WorldWideScience

Sample records for rdeims regional defense

  1. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  2. Defense Spending Databases for Countries in the Asia-Pacific Region: An Analysis and Comparison

    National Research Council Canada - National Science Library

    Reuning, Charles

    2001-01-01

    The purpose of this research was to identify and analyze a select number of unclassified databases that cover defense spending and other defense related criteria for countries in the Asia-Pacific region...

  3. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    The absence of a formidable U.S. and allied Theater Missile Defense (TMD) capability in the East Asian region has encouraged a build-up in offensive missile capability on the part of the People's Republic of China (PRC...

  4. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  5. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  6. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  7. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  8. Transcripts of Regional Hearings, St. Louis, Missouri. Annex L to Adjusting to the Drawdown. Report of the Defense Conversion Commission

    Science.gov (United States)

    1992-08-01

    entrepreneurship courses for laid-off McDonnell Douglas employees. Over 500 have participated in the classes. • McDonnell Douglas donated its lease-hold...international programs and organizations • Analysis of regional financing programs The St. Louis World Trade Center franchise was acquired for the region...averaged over the 1970’s, the defense cutbacks are likely contribute only a small part of that objective. 2 38 7 Figure 5.3 REAL GDP BASE VS

  9. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  10. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  11. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    Science.gov (United States)

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  12. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  13. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News

  14. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  15. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... regional innovation clusters, as well as experience fostering small business development and growth... from existing regional innovation clusters specializing in defense technologies to provide counseling... cluster areas and industries. SBA intends to make awards to multiple regional innovation clusters that can...

  16. Final Report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas

    Science.gov (United States)

    1990-09-18

    This is our final report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas (DCMR... audit was made from January to October 1989. The objectives of the audit were to determine the timeliness of the contract closeout process, the validity...As part of the audit , we also evaluated internal controls over the contract closeout process. As of December 31, 1988, the Contract Administration

  17. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  18. 32 CFR 724.120 - National Capital Region (NCR).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false National Capital Region (NCR). 724.120 Section 724.120 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Definitions § 724.120 National Capital Region (NCR). The District of Columbia; Prince...

  19. Defense IRM: Alternatives Should Be Considered in Developing the New Civilian Personnel System

    National Research Council Canada - National Science Library

    1999-01-01

    ... regional centers, and attempting to improve personnel management business processes. A key part of this initiative is Defense's development of a new information management system-the Defense Civilian Personnel Data System (DCPDs...

  20. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  1. Singapore’s Defense Policy: Essential or Excessive?

    Science.gov (United States)

    2010-06-11

    Republic, Ecuador , El Salvador, Ghana, Greece, Guatemala, Honduras, India, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Malaysia, Mexico, Morocco...mitigating measures, it is timely to establish the appropriate context to ensure a focused and fruitful discussion of Singapore’s defense policy. As...regional allies. 41 Today, ASEAN has matured considerably as an organization, buoyed by the relative warmth and stability of regional relationships in

  2. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  3. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  4. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  5. Sulforaphane Modifies Histone H3, Unpacks Chromatin, and Primes Defense.

    Science.gov (United States)

    Schillheim, Britta; Jansen, Irina; Baum, Stephani; Beesley, Alexander; Bolm, Carsten; Conrath, Uwe

    2018-03-01

    Modern crop production calls for agrochemicals that prime plants for enhanced defense. Reliable test systems for spotting priming-inducing chemistry, however, are rare. We developed an assay for the high-throughput search for compounds that prime microbial pattern-induced secretion of antimicrobial furanocoumarins (phytoalexins) in cultured parsley cells. The screen produced 1-isothiocyanato-4-methylsulfinylbutane (sulforaphane; SFN), a secondary metabolite in many crucifers, as a novel defense priming compound. While elucidating SFN's mode of action in defense priming, we found that in Arabidopsis ( Arabidopsis thaliana ) the isothiocyanate provokes covalent modification (K4me3, K9ac) of histone H3 in the promoter and promoter-proximal region of defense genes WRKY6 and PDF1 2 , but not PR1 SFN-triggered H3K4me3 and H3K9ac coincide with chromatin unpacking in the WRKY6 and PDF1 2 regulatory regions, primed WRKY6 expression, unprimed PDF1 2 activation, and reduced susceptibility to downy mildew disease ( Hyaloperonospora arabidopsidis ). Because SFN also directly inhibits H arabidopsidis and other plant pathogens, the isothiocyanate is promising for the development of a plant protectant with a dual mode of action. © 2018 American Society of Plant Biologists. All Rights Reserved.

  6. Evaluation of the defensive behavior of two honeybee ecotypes using a laboratory test

    Directory of Open Access Journals (Sweden)

    Cecilia Andere

    2002-01-01

    Full Text Available Honeybee defensive behavior is a useful selection criterion, especially in areas with Africanized honeybees (Apis mellifera L. In all genetic improvement programs the selected characters must be measured with precision, and because of this we evaluated a metabolic method for testing honeybee defensive behavior in the laboratory for its usefulness in distinguishing between honeybee ecotypes and selecting honeybees based on their level of defensive responses. Ten honeybee colonies were used, five having been produced by feral queens from a subtropical region supposedly colonized by Africanized honeybees and five by queens from a temperate region apparently colonized by European honeybees. We evaluate honeybee defensive behavior using a metabolic test based on oxygen consumption after stimulation with an alarm pheromone, measuring the time to the first response, time to maximum oxygen consumption, duration of activity, oxygen consumption at first response, maximum oxygen consumption and total oxygen consumption, colonies being ranked according to the values obtained for each variable. Significant (p < 0.05 differences were detected between ecotypes for each variable but for all variables the highest rankings were obtained for colonies of subtropical origin, which had faster and more intense responses. All variables were highly associated (p < 0.05. Total oxygen consumption was the best indicator of metabolic activity for defensive behavior because it combined oxygen consumption and the length of the response. This laboratory method may be useful for evaluating the defensive behavior of honey bees in genetic programs designed to select less defensive bees.

  7. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  8. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  9. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  10. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  11. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  12. 78 FR 77664 - Defense Policy Board (DPB); Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-12-24

    ...: (a) Issues central to strategic DoD planning; (b) policy implications of U.S. force structure and force modernization and on DoD's ability to execute U.S. defense strategy; (c) U.S. regional defense... public or interested organizations may submit written statements to the membership of the DPB at any time...

  13. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    annual investment of about $2.5 billion. The study also recommended that the Department of Defense enhance its ab ility to perform the kinds of broad...homeland fundamentally change the nature of the problem to one of strategic deterrence and that the spirit of the terms of reference was more...adversary investments in regional, precision attack cruise and ballistic threaten that foundation, investments that have dramatically increased both

  14. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  15. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  16. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  17. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  18. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  19. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  20. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  1. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  2. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  3. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  4. Regional Innovation Clusters

    Data.gov (United States)

    Small Business Administration — The Regional Innovation Clusters serve a diverse group of sectors and geographies. Three of the initial pilot clusters, termed Advanced Defense Technology clusters,...

  5. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  6. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  7. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  8. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  9. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  10. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  11. Trying to Learn Lessons for Response to Extreme Events: Paradigm Shifts Affecting Civil Defense in the Trinational Region of Southwestern Amazonia

    Science.gov (United States)

    Santos, G. L. P.

    2015-12-01

    The last ten years have seen several extreme climate events in southwestern Amazonia with historic impacts. The City of Rio Branco, Capital of Acre, Brazil´s westernmost State, suffered its seventh consecutive annual flooding and its worst in March 2015. The city of Tarauacá, also in Acre, registered 12 flooding events between November 2014 and April 2015. The most recent flood of the trinational Acre River in 2015 set historic records for flood stage and number of displaced persons in Cobija, the Capital of Pando, Bolivia. From February to April 2014, floods of the Madeira River disrupted the one highway between Acre and southern Brazil. Puerto Maldonado, the capital in Madre de Dios Region of Peru had its worst flood in 50 years during 2014. In 2005 and 2010, prolonged droughts combined with ignition sources resulted in tens to hundreds of thousands of hectares of fire-damaged rainforests in the Madre de Dios, Acre and Pando (MAP) Region. The Civil Defenses in these three contiguous political units faced several abrupt paradigm shifts that affected their responses: 1) The drought of 2005 showed dramatically that regional rainforests do burn; 2) The recent flooding history, particularly in 2012 and 2015, demolished the cultural icon of a nine-year recurrence interval; 3) What happens outside your territory can be devastating. The Madeira River flood impeded an estimated 200 million dollars from circulating in Acre; 4) The past can be a terrible guide. For Cobija and Rio Branco, the 2015 flood was on the order of a meter higher than any other. Many home dwellers did not evacuate in time because they used past floods as a guide; 5) A collapse in communication - cell phones, land lines, and Internet - can get worse. In 2012, such a collapse occurred in two border towns for 5 days, yet in 2015 it lasted more than 11 days. Research is needed to address how institutions linked to Civil Defense can shift paradigms in time to be more effective.

  12. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  13. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  14. Molecular characterization of a genomic region in a Lactococcus bacteriophage that is involved in its sensitivity to the phage defense mechanism AbiA.

    OpenAIRE

    Dinsmore, P K; Klaenhammer, T R

    1997-01-01

    A spontaneous mutant of the lactococcal phage phi31 that is insensitive to the phage defense mechanism AbiA was characterized in an effort to identify the phage factor(s) involved in sensitivity of phi31 to AbiA. A point mutation was localized in the genome of the AbiA-insensitive phage (phi31A) by heteroduplex analysis of a 9-kb region. The mutation (G to T) was within a 738-bp open reading frame (ORF245) and resulted in an arginine-to-leucine change in the predicted amino acid sequence of t...

  15. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  16. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  17. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  18. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  19. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  20. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  1. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  2. 32 CFR 1605.7 - Region Manager.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Region Manager. 1605.7 Section 1605.7 National... ORGANIZATION Region Administration § 1605.7 Region Manager. (a) Subject to the direction and control of the Director of Selective Service, the Region Manager of Selective Service for each region shall be in...

  3. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  4. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  5. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  6. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  7. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  8. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  9. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  10. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  11. Financial Management: Contracts Classified as Unreconcilable by the Defense Finance and Accounting Service Columbus (Contract DAAA09-81-G-2008-0031)

    National Research Council Canada - National Science Library

    Granetto, Paul J; Kornides, James L; Issel, John K; Knight, Clarence E., III; Frawley, John; Bennett, Karen M

    2005-01-01

    .... Defense Contract Management Agency (DCMA), Pittsburgh, Pennsylvania, personnel stated that the former Defense Contract Administration Services Region Philadelphia initially paid the contract until the payment function was transferred...

  12. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  13. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  14. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  16. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  17. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  18. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  19. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  20. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  1. Regional Employment Growth and Defense Spending.

    Science.gov (United States)

    1987-12-01

    important part of regional growth. UI ACCA 9o1n For ’NDis i - Dljt s i-: . TABLE OF CONTENTS I. INTRODUCTION .. .. .. .... ..... .... .... .... ..... .. 7...Mideast and Great Lakes, all show spending to taxation ratios of less than one on a per capita basis, yet the Southwest and Rocky Mountain states have...because businesses look beyond the obvious nominal rate and locate according to effective rates of taxation , ie. actual tax liability. In addition, tax

  2. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    Accessed April 26, 2015, http://www.state.gov/t/ avc /rls/2014/226073.html 24 Pacific Air Forces, PACAF establishes Pacific IAMD Center, Accessed April...U.S. Department of State. Gulf Cooperation Council and Ballistic Missile Defense. Accessed April 26, 2015. http://www.state.gov/t/ avc /rls/2014

  3. Evaluating the Impact of the Department of Defense Regional Centers for Security Studies

    Science.gov (United States)

    2014-01-01

    Kazakstan, Moldova, Montenegro $542,000 total 11% O&M; 89% other Media: weapon or tool 50 Garmisch, Germany $99,000 O&M nAtO Smart Defense (2...events) 70 total Bosnia, Montenegro $74,000 total Other nESA Yemen national Security Seminar 40 Yemen $450,000 Other pakistani Military Confidence...mandate. It included commentary on all aspects of APCSS’s operations, including physical plant , library usage, stu- dent selection, alumni outreach

  4. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  5. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  6. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  7. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  8. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  9. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  10. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  11. FY10 Defense Environmental Programs Annual Report to Congress

    Science.gov (United States)

    2011-07-01

    7,412- 2019  AIR FORCE ALPENA COUNTY REGIONAL AIRPORT / MI557282890300 17 2 $6,363 $0 $862 $1,9462012 2018  FORMERLY USED DEFENSE SITES ASH FIELD...Through FY10 ($000) IRP MMRPMMRPIRP Michigan ALPENA AAF / MI59799F231100 $001 $23 ALPENA NGTR / MI59799F228900 $610 $0 ANN ARBOR NGTR / MI59799F228800

  12. Reentrant phase transitions and defensive alliances in social dilemmas with informed strategies

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž

    2015-05-01

    Knowing the strategy of an opponent in a competitive environment conveys obvious evolutionary advantages. But this information is costly, and the benefit of being informed may not necessarily offset the additional cost. Here we introduce social dilemmas with informed strategies, and we show that this gives rise to two cyclically dominant triplets that form defensive alliances. The stability of these two alliances is determined by the rotation velocity of the strategies within each triplet. A weaker strategy in a faster rotating triplet can thus overcome an individually stronger competitor. Fascinating spatial patterns favor the dominance of a single defensive alliance, but enable also the stable coexistence of both defensive alliances in very narrow regions of the parameter space. A continuous reentrant phase transition reveals before unseen complexity behind the stability of strategic alliances in evolutionary social dilemmas.

  13. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  14. Health transformation project and defensive medicine practice among neurosurgeons in Turkey.

    Science.gov (United States)

    Solaroglu, Ihsan; Izci, Yusuf; Yeter, H Gokce; Metin, M Mert; Keles, G Evren

    2014-01-01

    The term "Defensive" medicine was coined in the early 1970's and has been an important topic of scientific investigation and professional debate ever since. The aim of this study was to investigate the characteristics of defensive medicine, its reasons, and the extent to which it is practiced in the Turkish health care system. This is the first national survey to study the practice of defensive medicine among neurosurgeons in Turkey. The present cross-sectional study on defensive medicine assessed neurosurgeons registered at the Turkish Neurosurgical Society, who are actively working in various centers and hospitals within the Turkish health care system. A 40-question survey was adapted from existing measures described in the literature and was completed by a total of 404 neurosurgeons, representing 36.7% of the neurosurgeons registered at the Turkish Neurosurgical Society. Seventy-two percent of the participants in the current study reported practicing defensive medicine. This practice was mainly reported among inexperienced neurosurgeons (74.4%). Most were younger than 40 years of age (75.2%), working in state hospitals/universities (72.7%), and living in the Marmara region (38%). Respondents reported engaging in defensive medicine by avoiding high-risk surgery (62.6%), ordering additional imaging studies (60.9%) and laboratory tests (33.7%), and referring patients to consultants (31.2%). Most participants consider every patient as a potential threat in terms of a medical lawsuit (68.3%) and do not believe the courts can distinguish malpractice from complications (89.6%). Concerns and perceptions about medical liability lead neurosurgeons to practice defensive medicine. By avoiding high-risk surgery, ordering unnecessary diagnostic tests, and referring the patients to consultants, neurosurgeons try to minimize the risk of malpractice and protect themselves from legal risks, resulting in higher healthcare expenditure and longer treatment periods.

  15. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  16. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  17. Immunity, suicide or both? Ecological determinants for the combined evolution of anti-pathogen defense systems.

    Science.gov (United States)

    Iranzo, Jaime; Lobkovsky, Alexander E; Wolf, Yuri I; Koonin, Eugene V

    2015-03-13

    Parasite-host arms race is one of the key factors in the evolution of life. Most cellular life forms, in particular prokaryotes, possess diverse forms of defense against pathogens including innate immunity, adaptive immunity and programmed cell death (altruistic suicide). Coevolution of these different but interacting defense strategies yields complex evolutionary regimes. We develop and extensively analyze a computational model of coevolution of different defense strategies to show that suicide as a defense mechanism can evolve only in structured populations and when the attainable degree of immunity against pathogens is limited. The general principle of defense evolution seems to be that hosts do not evolve two costly defense mechanisms when one is sufficient. Thus, the evolutionary interplay of innate immunity, adaptive immunity and suicide, leads to an equilibrium state where the combination of all three defense strategies is limited to a distinct, small region of the parameter space. The three strategies can stably coexist only if none of them are highly effective. Coupled adaptive immunity-suicide systems, the existence of which is implied by the colocalization of genes for the two types of defense in prokaryotic genomes, can evolve either when immunity-associated suicide is more efficacious than other suicide systems or when adaptive immunity functionally depends on the associated suicide system. Computational modeling reveals a broad range of outcomes of coevolution of anti-pathogen defense strategies depending on the relative efficacy of different mechanisms and population structure. Some of the predictions of the model appear compatible with recent experimental evolution results and call for additional experiments.

  18. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  19. Pathok Negoro mosque as the form of territorial defense region of Mataram Kingdom of Islam Java in Jogjakarta

    Science.gov (United States)

    Setyowati, E.; Hardiman, G.; Murtini, T. W.

    2018-01-01

    Territory is the space boundary of ownership. Defense concepts of an area also include territory. The defense concept of a territory of power or ownership is usually in the form of fortress, ditch, river, road, alley or gate. Many of these are seen in the forms of old city of Dutch’s inheritances. Javanese Islamic Kingdom in Yogyakarta has territory in the form of mosque. The mosque is called the Pathok Negoro as consists of 4 mosques. This territorial not same with another Islamic kingdoms. The research problem is why mosque used as a form of defense? What is the uniqueness?The purpose of the research is to reveal the form of territory of Javanese Islamic Kingdom. The benefit of this research is to get the characteristic form of territory of Javanese Islamic Kingdom in Yogyakarta. Their located in Ploso Kuning, Mlangi, babadan, Dongkelan, and Wonokromo. The research method that was used was qualitative method with grounded research, by using history and map search.In the analysis was carried out identification and comparison between mosques.The results show that there are characteristics on the location, the building orientation, the landscape, the area pattern and the shape of the building.

  20. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  1. Changes in plant defense chemistry (pyrrolizidine alkaloids) revealed through high-resolution spectroscopy

    Science.gov (United States)

    Carvalho, Sabrina; Macel, Mirka; Schlerf, Martin; Moghaddam, Fatemeh Eghbali; Mulder, Patrick P. J.; Skidmore, Andrew K.; van der Putten, Wim H.

    2013-06-01

    Plant toxic biochemicals play an important role in defense against natural enemies and often are toxic to humans and livestock. Hyperspectral reflectance is an established method for primary chemical detection and could be further used to determine plant toxicity in the field. In order to make a first step for pyrrolizidine alkaloids detection (toxic defense compound against mammals and many insects) we studied how such spectral data can estimate plant defense chemistry under controlled conditions. In a greenhouse, we grew three related plant species that defend against generalist herbivores through pyrrolizidine alkaloids: Jacobaea vulgaris, Jacobaea erucifolia and Senecio inaequidens, and analyzed the relation between spectral measurements and chemical concentrations using multivariate statistics. Nutrient addition enhanced tertiary-amine pyrrolizidine alkaloids contents of J. vulgaris and J. erucifolia and decreased N-oxide contents in S. inaequidens and J. vulgaris. Pyrrolizidine alkaloids could be predicted with a moderate accuracy. Pyrrolizidine alkaloid forms tertiary-amines and epoxides were predicted with 63% and 56% of the variation explained, respectively. The most relevant spectral regions selected for prediction were associated with electron transitions and Csbnd H, Osbnd H, and Nsbnd H bonds in the 1530 and 2100 nm regions. Given the relatively low concentration in pyrrolizidine alkaloids concentration (in the order of mg g-1) and resultant predictions, it is promising that pyrrolizidine alkaloids interact with incident light. Further studies should be considered to determine if such a non-destructive method may predict changes in PA concentration in relation to plant natural enemies. Spectroscopy may be used to study plant defenses in intact plant tissues, and may provide managers of toxic plants, food industry and multitrophic-interaction researchers with faster and larger monitoring possibilities.

  2. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  3. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  4. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  5. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  6. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  7. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  8. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  9. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  10. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  11. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  12. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  13. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  14. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  15. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  17. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  18. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  19. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  20. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  1. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  2. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  3. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  4. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  5. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  6. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  7. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  8. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  9. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  10. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  11. Quality Management Plan for EPA Region 1

    Science.gov (United States)

    The QMP describes policies, procedures & management systems within EPA NE that govern quality assurance & quality control activities supporting the transparency & scientific defensibility of environmental data collected, used & disseminated by the Region.

  12. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  13. Towards a European Defense Identity Compatible with NATO

    Directory of Open Access Journals (Sweden)

    Rafael Estrella

    1997-12-01

    Full Text Available The European Security and Defense Identity (ESDI is a common but not defined goal, due to disagreements among Europeans on its political content. Reasons to explain this are related to the resistance to the idea of a European defense authority, fears of German hegemony, and the conviction that Europe is uncapable of defending herselfwithout the assistance of the United States. Estrella states that, with the end of the Cold War, some arguments opposing ESDI lost weight. However, the evolution and restructuring of NATO is not the product of European initiative, but rather an element of the U.S.strategy in Europe. Moreover, while the U.S. has a global strategy, Europe has not yet defined its security interests neither globally nor regionally. The author reviews the steps undertaken by NATO and the WEU towards further collaboration and the development of a European identity. He wonders whether there is enough political will either in Europe or the U.S. to overcome archaic views on trans-atlantic relations and narrow concepts about the future of Europe.

  14. Regional Interrelationships: A Leadership Opportunity for Health Care.

    Science.gov (United States)

    Rotarius, Timothy; Liberman, Aaron

    Given the impact that the health care industry has on the national economy, health care executives need to move beyond simply providing health care treatments and instead focus on strategically leading their regions, including the other key industry contributors in their specific regions. Geographic and economic regions can be viewed as concentric circles of influence, with each circle recognizing the resources and contributions that are specific to a region. An acknowledgement by health care executives of the regional interrelationships that exist in a specific region is necessary for health care managers to strategically lead regional interrelationships. A template for implementation of this process is included. To understand the various factors that exist within circles of influence, several distinct yet interrelated vertical bases of knowledge will be discussed. The 5 bases of knowledge examined here include the following: Health Care, Tourism, Defense and Technology, Education, and Retail. It is important to note that the resources identified in the Tourism, Defense and Technology, Education, and Retail knowledge bases all have a direct influential relationship upon the health care resources of the region. For description purposes, the Central Florida geographic and economic region will be examined for interrelationships between the 5 knowledge bases.

  15. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  16. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  17. 32 CFR 1605.8 - Staff of Region Headquarters for Selective Service.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Staff of Region Headquarters for Selective... SERVICE SYSTEM SELECTIVE SERVICE SYSTEM ORGANIZATION Region Administration § 1605.8 Staff of Region..., the staff of each region for Selective Service shall consist of as many officers, either military or...

  18. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  19. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  20. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  1. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  2. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  3. Regional Strategic Appraisal of Central America

    Science.gov (United States)

    2003-04-07

    Central America’s multiple transitions (from war to peace, from military rule to civilian, freely and democratically elected, constitutional government...Centroamericanas ‘CFAC’: Un Instrumento de Integracion y Seguridad Regional,” Center for Hemispheric Defense Studies, REDES 2001, Panel for Strategic

  4. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  5. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  6. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  7. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  8. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  9. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  10. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  15. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. European Diversification and Defense Market Assessment, 2nd Edition: A Comprehensive Guide for Entry into Overseas Markets

    National Research Council Canada - National Science Library

    1997-01-01

    .... The region possesses a number of well diversified economies that exhibit growing demand for high technology products in commercial and defense sectors and, thus, provides a wide variety of trade opportunities for U.S. firms...

  18. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  19. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  20. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  1. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  2. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  3. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  4. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  5. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  6. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  7. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  8. The economic substantiation for creating defense "support zone" of the Arctic region of Russia

    Directory of Open Access Journals (Sweden)

    Bryzgalova A. E.

    2016-06-01

    Full Text Available The paper considers the theoretical foundations of the transition from "continuous" development of the Russian territories of the Far North that proved to be ineffective to the "focal" development based on the concentration of resources within the anchor sectors of the regional economy. The defensive specialisation of the Kola "bearing point" which is a part of the system of eight "bearing zones" located respectively in each of the Arctic regions of Russia is being proved. The value of communication networks in ensuring the effective functioning of naval Arctic closed cities as a core of the defense "bearing point" is discussed from the standpoint of the new economic geography. Рассмотрены теоретические основы перехода от доказавшего свою неэффективность "непрерывного" развития территорий Крайнего Севера России к "очаговому" развитию, основанному на концентрации ресурсов в пределах якорных секторов регионального хозяйства. Доказан оборонный профиль Кольской "опорной точки", входящей в систему восьми "опорных зон", локализованных соответственно в каждом арктическом субъекте Российской Федерации. С позиций новой экономической географии обосновано значение коммуникационной сети для обеспечения эффективного функционирования военно-морских арктических закрытых административно-территориальных образований, выступающих ядром "опорной точки" оборонного значения

  9. CRISPR-Cas Defense System and Potential Prophages in Cyanobacteria Associated with the Coral Black Band Disease.

    Science.gov (United States)

    Buerger, Patrick; Wood-Charlson, Elisha M; Weynberg, Karen D; Willis, Bette L; van Oppen, Madeleine J H

    2016-01-01

    Understanding how pathogens maintain their virulence is critical to developing tools to mitigate disease in animal populations. We sequenced and assembled the first draft genome of Roseofilum reptotaenium AO1, the dominant cyanobacterium underlying pathogenicity of the virulent coral black band disease (BBD), and analyzed parts of the BBD-associated Geitlerinema sp. BBD_1991 genome in silico . Both cyanobacteria are equipped with an adaptive, heritable clustered regularly interspaced short palindromic repeats (CRISPR)-Cas defense system type I-D and have potential virulence genes located within several prophage regions. The defense system helps to prevent infection by viruses and mobile genetic elements via identification of short fingerprints of the intruding DNA, which are stored as templates in the bacterial genome, in so-called "CRISPRs." Analysis of CRISPR target sequences (protospacers) revealed an unusually high number of self-targeting spacers in R. reptotaenium AO1 and extraordinary long CRIPSR arrays of up to 260 spacers in Geitlerinema sp. BBD_1991. The self-targeting spacers are unlikely to be a form of autoimmunity; instead these target an incomplete lysogenic bacteriophage. Lysogenic virus induction experiments with mitomycin C and UV light did not reveal an actively replicating virus population in R. reptotaenium AO1 cultures, suggesting that phage functionality is compromised or excision could be blocked by the CRISPR-Cas system. Potential prophages were identified in three regions of R. reptotaenium AO1 and five regions of Geitlerinema sp. BBD_1991, containing putative BBD relevant virulence genes, such as an NAD-dependent epimerase/dehydratase (a homolog in terms of functionality to the third and fourth most expressed gene in BBD), lysozyme/metalloendopeptidases and other lipopolysaccharide modification genes. To date, viruses have not been considered to be a component of the BBD consortium or a contributor to the virulence of R. reptotaenium AO1

  10. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  11. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  12. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  13. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  14. Economic Assessment of FMDv Releases from the National Bio and Agro Defense Facility

    Science.gov (United States)

    Pendell, Dustin L.; Marsh, Thomas L.; Coble, Keith H.; Lusk, Jayson L.; Szmania, Sara C.

    2015-01-01

    This study evaluates the economic consequences of hypothetical foot-and-mouth disease releases from the future National Bio and Agro Defense Facility in Manhattan, Kansas. Using an economic framework that estimates the impacts to agricultural firms and consumers, quantifies costs to non-agricultural activities in the epidemiologically impacted region, and assesses costs of response to the government, we find the distribution of economic impacts to be very significant. Furthermore, agricultural firms and consumers bear most of the impacts followed by the government and the regional non-agricultural firms. PMID:26114546

  15. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  16. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  17. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  18. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  19. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  20. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  1. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  2. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  3. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  4. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  5. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  6. Control of DWPF [Defense Waste Processing Facility] melter feed composition

    International Nuclear Information System (INIS)

    Edwards, R.E. Jr.; Brown, K.G.; Postles, R.L.

    1990-01-01

    The Defense Waste Processing Facility will be used to immobilize Savannah River Site high-level waste into a stable borosilicate glass for disposal in a geologic repository. Proper control of the melter feed composition in this facility is essential to the production of glass which meets product durability constraints dictated by repository regulations and facility processing constraints dictated by melter design. A technique has been developed which utilizes glass property models to determine acceptable processing regions based on the multiple constraints imposed on the glass product and to display these regions graphically. This system along with the batch simulation of the process is being used to form the basis for the statistical process control system for the facility. 13 refs., 3 figs., 1 tab

  7. Molecular characterization of a genomic region in a Lactococcus bacteriophage that is involved in its sensitivity to the phage defense mechanism AbiA.

    Science.gov (United States)

    Dinsmore, P K; Klaenhammer, T R

    1997-05-01

    A spontaneous mutant of the lactococcal phage phi31 that is insensitive to the phage defense mechanism AbiA was characterized in an effort to identify the phage factor(s) involved in sensitivity of phi31 to AbiA. A point mutation was localized in the genome of the AbiA-insensitive phage (phi31A) by heteroduplex analysis of a 9-kb region. The mutation (G to T) was within a 738-bp open reading frame (ORF245) and resulted in an arginine-to-leucine change in the predicted amino acid sequence of the protein. The mutant phi31A-ORF245 reduced the sensitivity of phi31 to AbiA when present in trans, indicating that the mutation in ORF245 is responsible for the AbiA insensitivity of phi31A. Transcription of ORF245 occurs early in the phage infection cycles of phi31 and phi31A and is unaffected by AbiA. Expansion of the phi31 sequence revealed ORF169 (immediately upstream of ORF245) and ORF71 (which ends 84 bp upstream of ORF169). Two inverted repeats lie within the 84-bp region between ORF71 and ORF169. Sequence analysis of an independently isolated AbiA-insensitive phage, phi31B, identified a mutation (G to A) in one of the inverted repeats. A 118-bp fragment from phi31, encompassing the 84-bp region between ORF71 and ORF169, eliminates AbiA activity against phi31 when present in trans, establishing a relationship between AbiA and this fragment. The study of this region of phage phi31 has identified an open reading frame (ORF245) and a 118-bp DNA fragment that interact with AbiA and are likely to be involved in the sensitivity of this phage to AbiA.

  8. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  9. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  10. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  11. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  12. Elongator Plays a Positive Role in Exogenous NAD-Induced Defense Responses in Arabidopsis.

    Science.gov (United States)

    An, Chuanfu; Ding, Yezhang; Zhang, Xudong; Wang, Chenggang; Mou, Zhonglin

    2016-05-01

    Extracellular NAD is emerging as an important signal molecule in animal cells, but its role in plants has not been well-established. Although it has been shown that exogenous NAD(+) activates defense responses in Arabidopsis, components in the exogenous NAD(+)-activated defense pathway remain to be fully discovered. In a genetic screen for mutants insensitive to exogenous NAD(+) (ien), we isolated a mutant named ien2. Map-based cloning revealed that IEN2 encodes ELONGATA3 (ELO3)/AtELP3, a subunit of the Arabidopsis Elongator complex, which functions in multiple biological processes, including histone modification, DNA (de)methylation, and transfer RNA modification. Mutations in the ELO3/AtELP3 gene compromise exogenous NAD(+)-induced expression of pathogenesis-related (PR) genes and resistance to the bacterial pathogen Pseudomonas syringae pv. maculicola ES4326, and transgenic expression of the coding region of ELO3/AtELP3 in elo3/Atelp3 restores NAD(+) responsiveness to the mutant plants, demonstrating that ELO3/AtELP3 is required for exogenous NAD(+)-induced defense responses. Furthermore, mutations in genes encoding the other five Arabidopsis Elongator subunits (ELO2/AtELP1, AtELP2, ELO1/AtELP4, AtELP5, and AtELP6) also compromise exogenous NAD(+)-induced PR gene expression and resistance to P. syringae pv. maculicola ES4326. These results indicate that the Elongator complex functions as a whole in exogenous NAD(+)-activated defense signaling in Arabidopsis.

  13. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  14. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  15. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  16. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  17. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  18. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  19. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  20. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  1. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  2. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  3. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  4. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  5. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  6. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  7. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  8. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  9. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  10. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  11. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  12. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  13. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  14. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  15. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  16. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  17. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  18. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  19. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  1. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  2. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  3. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  4. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  5. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  6. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  7. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  8. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  9. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  10. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  11. Detection of neural activity in the brains of Japanese honeybee workers during the formation of a "hot defensive bee ball".

    Directory of Open Access Journals (Sweden)

    Atsushi Ugajin

    Full Text Available Anti-predator behaviors are essential to survival for most animals. The neural bases of such behaviors, however, remain largely unknown. Although honeybees commonly use their stingers to counterattack predators, the Japanese honeybee (Apis cerana japonica uses a different strategy to fight against the giant hornet (Vespa mandarinia japonica. Instead of stinging the hornet, Japanese honeybees form a "hot defensive bee ball" by surrounding the hornet en masse, killing it with heat. The European honeybee (A. mellifera ligustica, on the other hand, does not exhibit this behavior, and their colonies are often destroyed by a hornet attack. In the present study, we attempted to analyze the neural basis of this behavior by mapping the active brain regions of Japanese honeybee workers during the formation of a hot defensive bee ball. First, we identified an A. cerana homolog (Acks = Apis cerana kakusei of kakusei, an immediate early gene that we previously identified from A. mellifera, and showed that Acks has characteristics similar to kakusei and can be used to visualize active brain regions in A. cerana. Using Acks as a neural activity marker, we demonstrated that neural activity in the mushroom bodies, especially in Class II Kenyon cells, one subtype of mushroom body intrinsic neurons, and a restricted area between the dorsal lobes and the optic lobes was increased in the brains of Japanese honeybee workers involved in the formation of a hot defensive bee ball. In addition, workers exposed to 46°C heat also exhibited Acks expression patterns similar to those observed in the brains of workers involved in the formation of a hot defensive bee ball, suggesting that the neural activity observed in the brains of workers involved in the hot defensive bee ball mainly reflects thermal stimuli processing.

  12. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  13. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  14. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  15. Variable Alkaloid Defenses in the Dendrobatid Poison Frog Oophaga pumilio are Perceived as Differences in Palatability to Arthropods.

    Science.gov (United States)

    Bolton, Sarah K; Dickerson, Kelsie; Saporito, Ralph A

    2017-03-01

    Conspicuously colored dendrobatid frogs sequester alkaloid defenses from dietary arthropods, resulting in considerable alkaloid variation among populations; however, little is known about how variation is perceived as a defense against predators. Previous studies have found variable alkaloids in the dendrobatid Oophaga pumilio to be associated with differences in toxicity to laboratory mice, suggesting variable defenses are important. Arthropods are natural predators that use chemoreception to detect prey, including frogs, and may therefore perceive variation in alkaloid profiles as differences in palatability. The goal of the present study is to determine how arthropods respond to variable alkaloid defenses in O. pumilio. Frog alkaloids were sampled from individual O. pumilio from ten geographic locations throughout the Bocas del Toro region of Panama and the Caribbean coast of Costa Rica. Alkaloid extracts were used in feeding bioassays with the vinegar fly Drosophila melanogaster and the ant Ectatomma ruidum. Both species of arthropods fed significantly less on frog alkaloid extracts when compared to controls, and differences in alkaloid palatability were observed among frog populations, as well as between sexes and life stages within a population. Differences in alkaloid quantity, richness, and type were the main predictors of arthropod palatability. Our findings also represent the first direct evidence of a palatability spectrum in a vertebrate that sequesters chemical defenses from dietary sources. Further, the presence of a palatability spectrum suggests that variable alkaloid defenses in O. pumilio are ecologically relevant and play an important role in natural predator-prey interactions, particularly with respect to arthropod predators.

  16. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  17. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  18. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  19. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  20. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  1. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  2. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  3. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  4. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  5. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  6. A novel type of pathogen defense-related cinnamyl alcohol dehydrogenase.

    Science.gov (United States)

    Logemann, E; Reinold, S; Somssich, I E; Hahlbrock, K

    1997-08-01

    We describe an aromatic alcohol dehydrogenase with properties indicating a novel type of function in the defense response of plants to pathogens. To obtain the enzyme free of contamination with possible isoforms, a parsley (Petroselinum crispum) cDNA comprising the entire coding region of the elicitor-responsive gene, ELI3, was expressed in Escherichia coli. In accord with large amino acid sequence similarities with established cinnamyl and benzyl alcohol dehydrogenases from other plants, the enzyme efficiently reduced various cinnamyl and benzyl aldehydes using NADPH as a co-substrate. Highest substrate affinities were observed for cinnamaldehyde, 4-coumaraldehyde and coniferaldehyde, whereas sinapaldehyde, one of the most efficient substrates of several previously analyzed cinnamyl alcohol dehydrogenases and a characteristic precursor molecule of angiosperm lignin, was not converted. A single form of ELI3 mRNA was strongly and rapidly induced in fungal elicitor-treated parsley cells. These results, together with earlier findings that the ELI3 gene is strongly activated both in elicitor-treated parsley cells and at fungal infection sites in parsley leaves, but not in lignifying tissue, suggest a specific role of this enzyme in pathogen defense-related phenylpropanoid metabolism.

  7. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  8. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  9. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  10. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  11. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  12. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  13. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  14. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  15. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  16. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  17. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  18. More JAZ in the orchestration of jasmonate-mediated plant defense

    NARCIS (Netherlands)

    Zhou, Meiliang

    2014-01-01

    Jasmonates (JAs) are plant hormones that regulate defense against microbial pathogens and insect herbivores via two antagonistic branches of the JAs signaling pathway leading to activation of distinct sets of defense genes. In Arabidopsis thaliana defense against herbivores is regulated by JAs alone

  19. Urban youth, fear of crime, and resulting defensive actions.

    Science.gov (United States)

    Williams, J S; Singh, B K; Singh, B B

    1994-01-01

    One of the most neglected populations studied in victimology has been juveniles. The present study examines the impact of fear of crime among a sample of urban youth on their defensive actions. Studies of urban adult populations have found that a significant number of people fear to venture outside their homes at night. When they do go out, they often take defensive measures to insure their safety. Carrying "mace," whistles, guns, knives, and clubs, for example, is not uncommon. Some have indicated that they have undertaken training in a variety of self-defensive arts and/or keep dogs to protect themselves from the possibility of being victimized. Using data collected from a sample of 1,775 urban youth in 1986 it was found that this population has taken many of the same defensive actions. Only 11% of the sample indicated that they had not taken any defensive actions as a result of fear of crime. Nearly three-fifths took the precaution of having an escort when they went out at night. Learning a technique of self-defense was reported by 19% of the sample; 10% indicated that they carried "mace" or some other type of repellant. Only 4% reported that they carried a whistle because of crime concerns. Significant predictors of personal defensive actions include gender, crime-witnessing status, victimization status and type of victimization (theft vs. witnessing Other defensive actions taken by members of the respondents' households included installing a burglar alarm (22%), keeping a "trained dog" (17%), keeping lights on a night (39%), and installing security locks (38%).(ABSTRACT TRUNCATED AT 250 WORDS)

  20. Advancing the defensive explanation for anxiety disorders: lorazepam effects on human defense are systematically modulated by personality and threat-type

    NARCIS (Netherlands)

    Perkins, A. M.; Ettinger, U.; Weaver, K.; Schmechtig, A.; Schrantee, A.; Morrison, P. D.; Sapara, A.; Kumari, V.; Williams, S. C. R.; Corr, P. J.

    2013-01-01

    Clinically effective drugs against human anxiety and fear systematically alter the innate defensive behavior of rodents, suggesting that in humans these emotions reflect defensive adaptations. Compelling experimental human evidence for this theory is yet to be obtained. We report the clearest test

  1. Defense POW/MIA Accounting Agency > News & Stories > Recent News & Stories

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense POW/MIA Accounting Agency Search Search DPAA: Search Search DPAA: Search Defense POW/MIA Accounting Agency Fulfilling Our Nation's Promise Defense POW/MIA Accounting Agency Home Families Family Events Posters Contact Information Our Missing Past

  2. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  3. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  4. Large scale patterns of antimicrofouling defenses in the hard coral Pocillopora verrucosa in an environmental gradient along the Saudi Arabian coast of the Red Sea.

    Science.gov (United States)

    Wahl, Martin; Al Sofyani, Abdulmohsin; Saha, Mahasweta; Kruse, Inken; Lenz, Mark; Sawall, Yvonne

    2014-01-01

    Large scale patterns of ecologically relevant traits may help identify drivers of their variability and conditions beneficial or adverse to the expression of these traits. Antimicrofouling defenses in scleractinian corals regulate the establishment of the associated biofilm as well as the risks of infection. The Saudi Arabian Red Sea coast features a pronounced thermal and nutritional gradient including regions and seasons with potentially stressful conditions to corals. Assessing the patterns of antimicrofouling defenses across the Red Sea may hint at the susceptibility of corals to global change. We investigated microfouling pressure as well as the relative strength of 2 alternative antimicrofouling defenses (chemical antisettlement activity, mucus release) along the pronounced environmental gradient along the Saudi Arabian Red Sea coast in 2 successive years. Microfouling pressure was exceptionally low along most of the coast but sharply increased at the southernmost sites. Mucus release correlated with temperature. Chemical defense tended to anti-correlate with mucus release. As a result, the combined action of mucus release and chemical antimicrofouling defense seemed to warrant sufficient defense against microbes along the entire coast. In the future, however, we expect enhanced energetic strain on corals when warming and/or eutrophication lead to higher bacterial fouling pressure and a shift towards putatively more costly defense by mucus release.

  5. Effects of internal and external factors on the budgeting between defensive and non-defensive responses in Aplysia.

    Science.gov (United States)

    Leod, Kaitlyn A Mac; Seas, Alexandra; Wainwright, Marcy L; Mozzachiodi, Riccardo

    2018-04-25

    Following exposure to aversive stimuli, organisms budget their behaviors by augmenting defensive responses and reducing/suppressing non-defensive behaviors. This budgeting process must be flexible to accommodate modifications in the animal's internal and/or external state that require the normal balance between defensive and non-defensive behaviors to be adjusted. When exposed to aversive stimuli, the mollusk Aplysia budgets its behaviors by concurrently enhancing defensive withdrawal reflexes (an elementary form of learning known as sensitization) and suppressing feeding. Sensitization and feeding suppression are consistently co-expressed following different training protocols and share common temporal domains, suggesting that they are interlocked. In this study, we attempted to uncouple the co-expression of sensitization and feeding suppression using: 1) manipulation of the animal's motivational state through prolonged food deprivation and 2) extended training with aversive stimuli that induces sensitization lasting for weeks. Both manipulations uncoupled the co-expression of the above behavioral changes. Prolonged food deprivation prevented the expression of sensitization, but not of feeding suppression. Following the extended training, sensitization and feeding suppression were co-expressed only for a limited time (i.e., 24 h), after which feeding returned to baseline levels as sensitization persisted for up to seven days. These findings indicate that sensitization and feeding suppression are not interlocked and that their co-expression can be uncoupled by internal (prolonged food deprivation) and external (extended aversive training) factors. The different strategies, by which the co-expression of sensitization and feeding suppression was altered, provide an example of how budgeting strategies triggered by an identical aversive experience can vary depending on the state of the organism. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Analysis of collective defense in finals of 2012. Radivoj Korac Cup

    Directory of Open Access Journals (Sweden)

    Stanković Aleksandar

    2013-01-01

    Full Text Available The aim of this research was to determine and analyze use, the way of organization and successfulness of collective defense, as well as effects of use of specific defense types. In this case of study, empirically non experimental method and monitoring technique which enables research of technically tactical activities in basketball were used. The sample of research included eight basketball teams, competitors in finals of Radivoj Korac Cup, held in Nis in 2012. In the research seven games were analyzed - four quarterfinal games, two semifinal games and one finals game. The data was collected by the monitoring technique, and analysis of collective defense is done based on variables on which, organization and successfulness of collective defense depends on. Five general variables, seven that refers to the type of defense and five variables of defense activities were included in this analysis and the results of the survey were expressed with quantitative values. With data analysis, it was realized that the team that had higher percentage of general defense efficiency was winning the game. While watching the games an impression that, the players on outer positions were significantly contributing to the efficiency of defense was made, while inner positions players showed much less mobility in defense.

  7. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  8. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  9. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  10. Phylogenetic escalation and decline of plant defense strategies

    Science.gov (United States)

    Agrawal, Anurag A.; Fishbein, Mark

    2008-01-01

    As the basal resource in most food webs, plants have evolved myriad strategies to battle consumption by herbivores. Over the past 50 years, plant defense theories have been formulated to explain the remarkable variation in abundance, distribution, and diversity of secondary chemistry and other defensive traits. For example, classic theories of enemy-driven evolutionary dynamics have hypothesized that defensive traits escalate through the diversification process. Despite the fact that macroevolutionary patterns are an explicit part of defense theories, phylogenetic analyses have not been previously attempted to disentangle specific predictions concerning (i) investment in resistance traits, (ii) recovery after damage, and (iii) plant growth rate. We constructed a molecular phylogeny of 38 species of milkweed and tested four major predictions of defense theory using maximum-likelihood methods. We did not find support for the growth-rate hypothesis. Our key finding was a pattern of phyletic decline in the three most potent resistance traits (cardenolides, latex, and trichomes) and an escalation of regrowth ability. Our neontological approach complements more common paleontological approaches to discover directional trends in the evolution of life and points to the importance of natural enemies in the macroevolution of species. The finding of macroevolutionary escalating regowth ability and declining resistance provides a window into the ongoing coevolutionary dynamics between plants and herbivores and suggests a revision of classic plant defense theory. Where plants are primarily consumed by specialist herbivores, regrowth (or tolerance) may be favored over resistance traits during the diversification process. PMID:18645183

  11. THE RELATIONSHIP BETWEEN DEFENSE SPENDING AND MACROECONOMIC VARIABLES

    Directory of Open Access Journals (Sweden)

    Onur OZSOY

    2010-01-01

    Full Text Available In this study, the rate of Defense Spendings in the GDP, and the growth rate of GDP, and the portion of current accounts in GDP and Annual Inflation Rate are examined with getting the annual data between the 1980-2006 years, and using VAR model for Egypt, Israel, Jordan, and Turkey. In course of this examination, the results of Granger Casuality and Impulse-Response Functions and Variance Decomposition were used. The focus point of our study is for the reason of defense spendings are effective on macroeconomic variables that while Egypt and Israel has uni-directional Granger causality from the defense spendings to inflation, for other countries there couldn`t be found any Granger causality. On the other hand when we look at the impulse response functions, in case of a shock of defense spending as a percentage of GNP, while the rate of Israel`s inflation and Current account as a percentage of GNP are affected by the pozitive direction , Turkey`s growth rate is affected negatively. For Egypt and Jordan, the significiant effects on defense spendings according to macroeconomic variables couldn`t be found any significiant effects.

  12. Measures for regional security and arms control in the South-East Asian area

    International Nuclear Information System (INIS)

    Uren, R.T.

    1992-01-01

    The subject of regional security and arms control in the South-East Asia raises some new and difficult issues. No approach to ensuring regional security could be complete without military dimension including the following categories: regional arms control; global arms control measure; confidence building measures that are designed to enhance the transparency of defense policies; confidence building measures that encourage cooperation among the military forces in the region

  13. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  14. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  15. What type of regional policy for Europe? Theoretical reflections and policy lessons from Sardinia

    NARCIS (Netherlands)

    Hospers, Gerrit J.; Benneworth, Paul Stephen

    2005-01-01

    In promoting European regional development, policymakers tend to pursue either an offensive, future-oriented or a defensive, tradition-preserving type of policy. Backed by theoretical notions and case evidence from an “ordinary” region, i. e. the Italian island of Sardinia, the following paper

  16. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  17. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  18. 75 FR 33271 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Foreign...

    Science.gov (United States)

    2010-06-11

    ... Certain Contracts with Foreign Entities for the Conduct of Ballistic Missile Defense Research, Development..., development, test, or evaluation in connection with the Ballistic Missile Defense Program. The provision... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System [OMB Control Number 0704-0229...

  19. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  20. DEFENSE ELEMENTS ANALYSIS IN BASKETBALL APPLIED BY WELL-KNOWN COACHES

    Directory of Open Access Journals (Sweden)

    Naid Kadušić

    2010-09-01

    Full Text Available This article describes how to create a man to man defense, how to train it and how to perform a man to man defense from a 2-3 zone defense. Creating a man to man defense is commonly mistaken for oponent press tactics. Coaches tend to devote less attention to defense tactics creation, which can be main weakness in a team. It is important for a team that a coach is aware of the training techniques in order to explain them and present in proper manner. Once player comprehends the training techniques, the period of training comes, which includes helping out at every moment, as well as taking the responsibility. Match outcome and play realization provide a great insight into the players’ game understanding.

  1. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  2. Defensive pessimism, self-esteem and achievement goals: A person-centered approach.

    Science.gov (United States)

    Ferradás Canedo, María M; Freire Rodríguez, Carlos; Regueiro Fernández, Bibiana; Valle Arias, Antonio

    2018-02-01

    The relationship between defensive pessimism, self-esteem, and achievement goals is a controversial issue. The main contribution of this research is the adoption of a person-centered approach to explore the existence of differentiated profiles of university students, which combine self-esteem and defensive pessimism. In addition, we analyze whether these profiles differ in their achievement goals (learning, performance-approach, performance-avoidance, and work-avoidance). 1,028 university students took part in the study. Four student profiles were identified: (a) HSE/MDP (high self-esteem and moderate defensive pessimism); (b) LSE/LDP (low self-esteem and low defensive pessimism); (c) HSE/LDP (high self-esteem and low defensive pessimism); and (d) LSE/HDP (low self-esteem and high defensive pessimism). These four profiles differ significantly in their achievement goals. The use of defensive pessimism may involve students with either low or high self-esteem, although the two profiles follow differentiated motivational achievement trajectories.

  3. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  4. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  5. The Trump Administrations March 2017 Defense Budget Proposals: Frequently Asked Questions

    Science.gov (United States)

    2017-04-03

    The Trump Administration’s March 2017 Defense Budget Proposals: Frequently Asked Questions Pat Towell Specialist in U.S. Defense Policy and...Budget Lynn M. Williams Analyst in U.S. Defense Budget Policy April 3, 2017 Congressional Research Service 7-5700 www.crs.gov R44806 The Trump ...8 The Trump Administration’s March 2017 Defense Budget Proposals: FAQs Congressional Research Service 1 Introduction On

  6. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  7. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  8. "Hand down, man down." Analysis of defensive adjustments in response to the hot hand in basketball using novel defense metrics.

    Directory of Open Access Journals (Sweden)

    Peter Csapo

    Full Text Available The hot-hand phenomenon, according to which a player's performance is significantly elevated during certain phases relative to the expected performance based on the player's base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease during hot (cold streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders' hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure.

  9. Low-severity fire increases tree defense against bark beetle attacks

    Science.gov (United States)

    Sharon Hood; Anna Sala; Emily K. Heyerdahl; Marion Boutin

    2015-01-01

    Induced defense is a common plant strategy in response to herbivory. Although abiotic damage, such as physical wounding, pruning, and heating, can induce plant defense, the effect of such damage by large-scale abiotic disturbances on induced defenses has not been explored and could have important consequences for plant survival facing future biotic...

  10. Promoter-Based Integration in Plant Defense Regulation

    DEFF Research Database (Denmark)

    Li, Baohua; Gaudinier, Allison; Tang, Michelle

    2014-01-01

    A key unanswered question in plant biology is how a plant regulates metabolism to maximize performance across an array of biotic and abiotic environmental stresses. In this study, we addressed the potential breadth of transcriptional regulation that can alter accumulation of the defensive...... glucosinolate metabolites in Arabidopsis (Arabidopsis thaliana). A systematic yeast one-hybrid study was used to identify hundreds of unique potential regulatory interactions with a nearly complete complement of 21 promoters for the aliphatic glucosinolate pathway. Conducting high-throughput phenotypic...... validation, we showed that >75% of tested transcription factor (TF) mutants significantly altered the accumulation of the defensive glucosinolates. These glucosinolate phenotypes were conditional upon the environment and tissue type, suggesting that these TFs may allow the plant to tune its defenses...

  11. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  12. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  13. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  14. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  15. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  16. [Study on psychiatric disorders and defensive process assessed by the "defense style questionnaire" in sterile males SAMPLE consulting in andrology].

    Science.gov (United States)

    Bellone, M; Cottencin, O; Rigot, J M; Goudemand, M

    2005-01-01

    The literature about artificial insemination and the associated psychological, psychiatric and sexual disorders is relatively rich. But the majority of these studies is made in gynaecology, with a feminine approach of the disorder. There are very few works led in andrology. This justified the investigation of new trails in order to understand better the clinical context of the sterile man. We undertake a study about the psychiatric disorders among sterile men and about the defense styles. These are a clinical entity recently introduced in the quantitative psychopathology research. The defense style questionnaire (DSQ) is a psychometric scale used in common practice in order to measure the defense styles. We made this study in order to examine the psychiatric state of a sterile males sample consulting in andrology; to assess the defense style by means of the Bond and al DSQ-88 ; to look into a difference between the defensive process according to their clinical situation of azoospermic males or as the oligoazoospermic males and finally, to reveal a correlation between the psychiatric disorders developed in this sample of sterile males and the defensive process they used. There were 42 people (22 azoospermic males and 20 oligoazoospermic males) aged between 23 and 49 years old in the analysed sample. These have been selected at the surgery of andrology at the RUHC of Lille, depending on their arrival order for 6 months. There was no significant difference between the two groups as far as the age and the education standard are concerned. The selection criteria were medical and somatic. Our sample population were divided into two groups: azoospermia (no spermatozoon found in the semen analysis) and oligoasthenospermia (decrease of the number and the mobility of the spermatozoa and an increase of the percentage of atypical forms). The method first consisted in the DSQ, followed by the analysis of the psychiatric state according to the DSM IV, a hetero questionnaire to

  17. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  18. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  19. For the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations

    Science.gov (United States)

    2015-06-12

    the Common Defense of Cyberspace: Implications of a US Cyber Militia on Department of Defense Cyber Operations 5a. CONTRACT NUMBER 5b. GRANT ...20130423/ NEWS/304230016/Navy-wants-1-000-more-cyber-warriors. 33 Edward Cardon , “Army Cyber Capabilities” (Lecture, Advanced Operations Course...Finally, once a cyber security professional is trained, many argue, to include the head of Army’s Cyber Command, Lieutenant General Edward Cardon

  20. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  1. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  2. Hitting the Sweet Spot: Glycans as Targets of Fungal Defense Effector Proteins

    Directory of Open Access Journals (Sweden)

    Markus Künzler

    2015-05-01

    Full Text Available Organisms which rely solely on innate defense systems must combat a large number of antagonists with a comparatively low number of defense effector molecules. As one solution of this problem, these organisms have evolved effector molecules targeting epitopes that are conserved between different antagonists of a specific taxon or, if possible, even of different taxa. In order to restrict the activity of the defense effector molecules to physiologically relevant taxa, these target epitopes should, on the other hand, be taxon-specific and easily accessible. Glycans fulfill all these requirements and are therefore a preferred target of defense effector molecules, in particular defense proteins. Here, we review this defense strategy using the example of the defense system of multicellular (filamentous fungi against microbial competitors and animal predators.

  3. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  4. The Relationship between Defense Patterns and DSM-5 Maladaptive Personality Domains

    Science.gov (United States)

    Granieri, Antonella; La Marca, Luana; Mannino, Giuseppe; Giunta, Serena; Guglielmucci, Fanny; Schimmenti, Adriano

    2017-01-01

    Aim: Research has extensively examined the relationship between defense mechanisms (DM) and personality traits. However, no study to date has explored if specific defenses (alone or in combination) are able to predict dysfunctional variants of personality domains, as conceived in the alternative DSM-5 model for personality disorders. This study aimed to investigate the relationship between DMs and DSM-5 maladaptive personality domains among adults. Materials and Methods: Three hundred and twenty-eight adults aged between 18 and 64 years old completed measures on DMs and maladapive personality domains. Regression analyses were performed to determine which DMs predicted the maladaptive personality domains of negative affectivity, detachment, antagonism, disinhibition, and psychoticism. Results: According to psychoanalytic literature, results showed that immature defenses positively predicted maladaptive personality domain scores, whereas mature defenses were generally related with better personality functioning. Moreover, different defense patterns emerged as significant predictors of the maladaptive personality domains comprised in the alternative DSM-5 model for personality disorder. Discussion: Our findings support the view that defense patterns represent core components of personality and its disorders, and suggest that an increased use of immature defenses and a reduced use of mature defenses have a negative impact on the development of personality. PMID:29163301

  5. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  6. A New Approach for the Design and Evaluation of Land Defense Concepts,

    Science.gov (United States)

    1991-01-01

    possible innovations can be vast. For example, tanks are a bugaboo of "defensive defense" advocates. Yet the Israelis in the Golan Heights in 1973 found...1551-1556. Loser, Jochen, and Otto Buchorn, " Portfolio on Area-Distributed Defense as an Alternate Defense Policy for NATO in the 1990s

  7. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  8. Balancing the technical, administrative, and institutional forces in defense waste management

    International Nuclear Information System (INIS)

    Hindman, T.B.

    1988-01-01

    Defense radioactive waste results from the Department of Energy's (DOE) national defense and nuclear weapons production activities. In 1983, the President submitted to Congress the Defense Waste Management Plan (DWMP) for defense high-level and transuranic wastes. The Plan proposed a workable approach for the final disposition of these wastes. The Department is still following the path laid out in this Plan. The proper management of this waste requires that technical, administrative, and institutional forces which are often neither well understood nor well documented be properly balanced. This paper clarifies the role these three forces play in the Defense waste management programs and provides examples of their impacts on specific programs

  9. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  10. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  11. Defensive Medicine in U.S. Spine Neurosurgery.

    Science.gov (United States)

    Din, Ryan S; Yan, Sandra C; Cote, David J; Acosta, Michael A; Smith, Timothy R

    2017-02-01

    Observational cross-sectional survey. To compare defensive practices of U.S. spine and nonspine neurosurgeons in the context of state medical liability risk. Defensive medicine is a commonly reported and costly phenomenon in neurosurgery. Although state liability risk is thought to contribute greatly to defensive practice, variation within neurosurgical specialties has not been well explored. A validated, online survey was sent via email to 3344 members of the American Board of Neurological Surgeons. The instrument contained eight question domains: surgeon characteristics, patient characteristics, practice type, insurance type, surgeon liability profile, basic surgeon reimbursement, surgeon perceptions of medical legal environment, and the practice of defensive medicine. The overall response rate was 30.6% (n = 1026), including 499 neurosurgeons performing mainly spine procedures (48.6%). Spine neurosurgeons had a similar average practice duration as nonspine neurosurgeons (16.6 vs 16.9 years, P = 0.64) and comparable lifetime case volume (4767 vs 4,703, P = 0.71). The average annual malpractice premium for spine neurosurgeons was similar to nonspine neurosurgeons ($104,480.52 vs $101,721.76, P = 0.60). On average, spine neurosurgeons had a significantly higher rate of ordering labs, medications, referrals, procedures, and imaging solely for liability concerns compared with nonspine neurosurgeons (89.2% vs 84.6%, P = 0.031). Multivariate analysis revealed that spine neurosurgeons were roughly 3 times more likely to practice defensively compared with nonspine neurosurgeons (odds ratio, OR = 2.9, P = 0.001) when controlling for high-risk procedures (OR = 7.8, P < 0.001), annual malpractice premium (OR = 3.3, P = 0.01), percentage of patients publicly insured (OR = 1.1, P = 0.80), malpractice claims in the last 3 years (OR = 1.13, P = 0.71), and state medical-legal environment (OR = 1.3, P = 0

  12. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  13. Antiherbivore defenses alter natural selection on plant reproductive traits.

    Science.gov (United States)

    Thompson, Ken A; Johnson, Marc T J

    2016-04-01

    While many studies demonstrate that herbivores alter selection on plant reproductive traits, little is known about whether antiherbivore defenses affect selection on these traits. We hypothesized that antiherbivore defenses could alter selection on reproductive traits by altering trait expression through allocation trade-offs, or by altering interactions with mutualists and/or antagonists. To test our hypothesis, we used white clover, Trifolium repens, which has a Mendelian polymorphism for the production of hydrogen cyanide-a potent antiherbivore defense. We conducted a common garden experiment with 185 clonal families of T. repens that included cyanogenic and acyanogenic genotypes. We quantified resistance to herbivores, and selection on six floral traits and phenology via male and female fitness. Cyanogenesis reduced herbivory but did not alter the expression of reproductive traits through allocation trade-offs. However, the presence of cyanogenic defenses altered natural selection on petal morphology and the number of flowers within inflorescences via female fitness. Herbivory influenced selection on flowers and phenology via female fitness independently of cyanogenesis. Our results demonstrate that both herbivory and antiherbivore defenses alter natural selection on plant reproductive traits. We discuss the significance of these results for understanding how antiherbivore defenses interact with herbivores and pollinators to shape floral evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  14. Costs and trade-offs of grazer-induced defenses in Scenedesmus under deficient resource

    Science.gov (United States)

    Zhu, Xuexia; Wang, Jun; Chen, Qinwen; Chen, Ge; Huang, Yuan; Yang, Zhou

    2016-01-01

    The green alga Scenedesmus obliquus can form inducible defensive morphs under grazing threat. Costs and trade-offs of inducible defense are expected to accompany the benefits of defensive morphs, but are hard to detect under nutrient-sufficient experimental conditions. To test the existence of costs associated with inducible defense, we cultured S. obliquus along resource availability gradients in the presence or absence of infochemical cues from Daphnia, and measured the strength of defensive colony formation and fitness characters. Under the lowest phosphorous concentration, the expression of inducible defensive colony resulted in decreased growth rate, which provides direct evidence for physiological costs. Along the gradient reduction of phosphorous concentration or light intensity, inducible defense in S. obliquus showed a decreasing trend. However, the photosynthetic efficiency of S. obliquus was barely affected by its defense responses, suggesting that the negative correlations between resource availability and colony formation of this alga may be due to resource-based trade-offs in the allocation of limited resources. Thus, our results indicated that expression of inducible defense of S. obliquus was impaired under insufficient phosphorus or light. Furthermore, under severe phosphate deficiency, obvious physiological costs of inducible defense could be detected even though defensive colony formation also decreased significantly. PMID:26932369

  15. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  16. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  17. How Human Amygdala and Bed Nucleus of the Stria Terminalis May Drive Distinct Defensive Responses.

    Science.gov (United States)

    Klumpers, Floris; Kroes, Marijn C W; Baas, Johanna M P; Fernández, Guillén

    2017-10-04

    The ability to adaptively regulate responses to the proximity of potential danger is critical to survival and imbalance in this system may contribute to psychopathology. The bed nucleus of the stria terminalis (BNST) is implicated in defensive responding during uncertain threat anticipation whereas the amygdala may drive responding upon more acute danger. This functional dissociation between the BNST and amygdala is however controversial, and human evidence scarce. Here we used data from two independent functional magnetic resonance imaging studies [ n = 108 males and n = 70 (45 females)] to probe how coordination between the BNST and amygdala may regulate responses during shock anticipation and actual shock confrontation. In a subset of participants from Sample 2 ( n = 48) we demonstrate that anticipation and confrontation evoke bradycardic and tachycardic responses, respectively. Further, we show that in each sample when going from shock anticipation to the moment of shock confrontation neural activity shifted from a region anatomically consistent with the BNST toward the amygdala. Comparisons of functional connectivity during threat processing showed overlapping yet also consistently divergent functional connectivity profiles for the BNST and amygdala. Finally, childhood maltreatment levels predicted amygdala, but not BNST, hyperactivity during shock anticipation. Our results support an evolutionary conserved, defensive distance-dependent dynamic balance between BNST and amygdala activity. Shifts in this balance may enable shifts in defensive reactions via the demonstrated differential functional connectivity. Our results indicate that early life stress may tip the neural balance toward acute threat responding and via that route predispose for affective disorder. SIGNIFICANCE STATEMENT Previously proposed differential contributions of the BNST and amygdala to fear and anxiety have been recently debated. Despite the significance of understanding their

  18. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  19. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  20. Defensive effects of extrafloral nectaries in quaking aspen differ with scale.

    Science.gov (United States)

    Mortensen, Brent; Wagner, Diane; Doak, Patricia

    2011-04-01

    The effects of plant defenses on herbivory can differ among spatial scales. This may be particularly common with indirect defenses, such as extrafloral nectaries (EFNs), that attract predatory arthropods and are dependent on predator distribution, abundance, and behavior. We tested the defensive effects of EFNs in quaking aspen (Populus tremuloides Michx.) against damage by a specialist herbivore, the aspen leaf miner (Phyllocnistis populiella Cham.), at the scale of individual leaves and entire ramets (i.e., stems). Experiments excluding crawling arthropods revealed that the effects of aspen EFNs differed at the leaf and ramet scales. Crawling predators caused similar reductions in the percent leaf area mined on individual leaves with and without EFNs. However, the extent to which crawling predators increased leaf miner mortality and, consequently, reduced mining damage increased with EFN expression at the ramet scale. Thus, aspen EFNs provided a diffuse defense, reducing damage to leaves across a ramet regardless of leaf-scale EFN expression. We detected lower leaf miner damage and survival unassociated with crawling predators on EFN-bearing leaves, suggesting that direct defenses (e.g., chemical defenses) were stronger on leaves with than without EFNs. Greater direct defenses on EFN-bearing leaves may reduce the probability of losing these leaves and thus weakening ramet-scale EFN defense. Aspen growth was not related to EFN expression or the presence of crawling predators over the course of a single season. Different effects of aspen EFNs at the leaf and ramet scales suggest that future studies may benefit from examining indirect defenses simultaneously at multiple scales.

  1. THE PROGNOSIS OF RUSSIAN DEFENSE INDUSTRY DEVELOPMENT IMPLEMENTED THROUGH REGRESSION ANALYSIS

    Directory of Open Access Journals (Sweden)

    L.M. Kapustina

    2007-03-01

    Full Text Available The article illustrates the results of investigation the major internal and external factors which influence the development of the defense industry, as well as the results of regression analysis which quantitatively displays the factorial contribution in the growth rate of Russian defense industry. On the basis of calculated regression dependences the authors fulfilled the medium-term prognosis of defense industry. Optimistic and inertial versions of defense product growth rate for the period up to 2009 are based on scenario conditions in Russian economy worked out by the Ministry of economy and development. In conclusion authors point out which factors and conditions have the largest impact on successful and stable operation of Russian defense industry.

  2. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  3. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  4. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  5. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  6. Socioeconomic assessment of defense waste processing facility impacts in the Savannah River Plant region

    Energy Technology Data Exchange (ETDEWEB)

    Peelle, E.; Reed, J.H.; Stevenson, R.H.

    1981-09-01

    The DWPF will immobilize highly radioactive defense wastes for storage on site until shipment to an approved federal repository for radioactive wastes. This document assesses the socioeconomic impacts of constructing and operating the proposed facility and presents the assessment methodology. Because various schedules and various ways of staging the construction of the DWPF are considered and because in some of these instances a large nearby construction project (the Vogtle Nuclear Power Station) may influence the socioeconomic impacts, four scenarios involving different facility options and schedules are assessed. In general, the impacts were found not to be large. In the scenario where the socioeconomic effects were the greatest, it was found that there are likely to be some impacts on schools in Barnwell County as well as a shortage of mobile homes in that county. Aiken, Allendale, and Bamberg counties are also likely to experience slight-to-moderate housing shortages. Minor impacts are anticipated for fire and police services, roads, traffic, and land use. There will be noticeable economic impact from the project. Other scenarios had fewer socioeconomic impacts.

  7. Socioeconomic assessment of defense waste processing facility impacts in the Savannah River Plant region

    International Nuclear Information System (INIS)

    Peelle, E.; Reed, J.H.; Stevenson, R.H.

    1981-09-01

    The DWPF will immobilize highly radioactive defense wastes for storage on site until shipment to an approved federal repository for radioactive wastes. This document assesses the socioeconomic impacts of constructing and operating the proposed facility and presents the assessment methodology. Because various schedules and various ways of staging the construction of the DWPF are considered and because in some of these instances a large nearby construction project (the Vogtle Nuclear Power Station) may influence the socioeconomic impacts, four scenarios involving different facility options and schedules are assessed. In general, the impacts were found not to be large. In the scenario where the socioeconomic effects were the greatest, it was found that there are likely to be some impacts on schools in Barnwell County as well as a shortage of mobile homes in that county. Aiken, Allendale, and Bamberg counties are also likely to experience slight-to-moderate housing shortages. Minor impacts are anticipated for fire and police services, roads, traffic, and land use. There will be noticeable economic impact from the project. Other scenarios had fewer socioeconomic impacts

  8. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  9. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  10. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  11. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  12. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  13. Management of remote-handled defense transuranic wastes

    International Nuclear Information System (INIS)

    Ebra, M.A.; Pierce, G.D.; Carson, P.H.

    1988-01-01

    Transuranic (TRU) wastes generated by defense-related activities are scheduled for emplacement at the Waste Isolation Pilot Plant (WIPP) in New Mexico beginning in October 1988. After five years of operation as a research and development facility, the WIPP may be designated as a permanent repository for these wastes, if it has been demonstrated that this deep, geologically stable formation is a safe disposal option. Defense TRU wastes are currently stored at various Department of Energy (DOE) sites across the nation. Approximately 2% by volume of currently stored TRU wastes are defined, on the basis of dose rates, as remote-handled (RH). RH wastes continue to be generated at various locations operated by DOE contractors. They require special handling and processing prior to and during emplacement in the WIPP. This paper describes the strategy for managing defense RH TRU wastes

  14. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  15. 48 CFR 752.228-3 - Worker's compensation insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... insurance (Defense Base Act). 752.228-3 Section 752.228-3 Federal Acquisition Regulations System AGENCY FOR... Clauses 752.228-3 Worker's compensation insurance (Defense Base Act). As prescribed in 728.309, the... contracting officer. (a) The Contractor agrees to procure Defense Base Act (DBA) insurance pursuant to the...

  16. 48 CFR 52.228-3 - Workers' Compensation Insurance (Defense Base Act).

    Science.gov (United States)

    2010-10-01

    ... Insurance (Defense Base Act). 52.228-3 Section 52.228-3 Federal Acquisition Regulations System FEDERAL... Provisions and Clauses 52.228-3 Workers' Compensation Insurance (Defense Base Act). As prescribed in 28.309(a), insert the following clause: Workers' Compensation Insurance (Defense Base Act) (APR 1984) The Contractor...

  17. Survey on radon concentration of civil air defense shelter in Hengyang

    International Nuclear Information System (INIS)

    Tang Quan; Ma Xiao

    2011-01-01

    In this paper, the radon concentration of civil air defense shelter was surveyed in Hengyang area, where there is higher background of radon concentration. If civil air defense shelter is not pressure-tight, the average radon concentration is about 55.9 -167.3 Bq/m 3 , lower than the intervened quantity: 200 Bq/m 3 , which is given by the international commission on radiological protection (ICRP). Maybe radon protection is not needed with the ventilation of civil air defense shelter like that. The radon concentration of airtight civil air defense shelter change along with the season, which is lower in spring and higher in autumn. The results can be a reference for using civil air defense shelter during the time of peace or war. (authors)

  18. On Some Tendencies in Defense Policy of Germany

    Directory of Open Access Journals (Sweden)

    Natalia K. Meden

    2015-01-01

    Full Text Available The paper discusses the newest trends in the German defense policy, caused by the aggravation of European geopolitical situation. The author analyzes various sources, among them official reports presented to the Ministry of Defense and the Bundestag; speeches by the Minister of Defense and by supreme commanders of the Bundeswehr; published in mass media information on condition and problems of the military forces, as well as modernization of the equipment. Officially it is deemed, that the reform of the Bundeswehr which started in 2011, so far has turned into an amorphous process of renewal (Neuausrichtung, intended to improve the military organization. Since the acting Cabinet was farmed, Ursula von der Leyen - the first woman Minister of Defense of Germany - directs these activities, and her style of work affects all the work in the Ministry. Meanwhile, the revision of the main parameters of the defensive activity and the whole German politics is caused not by a fresh leadership, but by the most sharp after the end of the "cold war" geopolitical crisis in Europe. The author comes to conclusion, that a turning point in the Defensive Policy of Germany is taking shape, so that all the aspects of military organization are now affected: command stuff training, military equipment, strengthening of ties with allies. Anti-Russian propaganda in mass-media reanimates an image of an enemy and prepares public opinion to the future growth of military expenses; it even overcomes certain pacifism, so usual in modern society. Here in Russia, one must take all this into account, as an idea of the low fighting capacity of the Bundeswehr, which was formed in the last years, is getting obsolete, and could became a dangerous illusion.

  19. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  20. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  1. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  2. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  3. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  4. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  5. Regional Civil Support Forces for Homeland Defense and Civil Support Missions

    National Research Council Canada - National Science Library

    Nuismer, Barbara A

    2007-01-01

    To protect the homeland, a plan to form ten regional Civil Support Forces (CSF) made up of National Guard forces has been proposed by senior fellow Christine Wormuth of the Center for Strategic and International Studies (CSIS...

  6. Ego defense mechanisms in Pakistani medical students: a cross sectional analysis

    Directory of Open Access Journals (Sweden)

    Khalid Roha

    2010-01-01

    Full Text Available Abstract Background Ego defense mechanisms (or factors, defined by Freud as unconscious resources used by the ego to reduce conflict between the id and superego, are a reflection of how an individual deals with conflict and stress. This study assesses the prevalence of various ego defense mechanisms employed by medical students of Karachi, which is a group with higher stress levels than the general population. Methods A questionnaire based cross-sectional study was conducted on 682 students from five major medical colleges of Karachi over 4 weeks in November 2006. Ego defense mechanisms were assessed using the Defense Style Questionnaire (DSQ-40 individually and as grouped under Mature, Immature, and Neurotic factors. Results Lower mean scores of Immature defense mechanisms (4.78 were identified than those for Neurotic (5.62 and Mature (5.60 mechanisms among medical students of Karachi. Immature mechanisms were more commonly employed by males whereas females employed more Neurotic mechanisms than males. Neurotic and Immature defenses were significantly more prevalent in first and second year students. Mature mechanisms were significantly higher in students enrolled in Government colleges than Private institutions (p Conclusions Immature defense mechanisms were less commonly employed than Neurotic and Mature mechanisms among medical students of Karachi. The greater employment of Neurotic defenses may reflect greater stress levels than the general population. Employment of these mechanisms was associated with female gender, enrollment in a private medical college, and students enrolled in the first 2 years of medical school.

  7. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  8. Can antibrowsing defense regulate the spread of woody vegetation in arctic tundra?

    Science.gov (United States)

    Bryant, John P.; Joly, Kyle; Chapin, F. Stuart; DeAngelis, Donald L.; Kielland, Knut

    2014-01-01

    Global climate warming is projected to promote the increase of woody plants, especially shrubs, in arctic tundra. Many factors may affect the extent of this increase, including browsing by mammals. We hypothesize that across the Arctic the effect of browsing will vary because of regional variation in antibrowsing chemical defense. Using birch (Betula) as a case study, we propose that browsing is unlikely to retard birch expansion in the region extending eastward from the Lena River in central Siberia across Beringia and the continental tundra of central and eastern Canada where the more effectively defended resin birches predominate. Browsing is more likely to retard birch expansion in tundra west of the Lena to Fennoscandia, Iceland, Greenland and South Baffin Island where the less effectively defended non-resin birches predominate. Evidence from the literature supports this hypothesis. We further suggest that the effect of warming on the supply of plant-available nitrogen will not significantly change either this pan-Arctic pattern of variation in antibrowsing defense or the resultant effect that browsing has on birch expansion in tundra. However, within central and east Beringia warming-caused increases in plant-available nitrogen combined with wildfire could initiate amplifying feedback loops that could accelerate shrubification of tundra by the more effectively defended resin birches. This accelerated shrubification of tundra by resin birch, if extensive, could reduce the food supply of caribou causing population declines. We conclude with a brief discussion of modeling methods that show promise in projecting invasion of tundra by woody plants.

  9. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  10. The US ballistic missile defence policy in the Baltic and Nordic regions

    Directory of Open Access Journals (Sweden)

    Konyshev Valery

    2016-03-01

    Full Text Available This article examines the implications of the deployment of the US ballistic missile defense (BMD system in the Baltic and Nordic regions. These implications are to be considered to ensure Russia’s military security. Using the structural-functional method, the authors analyse the internal structure of the US BMD in Europe, stages of its implementation, and its influence on the military equilibrium in the region. Being similar to other regional missile defence systems of the Pentagon, BMD in Europe increases the offensive capabilities of the US armed forces and its allies and in doing so, it stops performing a purely defensive mission declared by Washington. It is stressed that the deployment of mobile sea- and land-based BMD elements in the Baltic Sea region and Nordic countries will inevitably destabilize the strategic situation and may lead to a new round of arms race in the region. The efficacy of BMD in Europe is evaluated from the perspective of military technology. The system’s potential threats to Russia’s military security and its armed forces are assessed. The article considers measures to enhance national security that could be taken by Russia provided the US plans to deploy BMD in Europe are fully implemented.

  11. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  12. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  13. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  14. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  15. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  16. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  17. The role of defensive ecological interactions in the evolution of conotoxins.

    Science.gov (United States)

    Prashanth, J R; Dutertre, S; Jin, A H; Lavergne, V; Hamilton, B; Cardoso, F C; Griffin, J; Venter, D J; Alewood, P F; Lewis, R J

    2016-01-01

    Venoms comprise of complex mixtures of peptides evolved for predation and defensive purposes. Remarkably, some carnivorous cone snails can inject two distinct venoms in response to predatory or defensive stimuli, providing a unique opportunity to study separately how different ecological pressures contribute to toxin diversification. Here, we report the extraordinary defensive strategy of the Rhizoconus subgenus of cone snails. The defensive venom from this worm-hunting subgenus is unusually simple, almost exclusively composed of αD-conotoxins instead of the ubiquitous αA-conotoxins found in the more complex defensive venom of mollusc- and fish-hunting cone snails. A similarly compartmentalized venom gland as those observed in the other dietary groups facilitates the deployment of this defensive venom. Transcriptomic analysis of a Conus vexillum venom gland revealed the αD-conotoxins as the major transcripts, with lower amounts of 15 known and four new conotoxin superfamilies also detected with likely roles in prey capture. Our phylogenetic and molecular evolution analysis of the αD-conotoxins from five subgenera of cone snails suggests they evolved episodically as part of a defensive strategy in the Rhizoconus subgenus. Thus, our results demonstrate an important role for defence in the evolution of conotoxins. © 2015 John Wiley & Sons Ltd.

  18. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  19. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  20. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  1. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  2. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  3. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  4. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  5. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  6. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  7. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  8. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  9. “Hand down, Man down.” Analysis of Defensive Adjustments in Response to the Hot Hand in Basketball Using Novel Defense Metrics

    Science.gov (United States)

    Csapo, Peter; Raab, Markus

    2014-01-01

    The hot-hand phenomenon, according to which a player’s performance is significantly elevated during certain phases relative to the expected performance based on the player’s base rate, has left many researchers and fans in basketball puzzled: The vast majority of players, coaches and fans believe in its existence but statistical evidence supporting this belief has been scarce. It has frequently been argued that the hot hand in basketball is unobservable because of strategic adjustments and defensive interference of the opposing team. We use a dataset with novel metrics, such as the number of defenders and the defensive intensity for each shot attempt, which enable us to directly measure defensive pressure. First, we examine how the shooting percentage of NBA players changes relative to the attributes of each metric. We find that it is of lesser importance by how many defenders a player is guarded but that defensive intensity, e.g., whether a defender raises his hand when his opponent shoots, has a larger impact on shot difficulty. Second, we explore how the underlying metrics and shooting accuracy change as a function of streak length. Our results indicate that defensive pressure and shot difficulty increase (decrease) during hot (cold) streaks, so that defenders seem to behave according to the hot-hand belief and try to force hot players into more difficult shots. However, we find that shooting percentages of presumably hot players do not increase and that shooting performance is not related to streakiness, so that the defenders’ hot-hand behavior cannot be considered ecologically rational. Therefore, we are unable to find evidence in favor of the hot-hand effect even when accounting for defensive pressure. PMID:25474443

  10. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  11. Examining patterns of association with defensive information processing about colorectal cancer screening.

    Science.gov (United States)

    McQueen, Amy; Swank, Paul R; Vernon, Sally W

    2014-11-01

    To reduce negative psychological affect from information or behavior that is inconsistent with one's positive self-concept, individuals use a variety of defensive strategies. It is unknown whether correlates differ across defenses. We examined correlates of four levels of defensive information processing about colorectal cancer screening. Cross-sectional surveys were completed by a convenience sample of 287 adults aged 50-75 years. Defenses measures were more consistently associated with individual differences (especially avoidant coping styles); however, situational variables involving health-care providers also were important. Future research should examine changes in defenses after risk communication and their relative impact on colorectal cancer screening. © The Author(s) 2013.

  12. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  13. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  14. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  15. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  16. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  17. Message framing and defensive processing: a cultural examination.

    Science.gov (United States)

    Ko, Deborah M; Kim, Heejung S

    2010-01-01

    Past research has shown that health messages on safer sexual practices that focus on relational consequences are more persuasive than messages that focus on personal consequences. However, we theorize that it is defensiveness against personal risk framing that threatens the self among people from more individualistic cultures. Two studies tested this idea. Study 1 showed that European Americans were less persuaded by personal framing than by relational framing but that this pattern was not found for Asian Americans, who are more collectivistic. Study 2 showed that these defensive patterns were eliminated among European American participants when a person's self-image was affirmed. These results suggest defensive processes as the mechanism behind the differences in message framing effectiveness and motivate a closer look at cultural patterns.

  18. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  19. CXCR1 regulates pulmonary anti-Pseudomonas host defense

    Science.gov (United States)

    Carevic, M.; Öz, H.; Fuchs, K.; Laval, J.; Schroth, C.; Frey, N.; Hector, A.; Bilich, T.; Haug, M.; Schmidt, A.; Autenrieth, S. E.; Bucher, K.; Beer-Hammer, S.; Gaggar, A.; Kneilling, M.; Benarafa, C.; Gao, J.; Murphy, P.; Schwarz, S.; Moepps, B.; Hartl, D.

    2016-01-01

    Pseudomonas aeruginosa is a key opportunistic pathogen causing disease in cystic fibrosis (CF) and other lung diseases such as chronic obstructive pulmonary disease (COPD). However, the pulmonary host defense mechanisms regulating anti-Pseudomonas aeruginosa immunity remain incompletely understood. Here we demonstrate, by studying an airway Pseudomonas aeruginosa infection model, in vivo bioluminescence imaging, neutrophil effector responses and human airway samples, that the chemokine receptor CXCR1 regulates pulmonary host defense against Pseudomonas aeruginosa. Mechanistically, CXCR1 regulated anti-Pseudomonas neutrophil responses through modulation of reactive oxygen species and interference with toll-like receptor 5 expression. These studies define CXCR1 as a novel non-canonical chemokine receptor that regulates pulmonary anti-Pseudomonas host defense with broad implications for CF, COPD and other infectious lung diseases. PMID:26950764

  20. Study of General health, resiliency, and defense mechanisms in patients with migraine headache

    Directory of Open Access Journals (Sweden)

    Alireza Aghayusefi

    2013-06-01

    Full Text Available Background: Migraine is a neurological disease that the etiology, several factors affect its onset or its exacerbation. One of the factors affecting disease is psychological factors such as defense mechanisms, resiliency, and general health. This study assessed the relationship between general health, resiliency, and general defense mechanisms, and also predicts the general health of people with migraine headaches that have a high resiliency and use mature defense mechanisms. Material and Methods: 50 women with migraine headache in the city of Bushehr using defense mechanisms, resiliency, and general health questionnaires were studied. For statistical analysis, Pearson correlation and multiple regression tests were used by SPSS 17 software. Results: The results showed that most of the defense mechanisms of migraine sufferers are Immature and Neuroticism. There is significant negative correlation between the deterioration of general health and resiliency as well as the mature defense mechanism (p=0/003, and also there is a significant positive correlation between this deterioration with neuroticism (p=0/040 and immature defense mechanisms (p=0/041. On the other hand there is significant negative correlation between resiliencies with immature (p=0/009 and neuroticism defense mechanisms (p=0/04, and also with mature defense mechanism has a significant positive correlation (p=0/003. Also, as more people use the mature defense mechanism, their deterioration of general health will be reduced, but this relationship will be stronger with the presence of resiliency. So migraine people use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health. Conclusion: This study showed that migraine patients use the mature defense mechanisms with high resiliency will have more favorable general health (less deterioration of general health.

  1. Defense AT&L (Volume 37, Number 1, January-February 2008)

    Science.gov (United States)

    2008-02-01

    Senate, he serves as the senior advisor to the secretary of defense on testing Department of Defense weapon systems, and prescribing policies and...including several commands. As general, his final assign- ment was the senior air defense advisor to the chief of staff of the Army. His awards...by going to <www. usajobs.gov>. For more details, see the USA Staffing Ap- plication Manager’s online help at <http://eshelp.opm. gov/ robo /projects

  2. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  3. Light-dependent expression of flg22-induced defense genes in Arabidopsis

    Directory of Open Access Journals (Sweden)

    Satoshi eSano

    2014-10-01

    Full Text Available Chloroplasts have been reported to generate retrograde immune signals that activate defense gene expression in the nucleus. However, the roles of light and photosynthesis in plant immunity remain largely elusive. In this study, we evaluated the effects of light on the expression of defense genes induced by flg22, a peptide derived from bacterial flagellins which acts as a potent elicitor in plants. Whole-transcriptome analysis of flg22-treated Arabidopsis thaliana seedlings under light and dark conditions for 30 min revealed that a number of (30% genes strongly induced by flg22 (>4.0 require light for their rapid expression, whereas flg22-repressed genes include a significant number of genes that are down-regulated by light. Furthermore, light is responsible for the flg22-induced accumulation of salicylic acid, indicating that light is indispensable for basal defense responses in plants. To elucidate the role of photosynthesis in defense, we further examined flg22-induced defense gene expression in the presence of specific inhibitors of photosynthetic electron transport: 3-(3,4-dichlorophenyl-1,1-dimethylurea (DCMU and 2,5-dibromo-3-methyl-6-isopropyl-benzoquinone (DBMIB. Light-dependent expression of defense genes was largely suppressed by DBMIB, but only partially suppressed by DCMU. These findings suggest that photosynthetic electron flow plays a role in controling the light-dependent expression of flg22-inducible defense genes.

  4. Latvian Security and Defense Policy within the Twenty-First Century Security Environment

    Directory of Open Access Journals (Sweden)

    Rublovskis Raimonds

    2014-12-01

    Full Text Available The aim of this paper is to analyze fundamental factors which form and profoundly shape security and defense policy of the Republic of Latvia. One can argue that historical background, geographical location, common institutional history within the former Soviet Union, the Russia factor, the relative smallness of the territory of state and the population, the ethnic composition of the population, the low density of the population and rather limited financial and manpower resources available for the defense of the Republic of Latvia are the key factors of influence on the state security and defense policy. The core principles of the security and defense policy of Latvia are the membership in powerful global military alliance of NATO and bilateral strategic partnership with the United States. However, security and defense cooperation among the three Baltic States as well as enhanced cooperation within the Baltic-Nordic framework is seen as an important supplementary factor for the increased security of the Republic of Latvia. Latvia has developed a sustainable legal and institutional framework in order to contribute to state security and defense; however, security challenges and significant changes within the global security environment of the twenty-first century will further challenge the ability of the Republic of Latvia to sustain its current legal framework, and more importantly, current institutional structure of Latvian security and defense architecture. Significant internal and external challenges will impact the fundamental pillars of Latvian security and defense policy, such as American strategic shift to the Pacific, and lack of political will to increase defense budgets in European part of NATO. It has to be clear that very independence, security and defense of the Republic of Latvia depend on the ability of NATO to remain an effective organization with timely and efficient decision-making, and the ability of the United States to remain

  5. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  6. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  7. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  8. Vaginal orgasm is associated with less use of immature psychological defense mechanisms.

    Science.gov (United States)

    Brody, Stuart; Costa, Rui Miguel

    2008-05-01

    Freud implied a link between inability to have a vaginal orgasm and psychosexual immaturity. Since Kinsey, many sexologists have asserted that no such link exists. However, empirical testing of the issue has been lacking. The objective was to determine the relationship between different sexual behavior triggers of female orgasm and use of immature psychological defense mechanisms. Women reported their past month frequency of different sexual behaviors and corresponding orgasm rates and completed the Defense Style Questionnaire (DSQ-40). The association between ability to have vaginal intercourse orgasm (versus clitoral orgasm) and the use of DSQ-40 immature psychological defense mechanisms (associated with various psychopathologies) was examined. In a sample of 94 healthy Portuguese women, vaginal orgasm (triggered solely by penile-vaginal intercourse) was associated with less use of DSQ-40 immature defenses. Vaginal orgasm was associated with less somatization, dissociation, displacement, autistic fantasy, devaluation, and isolation of affect. Orgasm from clitoral stimulation or combined clitoral-intercourse stimulation was not associated with less use of immature defenses, and was associated with more use of some immature defenses. In one regression analysis, more masturbation and less vaginal orgasm consistency made independent contributions to the statistical prediction of immature defenses. In another regression analysis, any use of extrinsic clitoral stimulation for intercourse orgasm, and lack of any vaginal orgasm, made independent contributions to the statistical prediction of immature defenses. Vaginally anorgasmic women had immature defenses scores comparable to those of established (depression, social anxiety disorder, panic disorder, and obsessive-compulsive disorder) outpatient psychiatric groups. Results were not confounded by social desirability responding or relationship quality. The results linking penile-vaginal orgasm with less use of immature

  9. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  10. 48 CFR 225.7016 - Restriction on Ballistic Missile Defense research, development, test, and evaluation.

    Science.gov (United States)

    2010-10-01

    ... Missile Defense research, development, test, and evaluation. 225.7016 Section 225.7016 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS SYSTEM, DEPARTMENT OF DEFENSE SOCIOECONOMIC PROGRAMS... Acquisition 225.7016 Restriction on Ballistic Missile Defense research, development, test, and evaluation. [68...

  11. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  12. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    information accurately and in conformance with Generally Accepted Accounting Principles , to comply with Congressional requirements of the Chief Financial ...2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting

  13. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    2000-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials

  14. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  15. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  16. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  17. 76 FR 45543 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-29

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of Visitors, Defense Language Institute Foreign Language Center meeting scheduled for August 3 and 4, 2011...

  18. Distinct roles of jasmonates and aldehydes in plant-defense responses.

    Directory of Open Access Journals (Sweden)

    E Wassim Chehab

    Full Text Available BACKGROUND: Many inducible plant-defense responses are activated by jasmonates (JAs, C(6-aldehydes, and their corresponding derivatives, produced by the two main competing branches of the oxylipin pathway, the allene oxide synthase (AOS and hydroperoxide lyase (HPL branches, respectively. In addition to competition for substrates, these branch-pathway-derived metabolites have substantial overlap in regulation of gene expression. Past experiments to define the role of C(6-aldehydes in plant defense responses were biased towards the exogenous application of the synthetic metabolites or the use of genetic manipulation of HPL expression levels in plant genotypes with intact ability to produce the competing AOS-derived metabolites. To uncouple the roles of the C(6-aldehydes and jasmonates in mediating direct and indirect plant-defense responses, we generated Arabidopsis genotypes lacking either one or both of these metabolites. These genotypes were subsequently challenged with a phloem-feeding insect (aphids: Myzus persicae, an insect herbivore (leafminers: Liriomyza trifolii, and two different necrotrophic fungal pathogens (Botrytis cinerea and Alternaria brassicicola. We also characterized the volatiles emitted by these plants upon aphid infestation or mechanical wounding and identified hexenyl acetate as the predominant compound in these volatile blends. Subsequently, we examined the signaling role of this compound in attracting the parasitoid wasp (Aphidius colemani, a natural enemy of aphids. PRINCIPAL FINDINGS: This study conclusively establishes that jasmonates and C(6-aldehydes play distinct roles in plant defense responses. The jasmonates are indispensable metabolites in mediating the activation of direct plant-defense responses, whereas the C(6-aldehyes are not. On the other hand, hexenyl acetate, an acetylated C(6-aldehyde, is the predominant wound-inducible volatile signal that mediates indirect defense responses by directing tritrophic

  19. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior

  20. Adversity Quotient and Defense Mechanism of Secondary School Students

    Science.gov (United States)

    Nikam, Vibhawari B.; Uplane, Megha M.

    2013-01-01

    The present study was conducted to explore the relationship between Adversity Quotient (AQ) and Defense Mechanism (DM) of secondary school students. The aim of the study was to ascertain relationship between Adversity Quotient and Defense mechanism i. e. Turning against object (TAO), Projection (PRO), Turning against self (TAS), Principalisation…

  1. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  2. Cytosine deletion at AP2-box region of HSP70 promoter and its ...

    Indian Academy of Sciences (India)

    of thermotolerance in cells (Leung et al. 1996). ... region of HSP70 significantly affected cellular thermotol- erance ... The double PCR-RFLP using ScrFI confirmed the occur- ... suade of HSP70 on defense of proteins related to respiration.

  3. Peptidoglycan from Fermentation By-Product Triggers Defense Responses in Grapevine

    Science.gov (United States)

    Chen, Yang; Takeda, Taito; Aoki, Yoshinao; Fujita, Keiko; Suzuki, Shunji; Igarashi, Daisuke

    2014-01-01

    Plants are constantly under attack from a variety of microorganisms, and rely on a series of complex detection and response systems to protect themselves from infection. Here, we found that a by-product of glutamate fermentation triggered defense responses in grapevine, increasing the expression of defense response genes in cultured cells, foliar chitinase activity, and resistance to infection by downy mildew in leaf explants. To identify the molecule that triggered this innate immunity, we fractionated and purified candidates extracted from Corynebacterium glutamicum, a bacterium used in the production of amino acids by fermentation. Using hydrolysis by lysozyme, a silkworm larva plasma detection system, and gel filtration analysis, we identified peptidoglycan as inducing the defense responses. Peptidoglycans of Escherichia coli, Bacillus subtilis, and Staphylococcus aureus also generated similar defensive responses. PMID:25427192

  4. Early Family Relationships Predict Children’s Emotion Regulation and Defense Mechanisms

    Directory of Open Access Journals (Sweden)

    Jallu Lindblom

    2016-12-01

    Full Text Available Early family relationships have been suggested to influence the development of children’s affect regulation, involving both emotion regulation and defense mechanisms. However, we lack research on the specific family predictors for these two forms of affect regulation, which have been conceptualized to differ in their functions and accessibility to consciousness. Accordingly, we examine how the (a quality and (b timing of family relationships during infancy predict child’s later emotion regulation and defense mechanisms. Parents (N = 703 reported autonomy and intimacy in marital and parenting relationships at the child’s ages of 2 and 12 months, and the child’s use of emotion regulation and immature and neurotic defenses at 7 to 8 years. As hypothesized, the results showed that functional early family relationships predicted children’s efficient emotion regulation, whereas dysfunctional relationships predicted reliance on defense mechanisms in middle childhood. Further, results showed a timing effect for neurotic defenses, partially confirming our hypothesis of early infancy being an especially important period for the development of defense mechanisms. The findings are discussed from the viewpoints of attachment and family dynamics, emotional self-awareness, and sense of security.

  5. 76 FR 39076 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2011-07-05

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 3 and 4, 2011. Time of Meeting...

  6. 75 FR 43496 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-07-26

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: August 10 and 11, 2010. Time of Meeting...

  7. 77 FR 62223 - Board of Visitors Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2012-10-12

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DoD. ACTION: Notice of open meeting. SUMMARY: Under the... Visitors, Defense Language Institute Foreign Language Center. Date: October 31, 2012 and November 1, 2012...

  8. Multiple Identified Neurons and Peripheral Nerves Innervating the Prothoracic Defense Glands in Stick Insects Reveal Evolutionary Conserved and Novel Elements of a Chemical Defense System

    Directory of Open Access Journals (Sweden)

    Johannes Strauß

    2017-11-01

    Full Text Available The defense glands in the dorsal prothorax are an important autapomorphic trait of stick insects (Phasmatodea. Here, we study the functional anatomy and neuronal innervation of the defense glands in Anisomorpha paromalus (Westwood, 1859 (Pseudophasmatinae, a species which sprays its defense secretions when disturbed or attacked. We use a neuroanatomical approach to identify the nerves innervating the gland muscles and the motoneurons with axons in the different nerves. The defense gland is innervated by nerves originating from two segments, the subesophageal ganglion (SOG, and the prothoracic ganglion. Axonal tracing confirms the gland innervation via the anterior subesophageal nerve, and two intersegmental nerves, the posterior subesophageal nerve, and the anterior prothoracic nerve. Axonal tracing of individual nerves reveals eight identified neuron types in the subesophageal or prothoracic ganglion. The strongest innervating nerve of the gland is the anterior subesophageal nerve, which also supplies dorsal longitudinal thorax muscles (neck muscles by separate nerve branches. Tracing of individual nerve branches reveals different sets of motoneurons innervating the defense gland (one ipsilateral and one contralateral subesophageal neuron or the neck muscle (ventral median neurons. The ipsilateral and contralateral subesophageal neurons have no homologs in related taxa like locusts and crickets, and thus evolved within stick insects with the differentiation of the defense glands. The overall innervation pattern suggests that the longitudinal gland muscles derived from dorsal longitudinal neck muscles. In sum, the innervating nerves for dorsal longitudinal muscles are conserved in stick insects, while the neuronal control system was specialized with conserved motoneurons for the persisting neck muscles, and evolutionarily novel subesophageal and prothoracic motoneurons innervating the defense gland.

  9. Mises’s Defense of Liberty: A Critique

    Directory of Open Access Journals (Sweden)

    Sean Parr

    2010-11-01

    Full Text Available What this paper attempts to demonstrate is that, in his treatise Liberalism, Mises’s defense of liberty is incomplete because his reasoning in favor of liberty for all is–not of a moral, but–exclusively of an economic kind. Without a moral justification, Mises’s defense–once the aim of productivity has been abandoned–is forced to affirm with cold indifference that a society of slaves is no better or worse than one of free men. There exists a more comprehensive defense

  10. Anorexia and Attachment: Dysregulated Defense and Pathological Mourning

    Directory of Open Access Journals (Sweden)

    elisa edelvecchio

    2014-10-01

    Full Text Available The role of Defensive exclusion (Deactivation and Segregated Systems in the development of early relationships and related to subsequent manifestations of symptoms of eating disorders was assessed using the Adult Attachment Projective Picture System (AAP. Fifty-one DSM-IV diagnosed women with anorexia participated in the study. Anorexic patients were primarily classified as dismissing or unresolved. Quantitative and qualitative analyses of defensive exclusion were carried out. Results showed potential benefits of using the AAP defense exclusion coding system, in addition to the main attachment classifications, in order to better understand the developmental issues involved in anorexia. Discussion concerned the processes, such as pathological mourning, that may underlie the associations between dismissing and unresolved attachment and anorexia. Implications for developmental research and clinical nosology are discussed.

  11. Natural enemies drive geographic variation in plant defenses

    DEFF Research Database (Denmark)

    Zuest, Tobias; Heichinger, Christian; Grossniklaus, Ueli

    2012-01-01

    Plants defend themselves against attack by natural enemies, and these defenses vary widely across populations. However, whether communities of natural enemies are a sufficiently potent force to maintain polymorphisms in defensive traits is largely unknown. Here, we exploit the genetic resources...... of Arabidopsis thaliana, coupled with 39 years of field data on aphid abundance, to (i) demonstrate that geographic patterns in a polymorphic defense locus (GS-ELONG) are strongly correlated with changes in the relative abundance of two specialist aphids; and (ii) demonstrate differential selection by the two...... aphids on GS-ELONG, using a multigeneration selection experiment. We thereby show a causal link between variation in abundance of the two specialist aphids and the geographic pattern at GS-ELONG, which highlights the potency of natural enemies as selective forces....

  12. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  13. 76 FR 23641 - Proposed Information Collection: Export Declaration of Defense Technical Data or Services

    Science.gov (United States)

    2011-04-27

    ... Defense Technical Data or Services AGENCY: Department of State. ACTION: Notice of request for public... Declaration of Defense Technical Data or Services. OMB Control Number: 1405-0157. Type of Request: Extension... of defense technical data and defense services will be electronically reported directly to the...

  14. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  15. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  16. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  17. 76 FR 21705 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-04-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... that closed meetings of the Department of Defense Wage Committee will be held on Tuesday, May 3, 2011... detailed wage data to be considered were obtained from officials of private establishments with a guarantee...

  18. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  19. INSTITUTIONAL BASIS OF MANAGEMENT AND EVALUATION OF UKRAINIAN DEFENSE LANDS

    Directory of Open Access Journals (Sweden)

    Garazhа Y.P

    2017-02-01

    Full Text Available The management and evaluation of defense land was revealed in the article. Specific institution is the military institutе in the institutional framework for defense land. A special regime and zoning, evaluation, payment and exclusion conditions were established for these lands. The market economy has changed the land-property relations in the country. Lands for defense used only in the framework that established the state. Recently there was a tendency of land release this subcategory. This has led to their misuse, belonging to other owners. The research problem consists of the setting clear boundaries of defense land and legal regulation mechanisms of land relations. Public ownership rights applies only to the defense lands. They are located only in the state ownership. The subject is the state that implements ownership (right to possess, use and dispose of the lands of Defense. It ensures the defense of the country and territory for military sites, airfields, parts, ammunition depots. Functional use of defense land is divided into public (military schools, socio-cultural (health centers, recreation centers, industrial (military and industrial objects, residential (cantonment, commercial (commissary, special (military installations, transport ( carpark, bridges, engineering (antennas, radars, storage (defense deport. The land for military unit were given for permanent use with the justification of the project design documentation sizes. The military part of the land for permanent use with the justification sizes by the project design documentation. Safety, security and other areas are created around military and other defense installations. There are restricted areas, prohibited areas. They have a special regime. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real estate. Reform of the Armed Forces of Ukraine, the State Special Transport Service leads to the release of land and real

  20. 75 FR 47797 - Board of Visitors, Defense Language Institute Foreign Language Center

    Science.gov (United States)

    2010-08-09

    ... DEPARTMENT OF DEFENSE Department of the Army Board of Visitors, Defense Language Institute Foreign Language Center AGENCY: Department of the Army, DOD. ACTION: Notice; cancellation. SUMMARY: The Board of... be held on September 13 & 14, 2010 from 8 a.m. to 5 p.m. at the Defense Language Institute Foreign...

  1. Using the Oldest Military Force for the Newest National Defense

    Directory of Open Access Journals (Sweden)

    Brian Claus

    2015-12-01

    Full Text Available The National Guard is establishing Cyber Mission Teams (CMT that will fulfill a federal role to backfill active duty defending Department of Defense networks, but are also exploring how they could effectively fulfill state missions. The President, Council of Governors, and USCYBERCOM Commander have expressed concerns about U.S. critical infrastructure cyber network vulnerabilities and the increasing magnitude of threat our adversaries pose to those networks’ security. This article explores using this emerging National Guard capability in a state role for protection of critical infrastructure cyber networks. Most of the critical infrastructure is privately owned. Although current executive orders and policy mandate government sharing of cyber threat information, private providers’ reciprocation of sharing their vulnerabilities is voluntary. This article contends that effective cyber defense requires strong private-public partnerships. We developed a critical infrastructure cyber defense model based upon key characteristics from the literature on private-public partnerships and performed a case study of current cyber defense partnerships to validate the model. Our research shows this model to be a useful guide for emerging National Guard Cyber Mission Forces to consider when establishing partnerships for effective critical infrastructure cyber defense.

  2. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  3. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  4. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  5. Data-plane Defenses against Routing Attacks on Tor

    Directory of Open Access Journals (Sweden)

    Tan Henry

    2016-10-01

    Full Text Available Tor is susceptible to traffic correlation attacks in which an adversary who observes flows entering and leaving the anonymity network can apply statistical techniques to correlate flows and de-anonymize their endpoints. While an adversary may not be naturally positioned to conduct such attacks, a recent study shows that the Internet’s control-plane can be manipulated to increase an adversary’s view of the network, and consequently, improve its ability to perform traffic correlation. This paper explores, in-depth, the effects of control-plane attacks on the security of the Tor network. Using accurate models of the live Tor network, we quantify Tor’s susceptibility to these attacks by measuring the fraction of the Tor network that is vulnerable and the advantage to the adversary of performing the attacks. We further propose defense mechanisms that protect Tor users from manipulations at the control-plane. Perhaps surprisingly, we show that by leveraging existing trust anchors in Tor, defenses deployed only in the data-plane are sufficient to detect most control-plane attacks. Our defenses do not assume the active participation of Internet Service Providers, and require only very small changes to Tor. We show that our defenses result in a more than tenfold decrease in the effectiveness of certain control-plane attacks.

  6. Jasmonate is essential for insect defense in Arabidopsis.

    Science.gov (United States)

    McConn, M; Creelman, R A; Bell, E; Mullet, J E; Browse, J

    1997-05-13

    The signaling pathways that allow plants to mount defenses against chewing insects are known to be complex. To investigate the role of jasmonate in wound signaling in Arabidopsis and to test whether parallel or redundant pathways exist for insect defense, we have studied a mutant (fad3-2 fad7-2 fad8) that is deficient in the jasmonate precursor linolenic acid. Mutant plants contained negligible levels of jasmonate and showed extremely high mortality ( approximately 80%) from attack by larvae of a common saprophagous fungal gnat, Bradysia impatiens (Diptera: Sciaridae), even though neighboring wild-type plants were largely unaffected. Application of exogenous methyl jasmonate substantially protected the mutant plants and reduced mortality to approximately 12%. These experiments precisely define the role of jasmonate as being essential for the induction of biologically effective defense in this plant-insect interaction. The transcripts of three wound-responsive genes were shown not to be induced by wounding of mutant plants but the same transcripts could be induced by application of methyl jasmonate. By contrast, measurements of transcript levels for a gene encoding glutathione S-transferase demonstrated that wound induction of this gene is independent of jasmonate synthesis. These results indicate that the mutant will be a good genetic model for testing the practical effectiveness of candidate defense genes.

  7. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  8. Ebola salience, death-thought accessibility, and worldview defense: A terror management theory perspective.

    Science.gov (United States)

    Arrowood, Robert B; Cox, Cathy R; Kersten, Michael; Routledge, Clay; Shelton, Jill Talley; Hood, Ralph W

    2017-10-01

    According to terror management theory, individuals defend their cultural beliefs following mortality salience. The current research examined whether naturally occurring instances of death (i.e., Ebola) correspond to results found in laboratory studies. The results of two experiments demonstrated that participants experienced a greater accessibility of death-related thoughts in response to an Ebola prime during a regional outbreak. Study 2 also showed that increased mortality awareness following an Ebola manipulation was associated with greater worldview defense (i.e., religious fundamentalism). Together, these results suggest that reminders of death in the form of a disease threat operate similarly to a mortality salience manipulation.

  9. Overcompensation of herbivore reproduction through hyper-suppression of plant defenses in response to competition.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Chafi, Rachid; Villarroel, Carlos A; Alba, Juan M; Schuurink, Robert C; Kant, Merijn R

    2017-06-01

    Spider mites are destructive arthropod pests on many crops. The generalist herbivorous mite Tetranychus urticae induces defenses in tomato (Solanum lycopersicum) and this constrains its fitness. By contrast, the Solanaceae-specialist Tetranychus evansi maintains a high reproductive performance by suppressing tomato defenses. Tetranychus evansi outcompetes T. urticae when infesting the same plant, but it is unknown whether this is facilitated by the defenses of the plant. We assessed the extent to which a secondary infestation by a competitor affects local plant defense responses (phytohormones and defense genes), mite gene expression and mite performance. We observed that T. evansi switches to hyper-suppression of defenses after its tomato host is also invaded by its natural competitor T. urticae. Jasmonate (JA) and salicylate (SA) defenses were suppressed more strongly, albeit only locally at the feeding site of T. evansi, upon introduction of T. urticae to the infested leaflet. The hyper-suppression of defenses coincided with increased expression of T. evansi genes coding for salivary defense-suppressing effector proteins and was paralleled by an increased reproductive performance. Together, these observations suggest that T. evansi overcompensates its reproduction through hyper-suppression of plant defenses in response to nearby competitors. We hypothesize that the competitor-induced overcompensation promotes competitive population growth of T. evansi on tomato. © 2017 The Authors. New Phytologist © 2017 New Phytologist Trust.

  10. Optimal defense resource allocation in scale-free networks

    Science.gov (United States)

    Zhang, Xuejun; Xu, Guoqiang; Xia, Yongxiang

    2018-02-01

    The robustness research of networked systems has drawn widespread attention in the past decade, and one of the central topics is to protect the network from external attacks through allocating appropriate defense resource to different nodes. In this paper, we apply a specific particle swarm optimization (PSO) algorithm to optimize the defense resource allocation in scale-free networks. Results reveal that PSO based resource allocation shows a higher robustness than other resource allocation strategies such as uniform, degree-proportional, and betweenness-proportional allocation strategies. Furthermore, we find that assigning less resource to middle-degree nodes under small-scale attack while more resource to low-degree nodes under large-scale attack is conductive to improving the network robustness. Our work provides an insight into the optimal defense resource allocation pattern in scale-free networks and is helpful for designing a more robust network.

  11. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  12. Defense-Waste-Processing Faclity, Savannah River Plant, Aiken, SC: Draft environmental impact statement

    International Nuclear Information System (INIS)

    1981-09-01

    The purpose of this Environmental Impact Statement (EIS) is to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste (HLW) currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility (DWPF) at the SRP site. The SRP is a major US Department of Energy (DOE) installation for the production of nuclear materials for national defense. Approximately 83 x 10 3 m 3 (22 million gal) of HLW currently are stored in tanks at the SRP site. The proposed DWPF would process the liquid HLW generated by SRP operations into a stable form for ultimate disposal. This EIS assesses the effects of the proposed immobilization project on land use, air quality, water quality, ecological systems, health risk, cultural resources, endangered species, wetlands protection, resource depletion, and regional social and economic systems. The radiological and nonradiological risks of transporting the immobilized wastes are assessed. The environmental impacts of disposal alternatives have recently been evaluated in a previous EIS and are therefore only summarized in this EIS

  13. Defense Waste Processing Facility: Savannah River Plant, Aiken, SC. Final environmental impact statement

    International Nuclear Information System (INIS)

    1982-02-01

    The purpose of this Environmental Impact Statement (EIS) is to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste (HLW) currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility (DWPF) at the SRP site. The SRP is a major US Department of Envgy (DOE) installation for the production of nuclear materials for national defense. Approximately 83 x 10 3 m 3 (22 million gal) of HLW currently are stored in tanks at the SRP site. The proposed DWPF would process the liquid HLW generated by SRP operations into a stable form for ultimate disposal. This EIS assesses the effects of the proposed immobilization project on land use, air quality, water quality, ecological systems, health risk, cultural resources, endangered species, wetlands protection, resource depletion, and regional social and economic systems. The radiological and nonradiological risks of transporting the immobilized wastes are assessed. The environmental impacts of disposal alternatives have recently been evaluated in a previous EIS and are therefore only summarized in this EIS

  14. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  15. How to optimize joint theater ballistic missile defense

    OpenAIRE

    Diehl, Douglas D.

    2004-01-01

    Approved for public release, distribution is unlimited Many potential adversaries seek, or already have theater ballistic missiles capable of threatening targets of interest to the United States. The U.S. Missile Defense Agency and armed forces are developing and fielding missile interceptors carried by many different platforms, including ships, aircraft, and ground units. Given some exigent threat, the U.S. must decide where to position defensive platforms and how they should engage poten...

  16. Decline of Civilian power in Japan's Defense Policy

    OpenAIRE

    SEBATA, TAKAO; 瀬端, 孝夫

    2006-01-01

    Over the last thirty years, military official of Japan's Self-Defense Forces (SDF) have begun voicing their opinions more aggressively, exerting influence and power in such areas as: the right of personnel management, budget formulation, organization, and defense policy decision-making. Due to the enhanced status of military officials, change of power balance between civilians and military is taking place. This paper examines civil-military relations in the above areas and discusses how this ...

  17. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  18. Science and defense 2003: the future on-board energies; Science et defense 2003: les futures energies embarquees

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-07-01

    Since 1983, the DGA (delegation of armament) organizes the colloquium ''Science and defense'' in the domains of the scientific research and the defense. The 2003 colloquium took place in Paris on December 2 and 3 and concerns the future portable energies. This paper is a summary presentation of the presented topics: the needs and the developments for the portable energies, the state of the art of the mini and micro energy sources and their limitations, the energy materials which strongly provide energy by chemical transformation, the new energy sources of medium power, the environmental impacts. The budget devoted to these researches in 2002 by the DGA, are also presented. (A.L.B.)

  19. Optimizing time and resource allocation trade-offs for investment into morphological and behavioral defense

    DEFF Research Database (Denmark)

    Steiner, Uli; Pfeiffer, Thomas

    2007-01-01

    pronounced at intermediate environmental conditions. Optimizing single traits generally leads to a more pronounced response of the defense traits, which implies that studying single traits leads to an overestimation of their response to predation. Behavioral defense and morphological defense compensate......Prey organisms are confronted with time and resource allocation trade-offs. Time allocation trade-offs partition time, for example, between foraging effort to acquire resources and behavioral defense. Resource allocation trade-offs partition the acquired resources between multiple traits...... for and augment each other depending on predator densities and the effectiveness of the defense mechanisms. In the presence of time constraints, the model shows peak investment into morphological and behavioral defense at intermediate resource levels....

  20. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  1. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  2. 75 FR 54524 - Defense Federal Acquisition Regulation Supplement; Acquisition Strategies To Ensure Competition...

    Science.gov (United States)

    2010-09-08

    ...., because the changes are to internal Government organization and operating procedures only. The rule... 48 CFR Part 207 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations... Life Cycle of Major Defense Acquisition Programs (DFARS Case 2009-D014) AGENCY: Defense Acquisition...

  3. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  4. Amelioration of cognitive, motor and endogenous defense functions with silymarin, piracetam and protocatechuic acid in the cerebral global ischemic rat model.

    Science.gov (United States)

    Muley, Milind M; Thakare, Vishnu N; Patil, Rajesh R; Bafna, Pallavi A; Naik, Suresh R

    2013-07-19

    The neuroprotective activities of silymarin, piracetam and protocatechuic acid ethyl ester (PCA) on cerebral global ischemic/reperfusion were evaluated in a rat model. A midline ventral incision was made in the throat region. The right and left common carotid arteries were located and a bilateral common carotid artery occlusion (BCCAO) was performed for 30min using atraumatic clamps followed by a 24h period of reperfusion. Neurological/behavioral functions (cognitive and motor), endogenous defense systems (lipid peroxidation, glutathione, catalase, and superoxide dismutase), reduced water content and infarct size and histopathological alterations were then studied. Silymarin and PCA treatments significantly improved cognitive, motor and endogenous defense functions, histopathological alterations, and, reduced both water content and infarct size compared to the vehicle-treated ischemic control group. Piracetam treatment improved neurological and histopathological alterations, reduced water content and infarct size, but failed to restore/prevent the impaired endogenous defense functions significantly. Silymarin showed better neuroprotection than piracetam and PCA in experimentally induced global ischemic/reperfusion and was able to facilitate mnemonic performance. Copyright © 2013 Elsevier Inc. All rights reserved.

  5. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  6. Nevada test site defense waste acceptance criteria, certification, and transfer requirements

    International Nuclear Information System (INIS)

    1988-10-01

    The Nevada Test Site (NTS) Defense Waste Acceptance Criteria, Certification and Transfer Requirements establishes procedures and criteria for safe transfer, disposal, and storage of defense transuranic, low-level, and mixed waste at the NTS. Included are an overview of the NTS defense waste management program; the NTS waste acceptance criteria for transuranic, low-level, and mixed wastes; waste certification requirements and guidance; application to submit waste; and requirements for waste transfer and receipt. 5 figs., 16 tabs

  7. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  8. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  9. Colors and Some Morphological Traits as Defensive Mechanisms in Anurans

    Directory of Open Access Journals (Sweden)

    Luís Felipe Toledo

    2009-01-01

    Full Text Available Anurans may be brightly colored or completely cryptic. Generally, in the former situation, we are dealing with aposematism, and the latter is an example of camouflage. However, these are only simple views of what such colorations really mean and which defensive strategy is implied. For instance, a brightly colored frog may be part of a mimicry ring, which could be either Batesian, Müllerian, or Browerian. These are only examples of the diversity of color-usage systems as defensive strategies. Unfortunately, reports on the use of colors as defensive mechanisms are widespread in the available literature, and the possible functions are rarely mentioned. Therefore, we reviewed the literature and added new data to this subject. Then, we the use of colors (as defensive mechanism into categories. Mimicry was divided into the subcategories camouflage, homotypy, and nondeceitful homotypy, and these groups were also subcategorized. Dissuasive coloration was divided into behavioral display of colors, polymorphism, and polyphenism. Aposematism was treated apart, but aposematic colorations may be present in other defensive strategies. Finally, we propose functions and forms of evolution for some color systems in post-metamorphic anurans and hope that this review can be the basis for future research, even on other animal groups.

  10. Study of flood defense structural measures priorities using Compromise Programming technique

    Science.gov (United States)

    Lim, D.; Jeong, S.

    2017-12-01

    Recent climate change of global warming has led to the frequent occurrence of heavy regional rainfalls. As such, inundation vulnerability increases in urban areas with high population density due to the low runoff carrying capacity. This study selects a sample area (Janghang-eup, the Republic of Korea), which is one of the most vulnerable areas to flooding, analyzing the urban flood runoff model (XP-SWMM) and using the MCDM (Multi-Criteria Decision Making) technique to establish flood protection structural measures. To this end, we compare the alternatives and choose the optimal flood defense measure: our model is utilized with three flood prevention structural measures; (i) drainage pipe construction; (ii) water detention; and (iii) flood pumping station. Dividing the target area into three small basins, we propose flood evaluations for an inundation decrease by studying the flooded area, the maximum inundation depth, the damaged residential area, and the construction cost. In addition, Compromise Programming determines the priority of the alternatives. As a consequent, this study suggests flood pumping station for Zone 1 and drainage pipe construction for Zone 2 and Zone 3, respectively, as the optimal flood defense alternative. Keywords : MCDM; Compromise Programming; Urban Flood Prevention; This research was supported by a grant [MPSS-DP-2013-62] through the Disaster and Safety Management Institute funded by Ministry of Public Safety and Security of Korean government.

  11. Reducing Defensive Responses to Thoughts of Death: Meditation, Mindfulness, and Buddhism.

    Science.gov (United States)

    Park, Young Chin; Pyszczynski, Tom

    2017-08-24

    Three studies investigated the effects of meditation on responses to reminders of death. Study 1 took a quasi-experimental approach, comparing defensive responses to mortality salience (MS) of South Korean participants with varying levels of experience with Buddhism and meditation. Whereas non-Buddhists without meditation showed the typical increase in worldview defense after mortality salience (MS), this effect was not found among non-Buddhists immediately after an initial meditation experience, nor among lay Buddhists who meditated regularly or Buddhist monks with intensive meditation experience. Study 2, a fully randomized experiment, showed that MS increased worldview defense among South Koreans at a meditation training who were assessed before meditating but not among participants assessed after their first meditation experience. Study 3 showed that whereas American students without prior meditation experience showed increased worldview defense and suppression of death-related thoughts after MS, these effects were eliminated immediately after an initial meditation experience. Death thought accessibility mediated the effect of MS on worldview defense without meditation, but meditation eliminated this mediation. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  13. Copper Contamination Impairs Herbivore Initiation of Seaweed Inducible Defenses and Decreases Their Effectiveness.

    Directory of Open Access Journals (Sweden)

    Alexandria M Warneke

    Full Text Available Seaweed-herbivore interactions are often mediated by environmental conditions, yet the roles of emerging anthropogenic stressors on these interactions are poorly understood. For example, chemical contaminants have unknown consequences on seaweed inducible resistance and herbivore response to these defenses despite known deleterious effects of contaminants on animal inducible defenses. Here, we investigated the effect of copper contamination on the interactions between a snail herbivore and a brown seaweed that displays inducible resistance to grazing. We examined seaweed inducible resistance and its effectiveness for organisms exposed to copper at two time points, either during induction or after herbivores had already induced seaweed defenses. Under ambient conditions, non-grazed tissues were more palatable than grazed tissues. However, copper additions negated the preference for non-grazed tissues regardless of the timing of copper exposure, suggesting that copper decreased both how herbivores initiated these inducible defenses and their subsequent effectiveness. Copper decreased stimulation of defenses, at least in part, by suppressing snail grazing pressure-the cue that turns inducible defenses on. Copper decreased effectiveness of defenses by preventing snails from preferentially consuming non-grazed seaweed. Thus, contaminants can potentially stress communities by changing seaweed-herbivore interactions mediated via inducible defenses. Given the ubiquity of seaweed inducible resistance and their potential influence on herbivores, we hypothesize that copper contamination may change the impact of these resistant traits on herbivores.

  14. Evaluating Work-Life Balance in the Department of Defense

    Science.gov (United States)

    2011-04-18

    Evaluating Work - Life Balance in the Department of Defense Erin A. Moeser Defense Equal Opportunity Management Institute (DEOMI) Kizzy M. Parks...for service members’ family lives may increase satisfaction with work - life balance . Examples of family-friendly organizational policies include...1,500 active duty military personnel were surveyed on the value of work / life balance initiates. More specifically, this study assessed respondents

  15. Outsourcing of Defense Supply Center, Columbus, Bus and Taxi Service Operations

    National Research Council Canada - National Science Library

    Granetto, Paul

    1999-01-01

    Introduction. We performed the audit in response to allegations to the Defense Hotline that the Defense Supply Center, Columbus, outsourcing study for bus and taxi service operations was based on incorrect methodology...

  16. 77 FR 52700 - Reestablishment of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-08-30

    ...), the Department of Defense gives notice that it is reestablishing the charter for the Board of Visitors... advice and recommendations on the overall management and governance of the National Defense University in...

  17. Review of the Book “Defense Mechanisms. Coping Strategies. Self-Regulation”

    Directory of Open Access Journals (Sweden)

    Stoil Mavrodiev

    2012-10-01

    Full Text Available This book deals with coping strategies and defense mechanisms as two kinds of self-regulation of human behaviour. The defense mechanisms are described with some examples of fiction books.

  18. Recent advances in computational intelligence in defense and security

    CERN Document Server

    Falcon, Rafael; Zincir-Heywood, Nur; Abbass, Hussein

    2016-01-01

    This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.

  19. Genome Defense Mechanisms in Neurospora and Associated Specialized Proteins

    Directory of Open Access Journals (Sweden)

    Ranjan Tamuli

    2010-06-01

    Full Text Available Neurospora crassa, the filamentous fungus possesses widest array of genome defense mechanisms known to any eukaryotic organism, including a process called repeat-induced point mutation (RIP. RIP is a genome defense mechanism that hypermutates repetitive DNA sequences; analogous to genomic imprinting in mammals. As an impact of RIP, Neurospora possesses many fewer genes in multigene families than expected. A DNA methyltransferase homologue, RID was shown to be essential for RIP. Recently, a variant catalytic subunit of translesion DNA polymerase zeta (Pol zeta has been found to be essential for dominant RIP suppressor phenotype. Meiotic silencing and quelling are two other genome defense mechanisms in Neurospora, and proteins required for these two processes have been identified through genetic screens.

  20. Mental incapacity defenses at the War Crimes Tribunal: questions and controversy.

    Science.gov (United States)

    Sparr, Landy F

    2005-01-01

    Following a report from the Secretary General in May 1993, the United Nations Security Council adopted Resolution 827 and its Statute establishing an International War Crimes Tribunal for the Former Yugoslavia (ICTY) located in The Hague, The Netherlands. Although such action has been discussed in the past, this is the first time the international community has established a tribunal to indict and try individuals for war crimes. The crimes had been previously "created" by multilateral international treaties. The ICTY Rules of Procedure and Evidence allowed for "any special defense, including that of diminished or lack of mental responsibility." Precise legal parameters of the defense were not specified. In 1998, a defendant at the ICTY "Celebici" Trial named Esad Landzo raised the defense of diminished mental responsibility. The Celebici Trial Chamber thus became the first legal body to consider reduced mental capacity as it applies to international criminal law. This article is an examination of the application of the affirmative defense of diminished responsibility at the ICTY and relates the process to the need for further definition of mental incapacity defenses at the newly established International Criminal Court (ICC). At the ICC preparatory commission, drafting material elements of crimes was emphasized, with less consideration given to mental elements. That diminished capacity and diminished-responsibility defenses have often confused scholars and practitioners alike is explored in this article with suggestions for further directions.

  1. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... and what emerging science and technology would have the greatest intelligence potential in this type... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Counter... Defense (DoD). ACTION: Notice of advisory committee meetings. SUMMARY: The Defense Science Board Task...

  2. 76 FR 18193 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2011-04-01

    ... out his responsibility to conduct the business of the Uniformed Services University of the Health... shall be appointed from civilian life by the Secretary of Defense; b. The Secretary of Defense, or his...

  3. Central importance of immunoglobulin A in host defense against Giardia spp.

    Science.gov (United States)

    Langford, T Dianne; Housley, Michael P; Boes, Marianne; Chen, Jianzhu; Kagnoff, Martin F; Gillin, Frances D; Eckmann, Lars

    2002-01-01

    The protozoan pathogen Giardia is an important cause of parasitic diarrheal disease worldwide. It colonizes the lumen of the small intestine, suggesting that effective host defenses must act luminally. Immunoglobulin A (IgA) antibodies are presumed to be important for controlling Giardia infection, but direct evidence for this function is lacking. B-cell-independent effector mechanisms also exist and may be equally important for antigiardial host defense. To determine the importance of the immunoglobulin isotypes that are transported into the intestinal lumen, IgA and IgM, for antigiardial host defense, we infected gene-targeted mice lacking IgA-expressing B-cells, IgM-secreting B-cells, or all B-cells as controls with Giardia muris or Giardia lamblia GS/M-83-H7. We found that IgA-deficient mice could not eradicate either G. muris or G. lamblia infection, demonstrating that IgA is required for their clearance. Furthermore, although neither B-cell-deficient nor IgA-deficient mice could clear G. muris infections, IgA-deficient mice controlled infection significantly better than B-cell-deficient mice, suggesting the existence of B-cell-dependent but IgA-independent antigiardial defenses. In contrast, mice deficient for secreted IgM antibodies cleared G. muris infection normally, indicating that they have no unique functions in antigiardial host defense. These data, together with the finding that B-cell-deficient mice have some, albeit limited, residual capacity to control G. muris infection, show that IgA-dependent host defenses are central for eradicating Giardia spp. Moreover, B-cell-dependent but IgA-independent and B-cell-independent antigiardial host defenses exist but are less important for controlling infection.

  4. In defense of commitment: The curative power of violated expectations.

    Science.gov (United States)

    Murray, Sandra L; Lamarche, Veronica M; Gomillion, Sarah; Seery, Mark D; Kondrak, Cheryl

    2017-11-01

    A new model of commitment defense in romantic relationships is proposed. It assumes that relationships afford a central resource for affirming meaning and purpose in the world. Consequently, violating expectations about the world outside the relationship can precipitate commitment defense inside the relationship. A meta-analysis of 5 experiments, 2 follow-up correlational studies, and a longitudinal study of the transition to first parenthood supported the model. Experimentally violating conventional expectations about the world (e.g., "hard work pays off") motivated less satisfied people to defensively affirm their commitment. Similarly, when becoming a parent naturalistically violated culturally conditioned gendered expectations about the division of household labor, less satisfied new mothers and fathers defensively affirmed their commitment from pre-to-post baby. The findings suggest that violating expected associations in the world outside the relationship motivates vulnerable people to set relationship their relationship right, thereby affirming expected associations in the relationship in the face of an unexpected world. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  6. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  7. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  8. Spatiotemporal heterogeneity of tomato induced defense responses affects spider mite performance and behavior.

    Science.gov (United States)

    Schimmel, Bernardus C J; Ataide, Livia M S; Kant, Merijn R

    2017-10-03

    When feeding from tomato (Solanum lycopersicum), the generalist spider mite Tetranychus urticae induces jasmonate (JA)- and salicylate (SA)-regulated defense responses that hamper its performance. The related T. evansi, a Solanaceae-specialist, suppresses these defenses, thereby upholding a high performance. On a shared leaf, T. urticae can be facilitated by T. evansi, likely via suppression of defenses by the latter. Yet, when infesting the same plant, T. evansi outcompetes T. urticae. Recently, we found that T. evansi intensifies suppression of defenses locally, i.e., at its feeding site, after T. urticae mites were introduced onto adjacent leaf tissue. This hyper-suppression is paralleled by an increased oviposition rate of T. evansi, probably promoting its competitive population growth. Here we present additional data that not only provide insight into the spatiotemporal dynamics of defense induction and suppression by mites, but that also suggest T. evansi to manipulate more than JA and SA defenses alone.

  9. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  10. Strategy alternatives for homeland air and cruise missile defense.

    Science.gov (United States)

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  11. Defenses to malpractice: what every emergency physician should know.

    Science.gov (United States)

    Hudson, Michael Jason; Moore, Gregory P

    2011-12-01

    Emergency medicine is a high-risk specialty that carries a constant risk of malpractice litigation. Fear of malpractice litigation can lead to less-than-optimal patient care as well as impairments in physician quality of life. Although malpractice fear can be ubiquitous among emergency physicians, most receive little to no education on malpractice. Medical malpractice requires that 1) The physician had a duty, 2) The physician breached the duty, 3) There was harm to the patient, and 4) The harm was caused by the physician's breach of duty. Even if all four medical malpractice conditions are met, there are still special legal defenses that have been and can be used in court to exonerate the physician. These defenses include assumption of the risk, Good Samaritan, contributory negligence, comparative fault, sudden emergency, respectable minority, two schools of thought, and clinical innovation. These legal defenses are illustrated and explained using defining precedent cases as well as hypothetical examples that are directly applicable to emergency medical practice. Knowledge of these special legal defenses can help emergency physicians minimize their risk of litigation when caring for patients. Published by Elsevier Inc.

  12. Integration of long-range planning for management of defense transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; McFadden, M.H.; Raudenbush, M.H.; Smith, L.J.

    1984-01-01

    As described in The Defense Waste Management Plan, the defense TRU program goal is to achieve permanent disposal and to end interim storage. TRU waste is currently stored at six Department of Energy (DOE) sites, and new waste is generated at several more sites. The Waste Isolation Pilot Plant (WIPP) project is well defined, and it has been necessary to integrate the activities of other parts of the TRU program in support of DOE Headquarters policy and the WIPP schedules and technical requirements. The strategy is described in the Defense Transuranic Waste Program Strategy Document. More detailed, quantitative plans have been developed through the use of several system models, with a Long-Range Master Plan for Defense Transuranic Waste Management as the focal point for coordination of proposed plans with all the parties involved

  13. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  14. A Comparative Assessment of Knowledge Management Leadership Approaches within the Department of Defense

    Science.gov (United States)

    2007-03-01

    A COMPARATIVE ASSESSMENT OF KNOWLEDGE MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE... MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE THESIS Presented to the Faculty Department of Systems and Engineering...KNOWLEDGE MANAGEMENT LEADERSHIP APPROACHES WITHIN THE DEPARTMENT OF DEFENSE Tommy V. S. Marshall II, BS Captain, USAF Approved

  15. The levels of psychological functioning of personality and the mechanisms of defense

    OpenAIRE

    Benítez Camacho, Erika; Chávez-León, Enrique; Ontiveros Uribe, Martha Patricia; Yunes Jiménez, Arlette; Náfate López, Omar

    2010-01-01

    Otto Kernberg states three types of personality organizations, also named psychological functional levels. They reflect the patient's predominant psychological characteristics: identity integration grade, defense mechanisms, and reality test. In mental disorders, the predominant defensive influences significantly in the severity and evolution of the suffering. Objectives The objective of the actual study was to determine the usage of defense mechanisms by patients with some mental disorder, g...

  16. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  17. Using the Defensive Style Questionnaire to evaluate the impact of sex reassignment surgery on defensive mechanisms in transsexual patients Aplicação do Defensive Style Questionnaire para avaliar o impacto da cirurgia de redesignação sexual nos mecanismos de defesa de pacientes transexuais

    Directory of Open Access Journals (Sweden)

    Maria Inês Lobato

    2009-12-01

    Full Text Available Objective: To evaluate the impact of sex reassignment surgery on the defense mechanisms of 32 transsexual patients at two different points in time using the Defensive Style Questionnaire. Method: The Defensive Style Questionnaire was applied to 32 patients upon their admission to the Gender Identity Disorder Program, and 12 months after they had undergone sex reassignment surgery. Results: There were changes in two defense mechanisms: anticipation and idealization. However, no significant differences were observed in terms of the mature, neurotic and immature categories. Discussion: One possible explanation for this result is the fact that the procedure does not resolve gender dysphoria, which is a core symptom in such patients. Another aspect is related to the early onset of the gender identity disorder, which determines a more regressive defensive structure in these patients. Conclusion: Sex reassignment surgery did not improve the defensive profile as measured by the Defensive Style Questionnaire.Objetivo: Avaliar o efeito da cirurgia de redesignação sexual nos mecanismos de defesa de 32 pacientes transexuais em dois momentos do estudo usando o Defensive Style Questionnaire. Método: O Defensive Style Questionnaire foi aplicado a 32 pacientes quando ingressaram no Programa de Transtorno de Identidade de Gênero e 12 meses após a cirurgia de redesignação sexual. Resultados: Houve modificações em dois mecanismos de defesa: antecipação e idealização; porém, sem mudanças significativas nos fatores maduro, neurótico e imaturo. Discussão: Uma possibilidade para esse resultado é o fato de a intervenção cirúrgica não resolver a disforia de gênero (principal sintoma desses pacientes. Outro aspecto está relacionado com o fato de o transtorno de identidade de gênero ser instalado precocemente, o que determina uma estrutura defensiva mais regressiva para esses pacientes. Conclusão: A cirurgia de redesignação sexual não foi

  18. Implementing Set Based Design into Department of Defense Acquisition

    Science.gov (United States)

    2016-12-01

    The team employed a tailored waterfall process model in order to explore SBD applications in the support of defense acquisition and PORs. Figure 1...Engineering Model . Additionally, the team reviewed DOD case studies that implemented SBD. The SBD principles, along with the common themes from the...acquisition. 14. SUBJECT TERMS set based design, set based thinking, model based systems engineering, concurrent engineering, defense acquisition

  19. Contribution to the improvement of management in defense logistics

    OpenAIRE

    LJUBOJEVIC SRDJAN D.; ANDREJIC MARKO D.; DRAGOVIC NEBOJSA K.

    2013-01-01

    Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with inter...

  20. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  1. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  2. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  3. Induction of phenolics, lignin and key defense enzymes in eggplant ...

    African Journals Online (AJOL)

    Elicitors are capable of mimicking the perception of a pathogen by a plant, thereby triggering induction of a sophisticated defense response in plants. In this study, we investigated an induced resistance in eggplant in respect to cell wall strengthening and defense enzyme activation affected by four elicitors such as, chitosan ...

  4. U.S. Department of Energy defense waste management program implementation plan

    International Nuclear Information System (INIS)

    Jordan, E.A.

    1988-01-01

    The Program Implementation Plan describes the Department of Energy's current approach to managing its defense high-level, low-level, and transuranic radioactive waste. It documents implementation of the policies described in the 1983 Defense Waste Management Plan

  5. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  6. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  7. Psychological masochism: A systematic review of the literature on conflicts, defenses, and motives.

    Science.gov (United States)

    Békés, Vera; Perry, J Christopher; Robertson, Brian M

    2018-05-01

    Our aim was to conduct a systematic review of the literature on psychological masochism to identify hypotheses for examination in clinical studies. We identified defenses, conflicts, and motives using standardized measures in 23 psychoanalytic papers. Three primary and three secondary subtypes of masochism emerged in the literature. Overall Gratification Inhibition (subtype I.1) was the "healthiest" form, associated with higher developmental level motives and neurotic defenses. The Global Conflict (I.2) was the least healthy form of masochism, consistent with personality disorder. It was associated with early developmental level motives and immature defenses, including depressive defenses, often associated with depression. Dominant Other (I.3) represented masochistic attachment problems, associated with early developmental level motives, object-related, image-distorting defenses, and narcissism. Of the secondary types, Separation-Abandonment (II.1) reflected object-related defenses, and separation-related motives. Rejection of Others (II.2) represented a sadistic-narcissistic form, associated with image-distorting and disavowal defenses, with both early and later developmental level motives. Finally, Sexual Pleasure vs. Guilt (II.3) was associated with autistic fantasy, and both early and later developmental level motives, suggesting a distinct traumatic origin and representing the juncture of sexual and psychological masochism. Analysts described six distinguishable types of masochism. Future studies should examine their validity.

  8. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  9. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  10. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  11. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  12. Evaluation of health and safety impacts of defense high-level waste in geologic repositories

    International Nuclear Information System (INIS)

    Smith, E.D.; Kocher, D.C.; Witherspoon, J.P.

    1985-02-01

    Pursuant to the requirement of the Nuclear Waste Policy Act of 1982 that the President evaluate the use of commercial high-level waste repositories for the disposal of defense high-level wastes, a comparative assessment has been performed of the potential health and safety impacts of disposal of defense wastes in commercial or defense-only repositories. Simplified models were used to make quantitative estimates of both long- and short-term health and safety impacts of several options for defense high-level waste disposal. The results indicate that potential health and safety impacts are not likely to vary significantly among the different disposal options for defense wastes. Estimated long-term health and safety impacts from all defense-waste disposal options are somewhat less than those from commercial waste disposal, while short-term health and safety impacts appear to be insensitive to the differences between defense and commercial wastes. In all cases, potential health and safety impacts are small because of the need to meet stringent standards promulgated by the US Environmental Protection Agency and the US Nuclear Regulatory Commission. We conclude that health and safety impacts should not be a significant factor in the choice of a disposal option for defense high-level wastes. 20 references, 14 tables

  13. Endogenous egg immune defenses in the yellow mealworm beetle (Tenebrio molitor).

    Science.gov (United States)

    Jacobs, Chris G C; Gallagher, Joe D; Evison, Sophie E F; Heckel, David G; Vilcinskas, Andreas; Vogel, Heiko

    2017-05-01

    In order to survive microbe encounters, insects rely on both physical barriers as well as local and systemic immune responses. Most research focusses on adult or larval defenses however, whereas insect eggs are also in need of protection. Lately, the defense of eggs against microbes has received an increasing amount of attention, be it through endogenous egg defenses, trans-generational immune priming (TGIP) or parental investment. Here we studied the endogenous immune response in eggs and adults of Tenebrio molitor. We show that many immune genes are induced in both adults and eggs. Furthermore, we show that eggs reach comparable levels of immune gene expression as adults. These findings show that the eggs of Tenebrio are capable of an impressive endogenous immune response, and indicate that such inducible egg defenses are likely common in insects. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  15. Cost and price auditing: effectiveness in the procurement of defense services in Spain

    Directory of Open Access Journals (Sweden)

    José Aguado Romero

    Full Text Available Abstract Contract auditing, or cost and price auditing, has been applied in Spain as a means of determining prices in non-competitive defense contracts since 1989. Factors such as Spain's participation in international defense organizations, the characteristics of the defense market and the contractual legal framework for the procurement of defense goods and services help underscore the need for the Spanish Ministry of Defense to implement cost and price auditing. With the evolution of cost and price auditing in Spain in mind, this paper analyses the entire process, describes the audit procedures that are most commonly used today and assesses the main results achieved, in terms of financial savings. The results obtained show that cost and price auditing does indeed contribute to a more efficient use of public resources.

  16. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  17. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  18. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  19. 76 FR 43674 - Renewal of Department of Defense Federal Advisory Committee

    Science.gov (United States)

    2011-07-21

    ... Defense (Comptroller)/Chief Financial Officer shall select the Committee's Chairperson from the membership... Financial Officer, independent advice and recommendations on DoD financial management, to include financial... with relevant laws and regulations. The Under Secretary of Defense (Comptroller)/Chief Financial...

  20. 78 FR 63462 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement...

    Science.gov (United States)

    2013-10-24

    ... Relating to Organizational Conflict of Interest-Major Defense Acquisition Program; OMB Control Number 0704...] Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Organizational Conflict... submit comments, identified by OMB Control Number 0704-0477, using any of the following methods: [cir...