Barsotti, L.; Bartlett, J.; Barton, M. A.; Bartos, I.; Bassiri, R.; Batch, J. C.; Baune, C.; Behnke, B.; Bell, A. S.; Bell, C.; Benacquista, M.; Bergman, J.; Bergmann, G.; Berry, C. P. L.; Betzwieser, J.; Bhagwat, S.; Bhandare, R.; Bilenko, I. A.; Billingsley, G.; Birch, J.; Biscans, S.; Biwer, C.; Blackburn, J. K.; Blackburn, L.; Blair, C. D.; Blair, D.; Bock, O.; Bodiya, T. P.; Bojtos, P.; Bond, C.; Bork, R.; Born, M.; Bose, Sukanta; Brady, P. R.; Braginsky, V. B.; Brau, J. E.; Bridges, D. O.; Brinkmann, M.; Brooks, A. F.; Brown, D. A.; Brown, D. D.; Brown, N. M.; Buchman, S.; Buikema, A.; Buonanno, A.; Cadonati, L.; Calderón Bustillo, J.; Camp, J. B.; Cannon, K. C.; Cao, J.; Capano, C. D.; Caride, S.; Caudill, S.; Cavaglià, M.; Cepeda, C.; Chakraborty, R.; Chalermsongsak, T.; Chamberlin, S. J.; Chao, S.; Charlton, P.; Chen, Y.; Cho, H. S.; Cho, M.; Chow, J. H.; Christensen, N.; Chu, Q.; Chung, S.; Ciani, G.; Clara, F.; Clark, J. A.; Collette, C.; Cominsky, L.; Constancio, M., Jr.; Cook, D.; Corbitt, T. R.; Cornish, N.; Corsi, A.; Costa, C. A.; Coughlin, M. W.; Countryman, S.; Couvares, P.; Coward, D. M.; Cowart, M. J.; Coyne, D. C.; Coyne, R.; Craig, K.; Creighton, J. D. E.; Creighton, T. D.; Cripe, J.; Crowder, S. G.; Cumming, A.; Cunningham, L.; Cutler, C.; Dahl, K.; Dal Canton, T.; Damjanic, M.; Danilishin, S. L.; Danzmann, K.; Dartez, L.; Dave, I.; Daveloza, H.; Davies, G. S.; Daw, E. J.; DeBra, D.; Del Pozzo, W.; Denker, T.; Dent, T.; Dergachev, V.; DeRosa, R. T.; DeSalvo, R.; Dhurandhar, S.; D´ıaz, M.; Di Palma, I.; Dojcinoski, G.; Dominguez, E.; Donovan, F.; Dooley, K. L.; Doravari, S.; Douglas, R.; Downes, T. P.; Driggers, J. C.; Du, Z.; Dwyer, S.; Eberle, T.; Edo, T.; Edwards, M.; Edwards, M.; Effler, A.; Eggenstein, H.-B.; Ehrens, P.; Eichholz, J.; Eikenberry, S. S.; Essick, R.; Etzel, T.; Evans, M.; Evans, T.; Factourovich, M.; Fairhurst, S.; Fan, X.; Fang, Q.; Farr, B.; Farr, W. M.; Favata, M.; Fays, M.; Fehrmann, H.; Fejer, M. M.; Feldbaum, D.; Ferreira, E. C.; Fisher, R. P.; Frei, Z.; Freise, A.; Frey, R.; Fricke, T. T.; Fritschel, P.; Frolov, V. V.; Fuentes-Tapia, S.; Fulda, P.; Fyffe, M.; Gair, J. R.; Gaonkar, S.; Gehrels, N.; Gergely, L. Á.; Giaime, J. A.; Giardina, K. D.; Gleason, J.; Goetz, E.; Goetz, R.; Gondan, L.; González, G.; Gordon, N.; Gorodetsky, M. L.; Gossan, S.; Goßler, S.; Gräf, C.; Graff, P. B.; Grant, A.; Gras, S.; Gray, C.; Greenhalgh, R. J. S.; Gretarsson, A. M.; Grote, H.; Grunewald, S.; Guido, C. J.; Guo, X.; Gushwa, K.; Gustafson, E. K.; Gustafson, R.; Hacker, J.; Hall, E. D.; Hammond, G.; Hanke, M.; Hanks, J.; Hanna, C.; Hannam, M. D.; Hanson, J.; Hardwick, T.; Harry, G. M.; Harry, I. W.; Hart, M.; Hartman, M. T.; Haster, C.-J.; Haughian, K.; Hee, S.; Heintze, M.; Heinzel, G.; Hendry, M.; Heng, I. S.; Heptonstall, A. W.; Heurs, M.; Hewitson, M.; Hild, S.; Hoak, D.; Hodge, K. A.; Hollitt, S. E.; Holt, K.; Hopkins, P.; Hosken, D. J.; Hough, J.; Houston, E.; Howell, E. J.; Hu, Y. M.; Huerta, E.; Hughey, B.; Husa, S.; Huttner, S. H.; Huynh, M.; Huynh-Dinh, T.; Idrisy, A.; Indik, N.; Ingram, D. R.; Inta, R.; Islas, G.; Isler, J. C.; Isogai, T.; Iyer, B. R.; Izumi, K.; Jacobson, M.; Jang, H.; Jawahar, S.; Ji, Y.; Jiménez-Forteza, F.; Johnson, W. W.; Jones, D. I.; Jones, R.; Ju, L.; Haris, K.; Kalogera, V.; Kandhasamy, S.; Kang, G.; Kanner, J. B.; Katsavounidis, E.; Katzman, W.; Kaufer, H.; Kaufer, S.; Kaur, T.; Kawabe, K.; Kawazoe, F.; Keiser, G. M.; Keitel, D.; Kelley, D. B.; Kells, W.; Keppel, D. G.; Key, J. S.; Khalaidovski, A.; Khalili, F. Y.; Khazanov, E. A.; Kim, C.; Kim, K.; Kim, N. G.; Kim, N.; Kim, Y.-M.; King, E. J.; King, P. J.; Kinzel, D. L.; Kissel, J. S.; Klimenko, S.; Kline, J.; Koehlenbeck, S.; Kokeyama, K.; Kondrashov, V.; Korobko, M.; Korth, W. Z.; Kozak, D. B.; Kringel, V.; Krishnan, B.; Krueger, C.; Kuehn, G.; Kumar, A.; Kumar, P.; Kuo, L.; Landry, M.; Lantz, B.; Larson, S.; Lasky, P. D.; Lazzarini, A.; Lazzaro, C.; Le, J.; Leaci, P.; Leavey, S.; Lebigot, E. O.; Lee, C. H.; Lee, H. K.; Lee, H. M.; Leong, J. R.; Levin, Y.; Levine, B.; Lewis, J.; Li, T. G. F.; Libbrecht, K.; Libson, A.; Lin, A. C.; Littenberg, T. B.; Lockerbie, N. A.; Lockett, V.; Logue, J.; Lombardi, A. L.; Lormand, M.; Lough, J.; Lubinski, M. J.

    2015-04-01

    The Advanced LIGO gravitational wave detectors are second-generation instruments designed and built for the two LIGO observatories in Hanford, WA and Livingston, LA, USA. The two instruments are identical in design, and are specialized versions of a Michelson interferometer with 4 km long arms. As in Initial LIGO, Fabry-Perot cavities are used in the arms to increase the interaction time with a gravitational wave, and power recycling is used to increase the effective laser power. Signal recycling has been added in Advanced LIGO to improve the frequency response. In the most sensitive frequency region around 100 Hz, the design strain sensitivity is a factor of 10 better than Initial LIGO. In addition, the low frequency end of the sensitivity band is moved from 40 Hz down to 10 Hz. All interferometer components have been replaced with improved technologies to achieve this sensitivity gain. Much better seismic isolation and test mass suspensions are responsible for the gains at lower frequencies. Higher laser power, larger test masses and improved mirror coatings lead to the improved sensitivity at mid and high frequencies. Data collecting runs with these new instruments are planned to begin in mid-2015.

  17. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  18. Validity of Self-Report Measures of Defense Mechanisms

    Science.gov (United States)

    Mehlman; Slane

    1994-06-01

    The Life Style Index (LSI), the Defense Style Questionnaire (DSQ), the Defense Mechanisms Inventory (DMI), and the FIRO Coping Operations Preferences Enquiry (FIRO) were administered to 187 undergraduates in order to determine convergent and discriminant validity of self-report measures of defense mechanisms. A correlational analysis of the four scales resulted in low correlations among subscales measuring similar defense mechanisms. A factor analysis produced factors based on particular scales rather than identical or similar constructs. Results suggest that self-report measures may not be an effective method for assessing various ego defense strategies.

  19. Effective adjunctive therapy by an innate defense regulatory peptide in a preclinical model of severe malaria.

    Science.gov (United States)

    Achtman, Ariel H; Pilat, Sandra; Law, Charity W; Lynn, David J; Janot, Laure; Mayer, Matt L; Ma, Shuhua; Kindrachuk, Jason; Finlay, B Brett; Brinkman, Fiona S L; Smyth, Gordon K; Hancock, Robert E W; Schofield, Louis

    2012-05-23

    Case fatality rates for severe malaria remain high even in the best clinical settings because antimalarial drugs act against the parasite without alleviating life-threatening inflammation. We assessed the potential for host-directed therapy of severe malaria of a new class of anti-inflammatory drugs, the innate defense regulator (IDR) peptides, based on host defense peptides. The Plasmodium berghei ANKA model of experimental cerebral malaria was adapted to use as a preclinical screen by combining late-stage intervention in established infections with advanced bioinformatic analysis of early transcriptional changes in co-regulated gene sets. Coadministration of IDR-1018 with standard first-line antimalarials increased survival of infected mice while down-regulating key inflammatory networks associated with fatality. Thus, IDR peptides provided host-directed adjunctive therapy for severe disease in combination with antimalarial treatment.

  20. National Defense Budget Estimates for FY 2012

    Science.gov (United States)

    2011-03-01

    Military Construction, Navy Reserve 21,708 26,299 26,299 26,299 Military Construction, Air Force Reserve 25,986 33,620 33,620 33,620 Chemical Demil ...Air Force Reserve 7,634 Chemical Demil Construction, Defense 75,312 13,071,701 Appropriation 13,071,701 Budget Authority 13,071,701 TOA...7.00 3.00 Defense Prod Act 59.00 25.00 16.00 Chemical Demil 53.00 30.00 15.00 2.00 RDT&E Army 34.28 48.72 11.33 3.17 1.70 0.80 Navy 36.87 50.51 9.82

  1. Prosthetic advances.

    Science.gov (United States)

    Harvey, Zach T; Potter, Benjamin K; Vandersea, James; Wolf, Erik

    2012-01-01

    Much of the current prosthetic technology is based on developments that have taken place during or directly following times of war. These developments have evolved and improved over the years, and now there are many more available options to provide a comfortable, cosmetic, and highly functional prosthesis. Even so, problems with fit and function persist. Recent developments have addressed some of the limitations faced by some military amputees. On-board microprocessor-controlled joints are making prosthetic arms and legs more responsive to environmental barriers and easier to control by the user. Advances in surgical techniques will allow more intuitive control and secure attachment to the prosthesis. As surgical techniques progress and permeate into standard practice, more sophisticated powered prosthetic devices will become commonplace, helping to restore neuromuscular loss of function. Prognoses following amputation will certainly rise, factoring into the surgeon's decision to attempt to save a limb versus perform an amputation.

  2. Is European Defense a Bridge too Far?

    Science.gov (United States)

    2006-03-08

    complex security protocol was developed to share classified information. 6 After 9/11 The world changed dramatically the morning of 11 September 2001...European defense. This question, basic to defining a strategy of European security, is still pending and underlies all other debates and decisions...Internet; accessed 15 December 2005. 18 Grupo de Estudios Estrategicos GEES, “The Spanish Identity in the European Defence Industry,” Analisis 12, 8

  3. Defense and detection strategies against Internet worms

    CERN Document Server

    Nazario, José

    2004-01-01

    This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses, and commercial tools. The book helps you understand the classifications and groupings of worms, and offers a deeper understanding of how they threaten network and system security.

  4. Information on Japanese Defensive Installations and Tactics

    Science.gov (United States)

    1945-01-01

    caves* These’ caves were extremely well camouflaged . and, in a few isolated places,, were protected by sliding steel doors against which flame... camouflage were present. In addition, artil- lery "Data- Sheets" were discovered which: indicated that the guns were to bo employed as a- battery . This...34 Octopus -pot11 defensive positions. . Blue troops usually refer to them as "pimples" because of the relatively small hills on which they have been

  5. Research on Nonlinear Dynamics with Defense Applications

    Science.gov (United States)

    2006-04-01

    numerical verifications, we have experimentally realized the scheme by using a Duffing -type of nonlinear electronic oscillator (originally developed by C...circuits In defense applications it may be desirable to induce chaos in nonlinear oscillators operating in a stable regime. Examples of such oscillators ...evolutions of the target Duffing circuit and deliver resonant perturbations to generate robust chaotic attractors. A brief account of the work has been

  6. Defense Trade Data: Sources and Recommendations

    Science.gov (United States)

    2010-11-01

    detailed trade information on such products may be difficult. Recent U.S. concerns have ranged from dependency on rare earths and first level products...BHUTAN BR INDIAN OCEAN TERR EGYPT INDIA IRAN IRAQ ISRAEL JORDAN KOWAIT LEBANON LIBYA MALDIVES MOROCCO NEPAL OMAN PAKISTAN QATAR SAODI...specifically designed or developed for military application and any computer specifically modified for use with any defense article in any category of

  7. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  8. Russian Ballistic Missile Defense: Rhetoric and Reality

    Science.gov (United States)

    2015-06-01

    2012/06/08/russia_installs_new_radars_as_a_ deterrent_15834.html. 130. “Direct Line with Vladimir Putin ,” President of Russia , April 17, 2014...and increases the danger of war. In his 2012 pre-election treatise on defense policy and national security, Rus- sian President Vladimir Putin ...Kontsern PVO Almaz-Antey) was established by President Vladimir Putin in 2002 uniting no fewer than 46 enterprises, including factories, research and

  9. Implications of Germany's declining defense spending

    OpenAIRE

    Merrath, Jurgen

    2000-01-01

    With its reunification on 3 October 1990, Germany regained its full sovereignty and stands now in a position of greater global responsibility. Faced with dramatically increased demands on and expectations for Germany's armed forces, it must answer the question of how much it is willing to invest for safety and stability in Europe and for protection of peace in the world. In determining the level of commitment behind Germany's foreign and security policy, defense spending is an important indic...

  10. The Defense of Henderson Field, Guadalcanal

    Science.gov (United States)

    2011-03-31

    of US airpower an4 know disruption ofsuch power is critical to achieving their goals. Most US airpower operates from airbases, which can be...Vandegrift remained in his defensive positions because he did not know the size, strength, location, or intentions of the Japanese main body.67 Ichiki...Parachute/Raider Battalion. 75 Edson deployed his 830 men South of Henderson Field in a series of mut ~ally supporting strongnolds. He was flanked to

  11. A Content Analysis of Defense Budget Rhetoric

    Science.gov (United States)

    2011-06-01

    President’s budget. 14. SUBJECT TERMS Defense Budget, Content Analysis, Political Discourse, Budget Rhetoric, Political Communication , Senate Armed...represent the most recent paradigm shift in political communication research (Scheufele & Tewksbury, 2007, p. 10). These three models combine to construct...this study was to fill the gap on political communication by examining whether Congress was responsive to framing by the President’s budget. To

  12. Affordability Constraints in Major Defense Acquisitions

    Science.gov (United States)

    2016-11-01

    price , this is actually an inverse supply curve. In competitive markets, the inverse supply curve is the firm’s marginal cost curve. When firms have a...support features and functions. The vertical axis represents the unit sale price , inclusive of all life-cycle or total ownership costs as appropriate...Three Defense Programs 3 We can easily extend the example to incorporate cost - plus payment schemes

  13. Defense Horizons. Number 78, March 2015

    Science.gov (United States)

    2015-03-01

    databases , National Defense University researchers have identified 124 examples of effective P4s across a wide spectrum of industries and...environment. notes 1 A review of multiple databases , case studies, and concept papers has identified over 4,000 examples of public-public and public...Partnering,” SONRI, Inc., 2010. 8 Farming First, “Innovation and Incentives for Farmers Needed to Protect World’s Biodiversity ,” press release, May 21

  14. United States Civil Military Relations: Defense Reform

    Science.gov (United States)

    2016-03-01

    358–421. 154 Lederman, Reorganizing the Joint Chiefs of Staff, 74. 155 Thomas L. McNaugher and Roger L. Sperry , “Improving Military Coordination...edited by Thomas C. Bruneau and Florina Cristiana Matei, 26–38. New York: Routledge Taylor and Francis, 2015. McNaugher, Thomas L. and Roger L... Sperry . “Improving Military Coordination: The Goldwater-Nichols Reorganization of the Department of Defense.” In Who Makes Public Policy: The

  15. Department of Defense Energy Management Plan, 1980

    Science.gov (United States)

    1980-07-01

    Energy Usage in Existing Buildings . .......... .111-29 111-11 Timetable for Developing Utility Efficiency Standards ................. .......... 111-30...in the Defense Energy Emergency Planning System (DEEMS) document (Appendix A). The purpose of the DEEMS is to assure the availabilty of fuels to the...unleaded gasoline usage , y 1985. It is anticipated that sufficient supplies of ’alcohol and non-petroleum derived fuel will be available. DoD’s

  16. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    3 Research, Development , Test, and Evaluation .......................................................................... 3 Defense...Navy,” “to make Rules for the Government and Regulation of the land and naval Forces,” and “to provide for organizing , arming, and disciplining the...Militia, and for governing such Part of them as may be employed in the Service of the United States.... ” CRS has developed a series of short

  17. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral...

  18. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  19. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  20. Defensive mobilization in specific phobia: fear specificity, negative affectivity, and diagnostic prominence.

    Science.gov (United States)

    McTeague, Lisa M; Lang, Peter J; Wangelin, Bethany C; Laplante, Marie-Claude; Bradley, Margaret M

    2012-07-01

    Understanding of exaggerated responsivity in specific phobia-its physiology and neural mediators-has advanced considerably. However, despite strong phenotypic evidence that prominence of specific phobia relative to co-occurring conditions (i.e., principal versus nonprincipal disorder) is associated with dramatic differences in subjective distress, there is yet no consideration of such comorbidity issues on objective defensive reactivity. A community sample of specific phobia (n = 74 principal; n = 86 nonprincipal) and control (n = 76) participants imagined threatening and neutral events while acoustic startle probes were presented and eyeblinks (orbicularis occuli) recorded. Changes in heart rate, skin conductance level, and facial expressivity were also measured. Principal specific phobia patients far exceeded control participants in startle reflex and autonomic reactivity during idiographic fear imagery. Distinguishing between single and multiple phobias within principal phobia and comparing these with nonprincipal phobia revealed a continuum of decreasing defensive mobilization: single patients were strongly reactive, multiple patients were intermediate, and nonprincipal patients were attenuated-the inverse of measures of pervasive anxiety and dysphoria (i.e., negative affectivity). Further, as more disorders supplanted specific phobia from principal disorder, overall defensive mobilization was systematically more impaired. The exaggerated responsivity characteristic of specific phobia is limited to those patients for whom circumscribed fear is the most impairing condition and coincident with little additional affective psychopathology. As specific phobia is superseded in severity by broad and chronic negative affectivity, defensive reactivity progressively diminishes. Focal fears may still be clinically significant but not reflected in objective defensive mobilization. Copyright © 2012 Society of Biological Psychiatry. Published by Elsevier Inc. All rights

  1. Inducible defenses in prey intensify predator cannibalism.

    Science.gov (United States)

    Kishida, Osamu; Trussell, Geoffrey C; Nishimura, Kinya; Ohgushi, Takayuki

    2009-11-01

    Trophic cascades are often a potent force in ecological communities, but abiotic and biotic heterogeneity can diffuse their influence. For example, inducible defenses in many species create variation in prey edibility, and size-structured interactions, such as cannibalism, can shift predator diets away from heterospecific prey. Although both factors diffuse cascade strength by adding heterogeneity to trophic interactions, the consequences of their interactioh remain poorly understood. We show that inducible defenses in tadpole prey greatly intensify cannibalism in predatory larval salamanders. The likelihood of cannibalism was also strongly influenced by asymmetries in salamander size that appear to be most important in the presence of defended prey. Hence, variation in prey edibility and the size structure of the predator may synergistically affect predator-prey population dynamics by reducing prey mortality and increasing predator mortality via cannibalism. We also suggest that the indirect effects of prey defenses may shape the evolution of predator traits that determine diet breadth and how trophic dynamics unfold in natural systems.

  2. Tsunami Defense Efforts at Samcheok Port, Korea

    Science.gov (United States)

    Cho, Y. S.

    2016-02-01

    Tsunamis mainly triggered by impulsive undersea motions are long waves and can propagate a long distance. Thus, they can cause huge casualties not only neighboring countries but also distant countries. Recently, several devastating tsunamis have been occurred around the Pacific Ocean rim. Among them, the Great East Japan tsunami occurred on March 11, 2011 is probably recorded as one of the most destructive tsunamis during last several decades. The Tsunami killed more than 20,000 people (including missing people) and deprived of property damage of approximately 300 billion USD. The eastern coast of the Korean Peninsula has been attacked historically by unexpected tsunami events. These tsunamis were generated by undersea earthquakes occurred off the west coast of Japan. For example, the Central East Sea Tsunami occurred on May 26, 1983 killed 3 people and caused serious property damage at Samcheok Port located at the eastern coast of Korea. Thus, a defense plan against unexpected tsunami strikes is an essential task for the port authority to protect lives of human beings and port facilities. In this study, a master plan of tsunami defense is introduced at Samcheok Port. A tsunami hazard map is also made by employing both propagation and inundation models. Detailed defense efforts are described including the procedure of development of a tsunami hazard map. Keywords: tsunami, hazard map, run-up height, emergency action plan

  3. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  4. Antiviral Defenses in Plants through Genome Editing

    Science.gov (United States)

    Romay, Gustavo; Bragard, Claude

    2017-01-01

    Plant–virus interactions based-studies have contributed to increase our understanding on plant resistance mechanisms, providing new tools for crop improvement. In the last two decades, RNA interference, a post-transcriptional gene silencing approach, has been used to induce antiviral defenses in plants with the help of genetic engineering technologies. More recently, the new genome editing systems (GES) are revolutionizing the scope of tools available to confer virus resistance in plants. The most explored GES are zinc finger nucleases, transcription activator-like effector nucleases, and clustered regularly interspaced short palindromic repeats/Cas9 endonuclease. GES are engineered to target and introduce mutations, which can be deleterious, via double-strand breaks at specific DNA sequences by the error-prone non-homologous recombination end-joining pathway. Although GES have been engineered to target DNA, recent discoveries of GES targeting ssRNA molecules, including virus genomes, pave the way for further studies programming plant defense against RNA viruses. Most of plant virus species have an RNA genome and at least 784 species have positive ssRNA. Here, we provide a summary of the latest progress in plant antiviral defenses mediated by GES. In addition, we also discuss briefly the GES perspectives in light of the rebooted debate on genetic modified organisms (GMOs) and the current regulatory frame for agricultural products involving the use of such engineering technologies. PMID:28167937

  5. Extracellular DNA: the tip of root defenses?

    Science.gov (United States)

    Hawes, Martha C; Curlango-Rivera, Gilberto; Wen, Fushi; White, Gerard J; Vanetten, Hans D; Xiong, Zhongguo

    2011-06-01

    This review discusses how extracellular DNA (exDNA) might function in plant defense, and at what level(s) of innate immunity this process might operate. A new role for extracellular factors in mammalian defense has been described in a series of studies. These studies reveal that cells including neutrophils, eosinophils, and mast cells produce 'extracellular traps' (ETs) consisting of histone-linked exDNA. When pathogens are attracted to such ETs, they are trapped and killed. When the exDNA component of ETs is degraded, trapping is impaired and resistance against invasion is reduced. Conversely, mutation of microbial genes encoding exDNases that degrade exDNA results in loss of virulence. This discovery that exDNases are virulence factors opens new avenues for disease control. In plants, exDNA is required for defense of the root tip. Innate immunity-related proteins are among a group of >100 proteins secreted from the root cap and root border cell populations. Direct tests revealed that exDNA also is rapidly synthesized and exported from the root tip. When this exDNA is degraded by the endonuclease DNase 1, root tip resistance to fungal infection is lost; when the polymeric structure is degraded more slowly, by the exonuclease BAL31, loss of resistance to fungal infection is delayed accordingly. The results suggest that root border cells may function in a manner analogous to that which occurs in mammalian cells.

  6. Electroconvulsive Therapy Malpractice: Verdict for the Defense.

    Science.gov (United States)

    Goodman, Theodore; McCall, W Vaughn

    2015-09-01

    Malpractice cases involving electroconvulsive therapy (ECT) are rare. Even rarer are those malpractice cases alleging ECT-related brain damage. The few cases of ECT malpractice lawsuits are not described in the medical literature in detail. We provide a detailed account of a case of a patient and subsequent alleged ECT-related malpractice. The details of the case were collated using the handwritten notes of one of the authors who was present at the trial and the pretrial documents of discovery that were entered into evidence. The plaintiff alleged complete autobiographical amnesia after ECT, supposedly as a result of ECT-related brain damage. The defense was aided by the presence of extensive neurological examination and brain imaging both before and after ECT. The defense team also offered to the jury the concept of "dissociative amnesia" as an alternative explanation for the plaintiff's memory complaints. The case went to trial and was successfully defended. Electroconvulsive therapy malpractice cases alleging brain damage can be successfully defended, and the successful defense is aided by adequate documentation before, during, and after ECT. Malpractice cases, especially if they are baseless, can occur unpredictably, but they can be defended if the medical documentation is thorough.

  7. DEFENSE RESOURCES MANAGEMENT USING GAME THEORY

    Directory of Open Access Journals (Sweden)

    Marian NEDELCU

    2014-04-01

    Full Text Available Game theory provides a number of analytical tools designed to assist in developing a more comprehensive understanding of phenomena emerging when decision makers interact. A game describes the strategic interactions between players who act guided by their interests and with the consciousness that their actions affect each other. The basic entity in all game theory models is the player. A player may be understood as an individual, group of individuals or any kind of organization, even countries or alliances facing decisions-making challenges and opportunities. In this respect, the concept providing the dimensions and variables informing on the planning “game” elements required for an optimal defense resource allocation is that of ‘capabilities’. The model developed in this paper is focused on allocations of the available defense resources over the assumed capabilities in order to achieve the best response to national security. I consider as a game the competition between strategic decision-makers involved in defense resource management and the threats to the national security.

  8. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  9. Chromosome-level genome map provides insights into diverse defense mechanisms in the medicinal fungus Ganoderma sinense.

    Science.gov (United States)

    Zhu, Yingjie; Xu, Jiang; Sun, Chao; Zhou, Shiguo; Xu, Haibin; Nelson, David R; Qian, Jun; Song, Jingyuan; Luo, Hongmei; Xiang, Li; Li, Ying; Xu, Zhichao; Ji, Aijia; Wang, Lizhi; Lu, Shanfa; Hayward, Alice; Sun, Wei; Li, Xiwen; Schwartz, David C; Wang, Yitao; Chen, Shilin

    2015-06-05

    Fungi have evolved powerful genomic and chemical defense systems to protect themselves against genetic destabilization and other organisms. However, the precise molecular basis involved in fungal defense remain largely unknown in Basidiomycetes. Here the complete genome sequence, as well as DNA methylation patterns and small RNA transcriptomes, was analyzed to provide a holistic overview of secondary metabolism and defense processes in the model medicinal fungus, Ganoderma sinense. We reported the 48.96 Mb genome sequence of G. sinense, consisting of 12 chromosomes and encoding 15,688 genes. More than thirty gene clusters involved in the biosynthesis of secondary metabolites, as well as a large array of genes responsible for their transport and regulation were highlighted. In addition, components of genome defense mechanisms, namely repeat-induced point mutation (RIP), DNA methylation and small RNA-mediated gene silencing, were revealed in G. sinense. Systematic bioinformatic investigation of the genome and methylome suggested that RIP and DNA methylation combinatorially maintain G. sinense genome stability by inactivating invasive genetic material and transposable elements. The elucidation of the G. sinense genome and epigenome provides an unparalleled opportunity to advance our understanding of secondary metabolism and fungal defense mechanisms.

  10. Advanced burner test reactor preconceptual design report.

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Y. I.; Finck, P. J.; Grandy, C.; Cahalan, J.; Deitrich, L.; Dunn, F.; Fallin, D.; Farmer, M.; Fanning, T.; Kim, T.; Krajtl, L.; Lomperski, S.; Moisseytsev, A.; Momozaki, Y.; Sienicki, J.; Park, Y.; Tang, Y.; Reed, C.; Tzanos, C; Wiedmeyer, S.; Yang, W.; Chikazawa, Y.; JAEA

    2008-12-16

    The goals of the Global Nuclear Energy Partnership (GNEP) are to expand the use of nuclear energy to meet increasing global energy demand, to address nuclear waste management concerns and to promote non-proliferation. Implementation of the GNEP requires development and demonstration of three major technologies: (1) Light water reactor (LWR) spent fuel separations technologies that will recover transuranics to be recycled for fuel but not separate plutonium from other transuranics, thereby providing proliferation-resistance; (2) Advanced Burner Reactors (ABRs) based on a fast spectrum that transmute the recycled transuranics to produce energy while also reducing the long term radiotoxicity and decay heat loading in the repository; and (3) Fast reactor fuel recycling technologies to recover and refabricate the transuranics for repeated recycling in the fast reactor system. The primary mission of the ABR Program is to demonstrate the transmutation of transuranics recovered from the LWR spent fuel, and hence the benefits of the fuel cycle closure to nuclear waste management. The transmutation, or burning of the transuranics is accomplished by fissioning and this is most effectively done in a fast spectrum. In the thermal spectrum of commercial LWRs, some transuranics capture neutrons and become even heavier transuranics rather than being fissioned. Even with repeated recycling, only about 30% can be transmuted, which is an intrinsic limitation of all thermal spectrum reactors. Only in a fast spectrum can all transuranics be effectively fissioned to eliminate their long-term radiotoxicity and decay heat. The Advanced Burner Test Reactor (ABTR) is the first step in demonstrating the transmutation technologies. It directly supports development of a prototype full-scale Advanced Burner Reactor, which would be followed by commercial deployment of ABRs. The primary objectives of the ABTR are: (1) To demonstrate reactor-based transmutation of transuranics as part of an

  11. Advanced capacitors

    Science.gov (United States)

    Ennis, J. B.; Buritz, R. S.

    1984-10-01

    This report describes an experimental program to develop and test advanced dielectric materials for capacitors for airborne power systems. Five classes of capacitors were considered: high rep rate and low rep rate pulse capacitors for use in pulse-forming networks, high voltage filter capacitors, high frequency AC capacitors for series resonant inverters, and AC filter capacitors. To meet these requirements, existing dielectric materials were modified, and new materials were developed. The initial goal was to develop an improved polysulfone film with fewer imperfections that could operate at significantly higher electrical stresses. It was shown that contaminants enter the film via the resin and solvent, and that they can be partially removed. As far as developed, however, these treatments did not significantly improved the breakdown characteristics. The technique of casting films on a roughened drum was demonstrated, and found useful in preparing textured films -- the first step toward a replacement for Kraft paper. A new material, Ultem, was proposed for use in high energy density capacitors. This new polyetherimide resin has properties similar to polysulfone and polyimide, with improvement in breakdown characteristics and temperature capability. This material was selected for further study in model capacitor designs.

  12. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  13. Proactive and defensive self-regulation in learning

    Directory of Open Access Journals (Sweden)

    Darko Lončarić

    2008-12-01

    Full Text Available Although self-regulation research is fragmented over several interdisciplinary areas and theories, the concept of self-regulation could represent a cohesive force for integrating different areas of psychology, such as clinical, educational, or organisational psychology. This paper focuses on self-regulation within the educational framework and elaborates the concept of self-regulated learning. Current advances in self-regulated learning research indicated that concepts, such as cognition and motivation, need to be integrated into a coherent self-regulation model. Two models that integrate cognitive and motivational constructs are described in this paper, namely the motivational and cognitive self-regulation components described by Pintrich and colleagues (e.g., Garcia & Pintrich 1994, and a six component model of self-regulated learning provided by Boekaerts (1997. These models were used to formulate new and parsimonious organisational constructs that classify self-regulation components into proactive and defensive self-regulation patterns. At the end, the applicative value of the models and the need for further research, regarding the question of specific self-regulation failures (the depressive self-regulation pattern, are being discussed.

  14. Automatic defense against zero-day polymorphic worms in communication networks

    CERN Document Server

    Mohammed, Mohssen

    2013-01-01

    Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for un

  15. Pro PHP Security From Application Security Principles to the Implementation of XSS Defenses

    CERN Document Server

    Snyder, Chris; Southwell, Michael

    2010-01-01

    PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security, the impact of Javascript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. Beginners in secure programming will find a l

  16. Report of the Defense Science Board Subcommittee on Department of Defense Research Policy. Part 1. Policy on Support of Basic Research

    Science.gov (United States)

    1963-12-31

    f. .. AD-A955 482 Report of the Defen e Science Board Subcomtnittee on Depart•eat of Defense RESEARCH POLICY OTIC SELECTED NOV 2 91J88 0(/H...ACCESSION NO NA 11 TITLE (inc/ud* Stcunty Oassificat/on) Report of the Defense Science Board Subcomittee on Department of Defense Research Policy , Part...Defense Research Policy Office of the Director of Defense Research and Engineering Washington, D. C. 31 December 1963 OFFICE OF THE DIRECTOR OF DEFENSE

  17. Toward a defense-dominated world

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  18. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  19. Stop or move: Defensive strategies in humans.

    Science.gov (United States)

    Bastos, Aline F; Vieira, Andre S; Oliveira, Jose M; Oliveira, Leticia; Pereira, Mirtes G; Figueira, Ivan; Erthal, Fatima S; Volchan, Eliane

    2016-04-01

    Threatening cues and surrounding contexts trigger specific defensive response patterns. Potential threat evokes attentive immobility; attack evokes flight when escape is available and immobility when escape is blocked. Tonic immobility installs when threat is overwhelming and life-risky. In humans, reduced body sway characterizes attentive and tonic immobility, the former with bradycardia, and the later with expressive tachycardia. Here, we investigate human defensive strategies in the presence or absence of an escape route. We employed pictures depicting a man carrying a gun and worked with participants exposed to urban violence. In pictures simulating more possibility of escape, the gun was directed away from the observer; in those simulating higher risk and less chance of escape, the gun was directed toward the observer. Matched control pictures depicted similar layouts, but a non-lethal object substituted the gun. Posturographic and electrocardiographic recordings were collected. Amplitude of sway and heart rate were higher for gun directed-away and lower for gun direct-toward. Compared to their respective matched controls, there was a general increase in the amplitude of sway for the gun directed-away pictures; and a reduction in back-and-forth sway and in heart rate for gun directed-toward pictures. Taken together, those measures suggest that, when exposed to threat invading their margin of safety in a context indicating possible escape route, humans, as non-human species, engage in active escape, resembling the flight stage of the defensive cascade. When facing threat indicating less possibility of escape, humans present an immobile response with bradycardia.

  20. Directed energy missions for planetary defense

    Science.gov (United States)

    Lubin, Philip; Hughes, Gary B.; Eskenazi, Mike; Kosmo, Kelly; Johansson, Isabella E.; Griswold, Janelle; Pryor, Mark; O'Neill, Hugh; Meinhold, Peter; Suen, Jonathan; Riley, Jordan; Zhang, Qicheng; Walsh, Kevin; Melis, Carl; Kangas, Miikka; Motta, Caio; Brashears, Travis

    2016-09-01

    Directed energy for planetary defense is now a viable option and is superior in many ways to other proposed technologies, being able to defend the Earth against all known threats. This paper presents basic ideas behind a directed energy planetary defense system that utilizes laser ablation of an asteroid to impart a deflecting force on the target. A conceptual philosophy called DE-STAR, which stands for Directed Energy System for Targeting of Asteroids and exploration, is an orbiting stand-off system, which has been described in other papers. This paper describes a smaller, stand-on system known as DE-STARLITE as a reduced-scale version of DE-STAR. Both share the same basic heritage of a directed energy array that heats the surface of the target to the point of high surface vapor pressure that causes significant mass ejection thus forming an ejection plume of material from the target that acts as a rocket to deflect the object. This is generally classified as laser ablation. DE-STARLITE uses conventional propellant for launch to LEO and then ion engines to propel the spacecraft from LEO to the near-Earth asteroid (NEA). During laser ablation, the asteroid itself provides the propellant source material; thus a very modest spacecraft can deflect an asteroid much larger than would be possible with a system of similar mission mass using ion beam deflection (IBD) or a gravity tractor. DE-STARLITE is capable of deflecting an Apophis-class (325 m diameter) asteroid with a 1- to 15-year targeting time (laser on time) depending on the system design. The mission fits within the rough mission parameters of the Asteroid Redirect Mission (ARM) program in terms of mass and size. DE-STARLITE also has much greater capability for planetary defense than current proposals and is readily scalable to match the threat. It can deflect all known threats with sufficient warning.

  1. Optimal defense strategies in an idealized microbial food web under trade-off between competition and defense.

    Science.gov (United States)

    Våge, Selina; Storesund, Julia E; Giske, Jarl; Thingstad, T Frede

    2014-01-01

    Trophic mechanisms that can generate biodiversity in food webs include bottom-up (growth rate regulating) and top-down (biomass regulating) factors. The top-down control has traditionally been analyzed using the concepts of "Keystone Predation" (KP) and "Killing-the-Winner" (KtW), predominately occuring in discussions of macro- and micro-biological ecology, respectively. Here we combine the classical diamond-shaped food web structure frequently discussed in KP analyses and the KtW concept by introducing a defense strategist capable of partial defense. A formalized description of a trade-off between the defense-strategist's competitive and defensive ability is included. The analysis reveals a complex topology of the steady state solution with strong relationships between food web structure and the combination of trade-off, defense strategy and the system's nutrient content. Among the results is a difference in defense strategies corresponding to maximum biomass, production, or net growth rate of invading individuals. The analysis thus summons awareness that biomass or production, parameters typically measured in field studies to infer success of particular biota, are not directly acted upon by natural selection. Under coexistence with a competition specialist, a balance of competitive and defensive ability of the defense strategist was found to be evolutionarily stable, whereas stronger defense was optimal under increased nutrient levels in the absence of the pure competition specialist. The findings of success of different defense strategies are discussed with respect to SAR11, a highly successful bacterial clade in the pelagic ocean.

  2. Far Eastern Mission: One Fiercely Committed Choir Director at a Defense Department School in Japan Wants to Make a Global Difference

    Science.gov (United States)

    Olson, Catherine Applefeld

    2009-01-01

    Tim Black, choral director at the Department of Defense's Kadena High School in Okinawa, Japan, might just be the closest thing to a new-millennium embodiment of that early '70s idealism. Not only does Black lead three choirs and teach advanced placement music theory to children of those serving in the U.S. armed forces, but he also is…

  3. Far Eastern Mission: One Fiercely Committed Choir Director at a Defense Department School in Japan Wants to Make a Global Difference

    Science.gov (United States)

    Olson, Catherine Applefeld

    2009-01-01

    Tim Black, choral director at the Department of Defense's Kadena High School in Okinawa, Japan, might just be the closest thing to a new-millennium embodiment of that early '70s idealism. Not only does Black lead three choirs and teach advanced placement music theory to children of those serving in the U.S. armed forces, but he also is…

  4. The Effects of Transition from DoD (Department of Defense) to ISO (international Standards Organization) OSI (Open Systems Interconnection) Communication Protocols

    Science.gov (United States)

    1987-11-01

    Alpert , Director 1 copy Center for Advanced Study University of Illinois 912 W. Illinois Street Dr. Barry W. Boehm 1 copy TRW Defense Systems Group MS...Dr. Larry E. Druffel 1 copy Software Engineering Institute Carnegie-Mellon University Pittsburgh, PA 15213-3890 Dr. C.E. Hutchinson, Dean 1 copy

  5. The Reagan Defense Budget: Prospects and Pressures,

    Science.gov (United States)

    1981-12-01

    policy and to stimulate U.S. economic growth; and ( ii ) the urgent requirement to build up America’s defense capabilities. The former theme is a traditional...Paris in the Fall of 1981: a ver- sion of it will appear in the Ramses conference proceedings. -2- Unfortunately, it now seems as though these two...Proposed OMB Cut Alternatives (August) Level I 221.9 183.6 247.3 219.2 278.4 246.9 Level II 221.4 183.4 238.5 217.4 276.9 243.5 Level III 216.0 182.0

  6. The Relationship between Inflation and Defense Expenditures.

    Science.gov (United States)

    1979-12-01

    resources they would be bid up in the expanding sector. See Robert Solow , "Evaluation," in After the Phillips Curve: Persistence of High Inflation and...can be explained by the respective rates of growth of money supply per unit of national product. ’𔃼 IF’risch, op. cit., p. 1311. Robert J. Gordon...Statistical Approach for Forecasting Defense Expenditures in the Short-run," in William F. Butler, Robert A. Kavesh, and Robert B. Platt, eds., "Methods and

  7. Bacterial gasotransmitters: an innate defense against antibiotics.

    Science.gov (United States)

    Luhachack, Lyly; Nudler, Evgeny

    2014-10-01

    In recent decades, there has been growing interest in the field of gasotransmitters, endogenous gaseous signaling molecules (NO, H2S, and CO), as regulators of a multitude of biochemical pathways and physiological processes. Most of the concerted effort has been on eukaryotic gasotransmitters until the subsequent discovery of bacterial counterparts. While the fundamental aspects of bacterial gasotransmitters remain undefined and necessitate further research, we will discuss a known specific role they play in defense against antibiotics. Considering the current dilemma of multidrug-resistant bacteria we consider it particularly prudent to exploring novel targets and approaches, of which the bacterial gasotransmitters, nitric oxide and hydrogen sulfide represent.

  8. 普罗布考治疗高血脂非增生型糖尿病视网膜病变的效果%Effect of Probucolin in the treatment of hyperlipemia nonproliferating diabetic retinopathy

    Institute of Scientific and Technical Information of China (English)

    李北宁

    2013-01-01

    Objective To explore the clinical curative effect of probucolin in the treatment of hyperlipemia nonproliferating diabetic retinopathy(DR). Methods 100 eyes of 50 patients clinical diagnosed hyperlipemia nonproliferating diabetic retinopathy(DR) in our hospital from September 2011 to September 2012 were treated. The patients were randomly and equally divided into two groups, namely the treatment group and the control group, each group had 50 eyes of 25 patients.The patients of two groups were given the same diet and exercise guidance,and taken hypoglycemic drugs or injected insulin to control the blood sugar and blood pressure.On the basis,the patients in the treatment group were treated with probucol,while the patients in the control group only received atorvastatin.The patients were given long-term treatment,and the various indicators were observed and analyzed. Results Compared with before treatment,the microaneurysm of patients in the treatment group and the control group reduced, and the total effective rate was 68.26%,34.45%respectively,the difference was statistically significant(P 0.05).Compared with before treatment,the number of macular edema after treatment in two groups reduced obviously, and the difference was statistically significant(P<0.05).The triglyceride, low density lipoprotein cholesterol and total cholesterol of patients after treatment decreased significantly, and the 8-hydroxydeoxyguanosine of the treatment group was lower than that of the control group. Conclusion Probucolin for hyperlipemia nonproliferating diabetic retinopathy(DR) can reduce blood lipid,recover vision,effectively reduce macular edema,and is worthy of clinical promotion and application.%目的探究普罗布考治疗高血脂非增生型糖尿病视网膜病变的临床疗效。方法对我院2011年9月~2012年9月临床确诊为高血脂非增生型糖尿病视网膜病变的患者50例100只眼,进行治疗。把患者进行随机平均分组,分为

  9. Advanced uncooled infrared system electronics

    Science.gov (United States)

    Neal, Henry W.

    1998-07-01

    Over the past two decades, Raytheon Systems Company (RSC), formerly Texas Instruments Defense Systems & Electronics Group, developed a robust family of products based on a low- cost, hybrid ferroelectric (FE) uncooled focal-plane array (FPA) aimed at meeting the needs for thermal imaging products across both military and commercial markets. Over the years, RSC supplied uncooled infrared (IR) sensors for applications such as in combat vehicles, man-portable weaponry, personnel helmets, and installation security. Also, various commercial IR systems for use in automobiles, boats, law enforcement, hand-held applications, building/site security, and fire fighting have been developed. These products resulted in a high degree of success where cooled IR platforms are too bulky and costly, and other uncooled implementations are less reliable or lack significant cost advantage. Proof of this great success is found in the large price reductions, the unprecedented monthly production rates, and the wide diversity of products and customers realized in recent years. The ever- changing needs of these existing and potential customers continue to fuel the advancement of both the primary technologies and the production capabilities of uncooled IR systems at RSC. This paper will describe a development project intended to further advance the system electronics capabilities of future uncooled IR products.

  10. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  11. Defense Intelligence Agency: 50 Years Committed to Excellence in Defense of the Nation

    Science.gov (United States)

    2011-01-01

    to the September 11th terrorist attacks on the Pentagon. Rosa Chapa , Sandra Foster, Robert Hymel, Shelley Marshall, Patricia Mickley, Charles...the Nation MASTER SERGEANT WILLIAM W. BULTMEIER, USA, (RET) Defense Attaché Offi ce, Niamey 23 December 2000 ROSA M. CHAPA Offi ce of the Comptroller

  12. The silent defense: Micro-RNA directed defense against HIV-1 replication

    Directory of Open Access Journals (Sweden)

    Kumar Ajit

    2007-04-01

    Full Text Available Abstract MicroRNAs play critical role in regulating gene expression. MicroRNA profile of particular cell type bears the signature of cell type specific gene expression. Given that viral pathogens replicate by evading host defenses, research is now focused on the miRNA-regulated genes that critically regulate HIV-1 propagation in human host cells.

  13. Plant chemical defense against herbivores and pathogens: generalized defense or trade-offs?

    NARCIS (Netherlands)

    Biere, A.; Marak, H.B.; Van Damme, J.M.M.

    2004-01-01

    Plants are often attacked by multiple enemies, including pathogens and herbivores. While many plant secondary metabolites show specific effects toward either pathogens or herbivores, some can affect the performance of both these groups of natural enemies and are considered to be generalized defense

  14. Transitioning Defense Organizational Initiatives: An Assessment of Key 2001-2008 Defense Reforms

    Science.gov (United States)

    2008-12-01

    Pierre Chao Dr. Daniel Y. Chiu Mr. Raymond F. DuBois Ms. Michèle A. Flournoy Gen Ronald R. Fogleman, USAF (Ret.) Dr. Jacques S. Gansler Mr. Paul R.S...transformation was the Defense Business Board. First chaired by General Gus Pagonis (U. S. Army, Ret.), the chair since 2007 has been Michael Bayer . This

  15. Making Department of Defense Basic Research Purple (Joint), but NOT the Department of Defense Laboratories

    Science.gov (United States)

    2013-12-01

    outside of government, where they report to the chief executive officer (CEO) or to the CEO through a chief technology officer ( CTO ). The panel...Technology ASDR&E Assistant Secretary of Defense for Research and Engineering CEO chief executive officer COE Center of Excellence CTO chief

  16. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2011-07-25

    ... presented by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated... offered price. These provisions must also be used in acquisitions of commercial items conducted using part...--ACQUISITION OF COMMERCIAL ITEMS 4. Add new section 212.205 to read as follows: 212.205 Offers. (c) When...

  17. Defense Planning in the Ministry of Defense of Ukraine: Decade of Attempts and Mistakes

    Science.gov (United States)

    2015-06-01

    should be done by using the IAS for a modeling situation (for instance, JWARS—Joint Warfare System) or IAS which can carry out a SWOT analysis (IAS...43  C.  MISTAKE ANALYSIS OF CONDUCTED DEFENSE REVIEW IN MDU...PROGRAMS ...................................................64  B.  ANALYSIS OF PLANNING AND EXECUTING FINANCIAL RESOURCES OF MDU

  18. STUDY OF THE DEFENSIVE PERFORMANCE INDICATORS IN PEAK PERFORMANCE BASKETBALL

    Directory of Open Access Journals (Sweden)

    Alejandro \\u00C1lvarez

    2009-01-01

    Full Text Available The purpose of the present study was to analyze the different defensive performance indicators in basketball, analyzing the difference in relation to success (efficacious or non-efficacious defenses and the game result (win or loss. All halfcourt offenses (n=1045 from the quarterfinal, semifinal, consolation game, and final of the 2008 Olympics Games were analyzed. In each defense phase, the following variables were analyzed with regard to the team on defense: (1 Type of defense used, (2 Pressure in offense transition, (3 Defensive switches, (4 Helping on defense, (5 Inside passes, (6 Degree of opposition when shooting, (7 Points allowed, (8 Final result of the game, and (9 Defensive efficacy. The most significant results show that: : a the type of defense that was most used was quarter-court an-on-man (man-on-man at 6.25m, but the one that was most efficacious was the half-court zone defense; b transition pressure was used in 23.83% of the game phases; c defensive switches were done in 7.85% of the game phases; d helping on defense was used in 60% of the game phases; e inside passes were taken in 30.9% of the game phases; f 38.9% of the shots were done with high opposition; and g points were scored in 42.28% of the game phases, such that winning teams allowed the opponent to score in 38.81% of the game phases, and losing teams in 45.77%.

  19. Extracellular Alkalinization as a Defense Response in Potato Cells

    OpenAIRE

    Moroz, Natalia; Fritch, Karen R.; Marcec, Matthew J.; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-de...

  20. Deming's Management Philosophy and the defense industrial base.

    OpenAIRE

    Graff, David Jacques

    1991-01-01

    Approved for public release: distribution is unlimited The purpose of this thesis is to analyze why firms are leaving the defense industrial base and to determine if Dr. Edwards Deming's Management Philosophy can offer a more constructive way of doing business in the Defense Acquisition System. A comparative analysis was conducted between industry's reasons for wanting to leave the defense sector and Deming's Management Philosophy. This analysis determined if adoption of Deming's Managemen...