WorldWideScience

Sample records for rdeims regional defense

  1. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  2. Regional Employment Growth and Defense Spending.

    Science.gov (United States)

    1987-12-01

    important part of regional growth. UI ACCA 9o1n For ’NDis i - Dljt s i-: . TABLE OF CONTENTS I. INTRODUCTION .. .. .. .... ..... .... .... .... ..... .. 7...Mideast and Great Lakes, all show spending to taxation ratios of less than one on a per capita basis, yet the Southwest and Rocky Mountain states have...because businesses look beyond the obvious nominal rate and locate according to effective rates of taxation , ie. actual tax liability. In addition, tax

  3. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  4. Defense Spending Databases for Countries in the Asia-Pacific Region: An Analysis and Comparison

    National Research Council Canada - National Science Library

    Reuning, Charles

    2001-01-01

    The purpose of this research was to identify and analyze a select number of unclassified databases that cover defense spending and other defense related criteria for countries in the Asia-Pacific region...

  5. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    The absence of a formidable U.S. and allied Theater Missile Defense (TMD) capability in the East Asian region has encouraged a build-up in offensive missile capability on the part of the People's Republic of China (PRC...

  6. China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact

    Science.gov (United States)

    2013-12-23

    early Chinese legal culture ” Karen Turner “War, Punishment, and The Law of Nature in Early Chinese Concepts of The State”, Harvard Journal of Asiatic...lack of strategic direction, moral relativism , a failure to gauge the significance of what is at stake, and distraction with events in other regions of...WORKING PAPER 1 posted 23 December 2013 CHINA’S AIR DEFENSE IDENTIFICATION ZONE: CONCEPT , ISSUES AT STAKE AND REGIONAL IMPACT

  7. Transcripts of Regional Hearings, St. Louis, Missouri. Annex L to Adjusting to the Drawdown. Report of the Defense Conversion Commission

    Science.gov (United States)

    1992-08-01

    entrepreneurship courses for laid-off McDonnell Douglas employees. Over 500 have participated in the classes. • McDonnell Douglas donated its lease-hold...international programs and organizations • Analysis of regional financing programs The St. Louis World Trade Center franchise was acquired for the region...averaged over the 1970’s, the defense cutbacks are likely contribute only a small part of that objective. 2 38 7 Figure 5.3 REAL GDP BASE VS

  8. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    Science.gov (United States)

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  9. Final Report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas

    Science.gov (United States)

    1990-09-18

    This is our final report on the Audit of the Administration of the Contract Closeout Process at the Defense Contract Management Region, Dallas (DCMR... audit was made from January to October 1989. The objectives of the audit were to determine the timeliness of the contract closeout process, the validity...As part of the audit , we also evaluated internal controls over the contract closeout process. As of December 31, 1988, the Contract Administration

  10. The economic substantiation for creating defense "support zone" of the Arctic region of Russia

    Directory of Open Access Journals (Sweden)

    Bryzgalova A. E.

    2016-06-01

    Full Text Available The paper considers the theoretical foundations of the transition from "continuous" development of the Russian territories of the Far North that proved to be ineffective to the "focal" development based on the concentration of resources within the anchor sectors of the regional economy. The defensive specialisation of the Kola "bearing point" which is a part of the system of eight "bearing zones" located respectively in each of the Arctic regions of Russia is being proved. The value of communication networks in ensuring the effective functioning of naval Arctic closed cities as a core of the defense "bearing point" is discussed from the standpoint of the new economic geography. Рассмотрены теоретические основы перехода от доказавшего свою неэффективность "непрерывного" развития территорий Крайнего Севера России к "очаговому" развитию, основанному на концентрации ресурсов в пределах якорных секторов регионального хозяйства. Доказан оборонный профиль Кольской "опорной точки", входящей в систему восьми "опорных зон", локализованных соответственно в каждом арктическом субъекте Российской Федерации. С позиций новой экономической географии обосновано значение коммуникационной сети для обеспечения эффективного функционирования военно-морских арктических закрытых административно-территориальных образований, выступающих ядром "опорной точки" оборонного значения

  11. Evaluating the Impact of the Department of Defense Regional Centers for Security Studies

    Science.gov (United States)

    2014-01-01

    Kazakstan, Moldova, Montenegro $542,000 total 11% O&M; 89% other Media: weapon or tool 50 Garmisch, Germany $99,000 O&M nAtO Smart Defense (2...events) 70 total Bosnia, Montenegro $74,000 total Other nESA Yemen national Security Seminar 40 Yemen $450,000 Other pakistani Military Confidence...mandate. It included commentary on all aspects of APCSS’s operations, including physical plant , library usage, stu- dent selection, alumni outreach

  12. Socioeconomic assessment of defense waste processing facility impacts in the Savannah River Plant region

    Energy Technology Data Exchange (ETDEWEB)

    Peelle, E.; Reed, J.H.; Stevenson, R.H.

    1981-09-01

    The DWPF will immobilize highly radioactive defense wastes for storage on site until shipment to an approved federal repository for radioactive wastes. This document assesses the socioeconomic impacts of constructing and operating the proposed facility and presents the assessment methodology. Because various schedules and various ways of staging the construction of the DWPF are considered and because in some of these instances a large nearby construction project (the Vogtle Nuclear Power Station) may influence the socioeconomic impacts, four scenarios involving different facility options and schedules are assessed. In general, the impacts were found not to be large. In the scenario where the socioeconomic effects were the greatest, it was found that there are likely to be some impacts on schools in Barnwell County as well as a shortage of mobile homes in that county. Aiken, Allendale, and Bamberg counties are also likely to experience slight-to-moderate housing shortages. Minor impacts are anticipated for fire and police services, roads, traffic, and land use. There will be noticeable economic impact from the project. Other scenarios had fewer socioeconomic impacts.

  13. Socioeconomic assessment of defense waste processing facility impacts in the Savannah River Plant region

    International Nuclear Information System (INIS)

    Peelle, E.; Reed, J.H.; Stevenson, R.H.

    1981-09-01

    The DWPF will immobilize highly radioactive defense wastes for storage on site until shipment to an approved federal repository for radioactive wastes. This document assesses the socioeconomic impacts of constructing and operating the proposed facility and presents the assessment methodology. Because various schedules and various ways of staging the construction of the DWPF are considered and because in some of these instances a large nearby construction project (the Vogtle Nuclear Power Station) may influence the socioeconomic impacts, four scenarios involving different facility options and schedules are assessed. In general, the impacts were found not to be large. In the scenario where the socioeconomic effects were the greatest, it was found that there are likely to be some impacts on schools in Barnwell County as well as a shortage of mobile homes in that county. Aiken, Allendale, and Bamberg counties are also likely to experience slight-to-moderate housing shortages. Minor impacts are anticipated for fire and police services, roads, traffic, and land use. There will be noticeable economic impact from the project. Other scenarios had fewer socioeconomic impacts

  14. Internal Controls over the Department of Defense Transit Subsidy Program within the National Capital Region

    National Research Council Canada - National Science Library

    Granetto, Paul J; Marsh, Patricia A; Pfeil, Lorin T; Gaich, Walter J; Lawrence, Demetria; Hart, Marcia T; Dickison, Ralph W; Varner, Pamela; Foth, Suellen

    2007-01-01

    DoD personnel with oversight responsibility and personnel working within the DoD transit subsidy program for the National Capital Region should read this report to obtain information about internal...

  15. Regional Civil Support Forces for Homeland Defense and Civil Support Missions

    National Research Council Canada - National Science Library

    Nuismer, Barbara A

    2007-01-01

    To protect the homeland, a plan to form ten regional Civil Support Forces (CSF) made up of National Guard forces has been proposed by senior fellow Christine Wormuth of the Center for Strategic and International Studies (CSIS...

  16. Regional Joint-Integrated Air and Missile Defense (RF-IAMD): An Operational Level Integrated Air and Missile Defense (IAMD) Command and Control (C2) Organization

    Science.gov (United States)

    2015-05-15

    Accessed April 26, 2015, http://www.state.gov/t/ avc /rls/2014/226073.html 24 Pacific Air Forces, PACAF establishes Pacific IAMD Center, Accessed April...U.S. Department of State. Gulf Cooperation Council and Ballistic Missile Defense. Accessed April 26, 2015. http://www.state.gov/t/ avc /rls/2014

  17. Extending U.S. Theater Missile Defense to Northeast Asia: Ramifications for Regional Security

    National Research Council Canada - National Science Library

    Attenweiler, Steven

    2001-01-01

    ...) and the Democratic People's Republic of Korea (DPRK). This build-up has destabilized a region of vital importance to the national interest of the United States by encouraging the idea that offensive military action can be utilized to attain national...

  18. Examining Regionalization Efforts to Develop Lessons Learned and Consideration for Department of Defense Medical Facilities

    Science.gov (United States)

    2017-03-23

    outsourcing effects of military maintenance depots. They found maintenance depots were not working at full capacity and in some cases privatizing the...need to look at the impact of the consolidated departments and if a common goal can be achieved. Funding differences can also affect regionalization...therefore be out of service until fixed. Mitchell & Pasch [5] added that there could be a customer service impact consolidating local facilities into

  19. Characterizing and Quantifying Local and Regional Particulate Matter Emissions from Department of Defense Installations

    Science.gov (United States)

    2005-03-01

    region (Fig. 4.1). A summary of the annual and seasonal average temperature, precipitation , and wind conditions for El Paso is presented in Table 4.1... Precipitation (cm) 2 Average Wind Speed 2 (km/hr) Prevailing Wind Direction 2 (degrees) Annual 17.3 22.4 14.2 360 Winter (Dec...Chow, 2001; Chow et al., 2003). The Teflon-membrane filters were analyzed for mass by gravimetry using a Cahn 31 Electro-microbalance and for 40

  20. The Regional Dimension of Romania's Participation to the Anti-Missile Defense System

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-08-01

    Full Text Available The current security environment is characterized by a high degree of instability and unpredictability, through the manifestation of new risks and threats, especially those with asymmetrical nature, by redefining the relations between the great powers, and increasing freedom of action of the regional actors (state and non-state. At the international level, the end of the Cold War has led to a fragmentation of efforts in the security field, with direct implications on the need for further efforts of the international community coordination. In this era of profound change and transformation it is not possible the adoption of an isolationist policy of security, but only in a broader context of interdependencies and relationships between general trends, threats or challenges specific to a particular area or geographic areas. Swift operationalization of the anti-missile system will strengthen the national security both directly, through the protection it provides for the entire national territory, and indirectly, as the system will have a deterrent important role, able to mitigate risks of possible attacks by ballistic missiles. The role of deterrence will remove the risk of attack against any Allied territory on which, by virtue of membership in NATO and obligations involved according to article 5 of the Washington Treaty, Romania has also responsibilities.

  1. Pathok Negoro mosque as the form of territorial defense region of Mataram Kingdom of Islam Java in Jogjakarta

    Science.gov (United States)

    Setyowati, E.; Hardiman, G.; Murtini, T. W.

    2018-01-01

    Territory is the space boundary of ownership. Defense concepts of an area also include territory. The defense concept of a territory of power or ownership is usually in the form of fortress, ditch, river, road, alley or gate. Many of these are seen in the forms of old city of Dutch’s inheritances. Javanese Islamic Kingdom in Yogyakarta has territory in the form of mosque. The mosque is called the Pathok Negoro as consists of 4 mosques. This territorial not same with another Islamic kingdoms. The research problem is why mosque used as a form of defense? What is the uniqueness?The purpose of the research is to reveal the form of territory of Javanese Islamic Kingdom. The benefit of this research is to get the characteristic form of territory of Javanese Islamic Kingdom in Yogyakarta. Their located in Ploso Kuning, Mlangi, babadan, Dongkelan, and Wonokromo. The research method that was used was qualitative method with grounded research, by using history and map search.In the analysis was carried out identification and comparison between mosques.The results show that there are characteristics on the location, the building orientation, the landscape, the area pattern and the shape of the building.

  2. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  3. Molecular characterization of a genomic region in a Lactococcus bacteriophage that is involved in its sensitivity to the phage defense mechanism AbiA.

    OpenAIRE

    Dinsmore, P K; Klaenhammer, T R

    1997-01-01

    A spontaneous mutant of the lactococcal phage phi31 that is insensitive to the phage defense mechanism AbiA was characterized in an effort to identify the phage factor(s) involved in sensitivity of phi31 to AbiA. A point mutation was localized in the genome of the AbiA-insensitive phage (phi31A) by heteroduplex analysis of a 9-kb region. The mutation (G to T) was within a 738-bp open reading frame (ORF245) and resulted in an arginine-to-leucine change in the predicted amino acid sequence of t...

  4. Quality Assurance Plan for Data Collection: Characterizing and Quantifying Local and Regional Particulate Matter Emissions from Department of Defense Installations

    National Research Council Canada - National Science Library

    Gillies, J

    2000-01-01

    ...-post regional visibility effects. This document has been assembled to describe the quality assurance plan for data collection for the different components of the proposed research. Quality control (QC...

  5. Regional Differences in Pathogen Prevalence and Defensive Reactions to the “Swine Flu” Outbreak among East Asians and Westerners

    Directory of Open Access Journals (Sweden)

    Takeshi Hamamura

    2010-07-01

    Full Text Available Research has found that contagion-minimizing behavioral tendencies are amplified in pathogen-prevalent regions. We investigated whether reactions to the “swine flu” outbreak of 2009 were stronger among East Asians than Westerners, populations residing in regions that now enjoy comparable advances in healthcare but that are characterized by relatively high and low historical pathogen prevalence, respectively. In a survey, East Asians reported greater concerns about infection, especially from foreigners. Analyses of international air travel data around the time of the outbreak provided corroborating evidence: Immediately following the outbreak, airports in the Asia-Pacific region lost more international traffic relative to their Western counterparts, and East Asian airlines reported greater declines in international traffic compared to Western airlines. These differences are unlikely to reflect objective threat posed by swine flu (whose casualties were concentrated in the Americas; rather, they appear to reflect culturally adapted behavioral patterns forged and sustained by regionally variable levels of pathogen prevalence.

  6. Trying to Learn Lessons for Response to Extreme Events: Paradigm Shifts Affecting Civil Defense in the Trinational Region of Southwestern Amazonia

    Science.gov (United States)

    Santos, G. L. P.

    2015-12-01

    The last ten years have seen several extreme climate events in southwestern Amazonia with historic impacts. The City of Rio Branco, Capital of Acre, Brazil´s westernmost State, suffered its seventh consecutive annual flooding and its worst in March 2015. The city of Tarauacá, also in Acre, registered 12 flooding events between November 2014 and April 2015. The most recent flood of the trinational Acre River in 2015 set historic records for flood stage and number of displaced persons in Cobija, the Capital of Pando, Bolivia. From February to April 2014, floods of the Madeira River disrupted the one highway between Acre and southern Brazil. Puerto Maldonado, the capital in Madre de Dios Region of Peru had its worst flood in 50 years during 2014. In 2005 and 2010, prolonged droughts combined with ignition sources resulted in tens to hundreds of thousands of hectares of fire-damaged rainforests in the Madre de Dios, Acre and Pando (MAP) Region. The Civil Defenses in these three contiguous political units faced several abrupt paradigm shifts that affected their responses: 1) The drought of 2005 showed dramatically that regional rainforests do burn; 2) The recent flooding history, particularly in 2012 and 2015, demolished the cultural icon of a nine-year recurrence interval; 3) What happens outside your territory can be devastating. The Madeira River flood impeded an estimated 200 million dollars from circulating in Acre; 4) The past can be a terrible guide. For Cobija and Rio Branco, the 2015 flood was on the order of a meter higher than any other. Many home dwellers did not evacuate in time because they used past floods as a guide; 5) A collapse in communication - cell phones, land lines, and Internet - can get worse. In 2012, such a collapse occurred in two border towns for 5 days, yet in 2015 it lasted more than 11 days. Research is needed to address how institutions linked to Civil Defense can shift paradigms in time to be more effective.

  7. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  8. Molecular characterization of a genomic region in a Lactococcus bacteriophage that is involved in its sensitivity to the phage defense mechanism AbiA.

    Science.gov (United States)

    Dinsmore, P K; Klaenhammer, T R

    1997-05-01

    A spontaneous mutant of the lactococcal phage phi31 that is insensitive to the phage defense mechanism AbiA was characterized in an effort to identify the phage factor(s) involved in sensitivity of phi31 to AbiA. A point mutation was localized in the genome of the AbiA-insensitive phage (phi31A) by heteroduplex analysis of a 9-kb region. The mutation (G to T) was within a 738-bp open reading frame (ORF245) and resulted in an arginine-to-leucine change in the predicted amino acid sequence of the protein. The mutant phi31A-ORF245 reduced the sensitivity of phi31 to AbiA when present in trans, indicating that the mutation in ORF245 is responsible for the AbiA insensitivity of phi31A. Transcription of ORF245 occurs early in the phage infection cycles of phi31 and phi31A and is unaffected by AbiA. Expansion of the phi31 sequence revealed ORF169 (immediately upstream of ORF245) and ORF71 (which ends 84 bp upstream of ORF169). Two inverted repeats lie within the 84-bp region between ORF71 and ORF169. Sequence analysis of an independently isolated AbiA-insensitive phage, phi31B, identified a mutation (G to A) in one of the inverted repeats. A 118-bp fragment from phi31, encompassing the 84-bp region between ORF71 and ORF169, eliminates AbiA activity against phi31 when present in trans, establishing a relationship between AbiA and this fragment. The study of this region of phage phi31 has identified an open reading frame (ORF245) and a 118-bp DNA fragment that interact with AbiA and are likely to be involved in the sensitivity of this phage to AbiA.

  9. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  10. Japan and Ballistic Missile Defense

    National Research Council Canada - National Science Library

    Swaine, Michael

    2001-01-01

    Spurred by a perceived growing ballistic missile threat from within the Asia-Pacific region and requests from the United States to support research and development on components of a missile defense...

  11. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  12. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  13. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    Science.gov (United States)

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  14. Procurement of Contract Reconciliation Services by the Defense Logistics Agency

    National Research Council Canada - National Science Library

    1991-01-01

    The audit objective was to evaluate DLA's procedures for contracting with NSI to reconcile contracts before their transfer from the Defense Contract Administration Services Regions to the Defense Finance Center...

  15. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  16. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  17. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  18. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  19. The Importance of the KR-Rich Region of the Coat Protein of Ourmia melon virus for Host Specificity, Tissue Tropism, and Interference With Antiviral Defense.

    Science.gov (United States)

    Rossi, Marika; Vallino, Marta; Abbà, Simona; Ciuffo, Marina; Balestrini, Raffaella; Genre, Andrea; Turina, Massimo

    2015-01-01

    The N-terminal region of the Ourmia melon virus (OuMV) coat protein (CP) contains a short lysine/arginine-rich (KR) region. By alanine scanning mutagenesis, we showed that the KR region influences pathogenicity and virulence of OuMV without altering viral particle assembly. A mutant, called OuMV6710, with three basic residue substitutions in the KR region, was impaired in the ability to maintain the initial systemic infection in Nicotiana benthamiana and to infect both cucumber and melon plants systemically. The integrity of this protein region was also crucial for encapsidation of viral genomic RNA; in fact, certain mutations within the KR region partially compromised the RNA encapsidation efficiency of the CP. In Arabidopsis thaliana Col-0, OuMV6710 was impaired in particle accumulation; however, this phenotype was abolished in dcl2/dcl4 and dcl2/dcl3/dcl4 Arabidopsis mutants defective for antiviral silencing. Moreover, in contrast to CPwt, in situ immunolocalization experiments indicated that CP6710 accumulates efficiently in the spongy mesophyll tissue of infected N. benthamiana and A. thaliana leaves but only occasionally infects palisade tissues. These results provided strong evidence of a crucial role for OuMV CP during viral infection and highlighted the relevance of the KR region in determining tissue tropism, host range, pathogenicity, and RNA affinity, which may be all correlated with a possible CP silencing-suppression activity.

  20. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  1. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  2. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  4. Regional Innovation Clusters

    Data.gov (United States)

    Small Business Administration — The Regional Innovation Clusters serve a diverse group of sectors and geographies. Three of the initial pilot clusters, termed Advanced Defense Technology clusters,...

  5. A Study to Develop the Optimal Military Inter-Institutional Patient Referral Systems Model for DoD (Department of Defense) Military Medical Region III

    Science.gov (United States)

    1988-05-01

    I rerr syttemn an do wlon t P ontimal military inter-instittiuonal patient referral systems model for DOD Military Medical Region III. A convenience...Dactin- on the Armed Services Medical Regulating Office and Patient Airlift "lc rcsusl.s of :his study indicated that the single largest breakdown...and the requirement to regulate to the closest medical facility with capability to care for the patient . L! / I Ii I i A STUDY TO DEVELOP THE OPTIMAL

  6. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  7. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  8. Financial Management: Contracts Classified as Unreconcilable by the Defense Finance and Accounting Service Columbus (Contract DAAA09-81-G-2008-0031)

    National Research Council Canada - National Science Library

    Granetto, Paul J; Kornides, James L; Issel, John K; Knight, Clarence E., III; Frawley, John; Bennett, Karen M

    2005-01-01

    .... Defense Contract Management Agency (DCMA), Pittsburgh, Pennsylvania, personnel stated that the former Defense Contract Administration Services Region Philadelphia initially paid the contract until the payment function was transferred...

  9. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  10. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  11. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  12. Defense IRM: Alternatives Should Be Considered in Developing the New Civilian Personnel System

    National Research Council Canada - National Science Library

    1999-01-01

    ... regional centers, and attempting to improve personnel management business processes. A key part of this initiative is Defense's development of a new information management system-the Defense Civilian Personnel Data System (DCPDs...

  13. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  14. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  15. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  16. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  17. Defense Transportation; The Army

    National Research Council Canada - National Science Library

    1998-01-01

    .... The statement of managers in the conference report on the Department of Defense Appropriations Act, 1997, directed us to validate the results and savings achieved from this and any other personal property pilot program...

  18. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  19. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  20. Defense.gov Special Report: Travels with Panetta - September 2011

    Science.gov (United States)

    : Regional Defense, Cyber Highlight AUSMIN Talks SAN FRANCISCO, Sept. 14, 2011 - Asia-Pacific defense Ability to Attack Broadly. Clinton, Panetta to Attend Australia-U.S. Ministerial News Photos . Main Menu Sexual Assault Prevention Asia-Pacific Rebalance Cyber Strategy News Today in DOD Press Advisories News

  1. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  2. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  3. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  4. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  5. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  6. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  7. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  8. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  9. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  10. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  11. Defensive Passivity in Adolescence

    Science.gov (United States)

    Rosenheim, Eliyahu; Gaoni, Bracha

    1977-01-01

    There are potentially healthy adolescents who display excessive reluctance to move toward independent decision and action. This research presents a clinical description of this "syndrome", conceptualizes it as a defensive maneuver against mourning over cherished childhood dreams and offers steps for therapeutic intervention. (Editor/RK)

  12. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  13. Auxins in defense strategies

    Czech Academy of Sciences Publication Activity Database

    Čarná, Mária; Repka, V.; Skůpa, Petr; Šturdík, E.

    2014-01-01

    Roč. 69, č. 10 (2014), s. 1255-1263 ISSN 0006-3088 R&D Projects: GA TA ČR TA01011802 Institutional support: RVO:61389030 Keywords : auxin * defense responses * JA Subject RIV: GF - Plant Pathology, Vermin, Weed, Plant Protection Impact factor: 0.827, year: 2014

  14. Hanford defense waste studies

    International Nuclear Information System (INIS)

    Napier, B.A.; Zimmerman, M.G.; Soldat, J.K.

    1981-01-01

    PNL is assisting Rockwell Hanford Operations to prepare a programmatic environmental impact statement for the management of Hanford defense nuclear waste. The Ecological Sciences Department is leading the task of calculation of public radiation doses from a large matrix of potential routine and accidental releases of radionuclides to the environment

  15. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  16. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  17. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... regional innovation clusters, as well as experience fostering small business development and growth... from existing regional innovation clusters specializing in defense technologies to provide counseling... cluster areas and industries. SBA intends to make awards to multiple regional innovation clusters that can...

  18. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  19. Defense Primer: Procurement

    Science.gov (United States)

    2017-02-10

    Usually, incremental funding is used to mitigate peaks and valleys in annual budgets caused by the cost of one item significantly changing the...base defense budget . DOD uses these funds to buy several different types of materiel, including  new items easily recognizable as military...pursues a policy of full funding for procurement, meaning that the total estimated cost of each unit must be funded in the year it is budgeted . In a

  20. Quadrennial Defense Review Report

    Science.gov (United States)

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  1. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  2. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  3. Assessment of Ukranian National Defense Policy

    Science.gov (United States)

    2012-03-09

    Romanian- Slovakian-Hungarian engineer battalion “Tisa”, as a rapid reaction force with the mission of natural disaster relief in the Carpathian region...threats (Army’s multifunctional NBC protection and engineer units) and experience of their using ( Chernobyl nuclear plant in 1986, humanitarian...man-made disasters was exemplified by the 2011 nuclear catastrophe in Japan. Moreover, based on the results of the Strategic Defense Review in Ukraine

  4. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  5. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  6. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  7. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  8. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  9. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  10. Defense Programs and Budget Risk

    National Research Council Canada - National Science Library

    Troutman, Mark D

    2006-01-01

    .... Therefore the Defense Department has set before itself a requirement to modernize a large conventional force structure engaged in ongoing combat operations while simultaneously developing deeper...

  11. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  12. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  13. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  14. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  15. 32 CFR 724.120 - National Capital Region (NCR).

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false National Capital Region (NCR). 724.120 Section 724.120 National Defense Department of Defense (Continued) DEPARTMENT OF THE NAVY PERSONNEL NAVAL DISCHARGE REVIEW BOARD Definitions § 724.120 National Capital Region (NCR). The District of Columbia; Prince...

  16. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    annual investment of about $2.5 billion. The study also recommended that the Department of Defense enhance its ab ility to perform the kinds of broad...homeland fundamentally change the nature of the problem to one of strategic deterrence and that the spirit of the terms of reference was more...adversary investments in regional, precision attack cruise and ballistic threaten that foundation, investments that have dramatically increased both

  17. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  18. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  19. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  20. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  1. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  2. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  3. 78 FR 77664 - Defense Policy Board (DPB); Notice of Federal Advisory Committee Meeting

    Science.gov (United States)

    2013-12-24

    ...: (a) Issues central to strategic DoD planning; (b) policy implications of U.S. force structure and force modernization and on DoD's ability to execute U.S. defense strategy; (c) U.S. regional defense... public or interested organizations may submit written statements to the membership of the DPB at any time...

  4. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  5. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  6. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  7. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  8. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  9. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  10. Singapore’s Defense Policy: Essential or Excessive?

    Science.gov (United States)

    2010-06-11

    Republic, Ecuador , El Salvador, Ghana, Greece, Guatemala, Honduras, India, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Malaysia, Mexico, Morocco...mitigating measures, it is timely to establish the appropriate context to ensure a focused and fruitful discussion of Singapore’s defense policy. As...regional allies. 41 Today, ASEAN has matured considerably as an organization, buoyed by the relative warmth and stability of regional relationships in

  11. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  12. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  13. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  14. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  15. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  16. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  17. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  18. Report on Defense Business Operations to the Congressional Defense Committees

    Science.gov (United States)

    2009-03-15

    Department’s strategic framework for planning and decision-making, and acknowledged the need to establish clear, actionable strategic goals and...Business Operations Department of Defense Business Transformation 5 2. Business Enterprise Priorities Six Business Enterprise Priorities ( BEPs ... framework products that facilitate the interoperability and integration of the operational activities, processes, data, information exchanges

  19. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  20. 32 CFR 1605.7 - Region Manager.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Region Manager. 1605.7 Section 1605.7 National... ORGANIZATION Region Administration § 1605.7 Region Manager. (a) Subject to the direction and control of the Director of Selective Service, the Region Manager of Selective Service for each region shall be in...

  1. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  2. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  3. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  4. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  5. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  6. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  7. Sulforaphane Modifies Histone H3, Unpacks Chromatin, and Primes Defense.

    Science.gov (United States)

    Schillheim, Britta; Jansen, Irina; Baum, Stephani; Beesley, Alexander; Bolm, Carsten; Conrath, Uwe

    2018-03-01

    Modern crop production calls for agrochemicals that prime plants for enhanced defense. Reliable test systems for spotting priming-inducing chemistry, however, are rare. We developed an assay for the high-throughput search for compounds that prime microbial pattern-induced secretion of antimicrobial furanocoumarins (phytoalexins) in cultured parsley cells. The screen produced 1-isothiocyanato-4-methylsulfinylbutane (sulforaphane; SFN), a secondary metabolite in many crucifers, as a novel defense priming compound. While elucidating SFN's mode of action in defense priming, we found that in Arabidopsis ( Arabidopsis thaliana ) the isothiocyanate provokes covalent modification (K4me3, K9ac) of histone H3 in the promoter and promoter-proximal region of defense genes WRKY6 and PDF1 2 , but not PR1 SFN-triggered H3K4me3 and H3K9ac coincide with chromatin unpacking in the WRKY6 and PDF1 2 regulatory regions, primed WRKY6 expression, unprimed PDF1 2 activation, and reduced susceptibility to downy mildew disease ( Hyaloperonospora arabidopsidis ). Because SFN also directly inhibits H arabidopsidis and other plant pathogens, the isothiocyanate is promising for the development of a plant protectant with a dual mode of action. © 2018 American Society of Plant Biologists. All Rights Reserved.

  8. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  9. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  10. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  11. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  12. Climate Change Impacts at Department of Defense

    Energy Technology Data Exchange (ETDEWEB)

    Kotamarthi, Rao [Argonne National Lab. (ANL), Argonne, IL (United States); Wang, Jiali [Argonne National Lab. (ANL), Argonne, IL (United States); Zoebel, Zach [Univ. of Illinois, Urbana, IL (United States); Wuebbles, Don [Univ. of Illinois, Urbana, IL (United States); Hayhoe, Katharine [Texas Tech Univ., Lubbock, TX (United States); Stein, Michael [Univ. of Chicago, IL (United States); Changnon, David [Northern Illinois Univ., DeKalb, IL (United States)

    2017-06-16

    This project is aimed at providing the U.S. Department of Defense (DoD) with a comprehensive analysis of the uncertainty associated with generating climate projections at the regional scale that can be used by stakeholders and decision makers to quantify and plan for the impacts of future climate change at specific locations. The merits and limitations of commonly used downscaling models, ranging from simple to complex, are compared, and their appropriateness for application at installation scales is evaluated. Downscaled climate projections are generated at selected DoD installations using dynamic and statistical methods with an emphasis on generating probability distributions of climate variables and their associated uncertainties. The sites selection and selection of variables and parameters for downscaling was based on a comprehensive understanding of the current and projected roles that weather and climate play in operating, maintaining, and planning DoD facilities and installations.

  13. Regionalism, Regionalization and Regional Development

    Directory of Open Access Journals (Sweden)

    Liviu C. Andrei

    2016-03-01

    Full Text Available Sustained development is a concept associating other concepts, in its turn, in the EU practice, e.g. regionalism, regionalizing and afferent policies, here including structural policies. This below text, dedicated to integration concepts, will limit on the other hand to regionalizing, otherwise an aspect typical to Europe and to the EU. On the other hand, two aspects come up to strengthen this field of ideas, i.e. the region (al-regionalism-(regional development triplet has either its own history or precise individual outline of terms.

  14. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  15. Defense bill: Earmarking as usual

    Science.gov (United States)

    Earmarked funds in the $268 billion defense appropriations bill for fiscal year 1991 stirred congressional debate in late October. Senator Sam Nunn (D-Ga.), chairman of the Senate Armed Services Committee, charged that the defense bill contains questionable projects totaling tens of millions of dollars. AGU opposes legislative earmarking of money for particular institutions, maintaining that the practice prevents the best use of federal funding by circumventing competitive review. Nunn noted on the Senate floor that the appropriations bill provided specific funds for cited institutions—contravening a federal law promoting competition. “ If these programs have merit, they will succeed in a fair and competent review in competition,” Nunn said. “If no other institution in the country is able to compete, there should be no fear whatever of competition… But no one else in the world is allowed to compete to work on these projects.”

  16. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    and Mathematics at the Royal Institute of Tech- nology, Stockholm, Sweden; and Otto von Guericke University, Magdeburg , Germany . viii ix SUMMARY...and analysis to influence policy debate and bridge the gap between military and academia. The Center for Strategic Leadership and Development...provide an overview of four different national approaches to cyber defense: those of Nor- way, Estonia, Germany , and Sweden. While provid- ing a

  17. Defense Programs Transportation Risk Assessment

    International Nuclear Information System (INIS)

    Clauss, D.B.

    1994-01-01

    This paper provides an overview of the methodology used in a probabilistic transportation risk assessment conducted to assess the probabilities and consequences of inadvertent dispersal of radioactive materials arising from severe transportation accidents. The model was developed for the Defense Program Transportation Risk Assessment (DPTRA) study. The analysis incorporates several enhancements relative to previous risk assessments of hazardous materials transportation including newly-developed statistics on the frequencies and severities of tractor semitrailer accidents and detailed route characterization using the 1990 Census data

  18. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  19. Defense of a space elevator

    Energy Technology Data Exchange (ETDEWEB)

    Laubscher, B. E. (Bryan E.)

    2004-01-01

    The Space Elevator (SE) represents a major paradigm shift in space access. If the SE's promise of low-cost access is to be realized, everything becomes economically more feasible to accomplish in space. In this paper we describe a defensive system of the SE. The primary scenario adopted for this analysis is the SE based on a floating platform in the ocean along the equator. A second possible scenario is the SE stationed on land (island or continent) on or near the equator. The SE will capture the imaginations of people around the world. It will become a symbol of power, capability, wealth and prestige for the country that builds it. As such, it will become a prime terrorist target. Moreover, the tremendous economic leverage afforded by the SE might motivate rogue nations to plot its destruction. Therefore, it is necessary to consider the requirements for defense of the SE. For the purposes of this paper it is assumed that the SE is to be deployed by the United States or one of its companies, and the resources of the US are available for its defense.

  20. FY10 Defense Environmental Programs Annual Report to Congress

    Science.gov (United States)

    2011-07-01

    7,412- 2019  AIR FORCE ALPENA COUNTY REGIONAL AIRPORT / MI557282890300 17 2 $6,363 $0 $862 $1,9462012 2018  FORMERLY USED DEFENSE SITES ASH FIELD...Through FY10 ($000) IRP MMRPMMRPIRP Michigan ALPENA AAF / MI59799F231100 $001 $23 ALPENA NGTR / MI59799F228900 $610 $0 ANN ARBOR NGTR / MI59799F228800

  1. Evaluation of the defensive behavior of two honeybee ecotypes using a laboratory test

    Directory of Open Access Journals (Sweden)

    Cecilia Andere

    2002-01-01

    Full Text Available Honeybee defensive behavior is a useful selection criterion, especially in areas with Africanized honeybees (Apis mellifera L. In all genetic improvement programs the selected characters must be measured with precision, and because of this we evaluated a metabolic method for testing honeybee defensive behavior in the laboratory for its usefulness in distinguishing between honeybee ecotypes and selecting honeybees based on their level of defensive responses. Ten honeybee colonies were used, five having been produced by feral queens from a subtropical region supposedly colonized by Africanized honeybees and five by queens from a temperate region apparently colonized by European honeybees. We evaluate honeybee defensive behavior using a metabolic test based on oxygen consumption after stimulation with an alarm pheromone, measuring the time to the first response, time to maximum oxygen consumption, duration of activity, oxygen consumption at first response, maximum oxygen consumption and total oxygen consumption, colonies being ranked according to the values obtained for each variable. Significant (p < 0.05 differences were detected between ecotypes for each variable but for all variables the highest rankings were obtained for colonies of subtropical origin, which had faster and more intense responses. All variables were highly associated (p < 0.05. Total oxygen consumption was the best indicator of metabolic activity for defensive behavior because it combined oxygen consumption and the length of the response. This laboratory method may be useful for evaluating the defensive behavior of honey bees in genetic programs designed to select less defensive bees.

  2. Defense and Regional Integration: Brazil’s Weapons Industry Case

    OpenAIRE

    Suzeley Kalil Mathias; Eduardo Lucas de Vasconcelos Cruz

    2009-01-01

    This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the poss...

  3. Computer network defense through radial wave functions

    Science.gov (United States)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  4. Quality Management Plan for EPA Region 1

    Science.gov (United States)

    The QMP describes policies, procedures & management systems within EPA NE that govern quality assurance & quality control activities supporting the transparency & scientific defensibility of environmental data collected, used & disseminated by the Region.

  5. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  6. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  7. Disposal of Hanford defense waste

    International Nuclear Information System (INIS)

    Holten, R.A.; Burnham, J.B.; Nelson, I.C.

    1986-01-01

    An Environmental Impact Statement (EIS) on the disposal of Hanford Defense Waste is scheduled to be released near the end of March, 1986. This EIS will evaluate the impacts of alternatives for disposal of high-level, tank, and transuranic wastes which are now stored at the Department of Energy's Hanford Site or will be produced there in the future. In addition to releasing the EIS, the Department of Energy is conducting an extensive public participation process aimed at providing information to the public and receiving comments on the EIS

  8. The Concept of Defense Management in the 21st Century within Indonesia Maritime Security Framework

    Directory of Open Access Journals (Sweden)

    Herlina Juni Risma Saragih

    2018-03-01

    Full Text Available Conflict of Maritime Security in the Asia Pacific region, especially South China Sea is a conflict that has long occurred and a problem that is often raised both in a regional and international level. Related to the conflict takes Strategy and Management of the State's defense to anticipate the impact of the conflict situations on defense and security of the region. The purpose of this study is to analyze the concept of Defence Management Indonesia in the 21st century in the context of Indonesian Maritime Security, Case Studies U.S Rebalancing in Asia Pacific and South China Sea conflict, as well as to determine the readiness of Defence Management capabilities in the face of threats. The method used is a qualitative method of data collection methods through in-depth interview to the informant. The results showed that in order to improve maritime security in Indonesia has not been implemented in a structured and comprehensive defense in accordance with the management perspective of the countries more advanced, especially on defense preparedness in logistics management as a managing and defense equipment avaible owned by Indonesia government. Based on these results it is suggested the need for socialization implementation of Defense Management in Asia Pacific by Indonesia government in the context of Maritime Security comprehensively.

  9. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  10. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  11. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  12. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  13. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  14. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  15. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  16. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  17. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  18. Defense Business Operations Fund Inventory Record Accuracy

    National Research Council Canada - National Science Library

    1998-01-01

    .... The overall objective of the audit was to determine whether inventory amounts on the FY 1996 Defense Business Operations Fund Consolidated Financial Statements were presented fairly in accordance...

  19. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  20. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  1. For a NATO defensive deterrent

    International Nuclear Information System (INIS)

    Smoke, R.

    1988-01-01

    This paper proposes that NATO should adopt, in a gradual and orderly fashion, a grand strategy and accompanying posture distinctly different from its present one. The strategy the author recommends has variously been termed non-provocative defence, defence-only defence, or defensive deterrence, employs the latter term here. By it the author means a militarily sound strategy relying solely on conventional weapons so long as the enemy uses only conventional weapons, and a posture that is unambiguously capable only of defence. Secure, second-strike nuclear forces would be retained for deterrence of any nuclear use by the opponent. This goal is consistent with the goal stated in Frank Barnaby's companion paper in this volume; here however the author lays the emphasis on political and politico-military rationales for a defensive deterrent. The paper begins with two brief arguments why a shift in NATO strategy is needed, advances some distinctions among the possible alternatives, and then presents some seven rationales for its recommended policy

  2. Energetic Techniques For Planetary Defense

    Science.gov (United States)

    Barbee, B.; Bambacus, M.; Bruck Syal, M.; Greenaugh, K. C.; Leung, R. Y.; Plesko, C. S.

    2017-12-01

    Near-Earth Objects (NEOs) are asteroids and comets whose heliocentric orbits tend to approach or cross Earth's heliocentric orbit. NEOs of various sizes periodically collide with Earth, and efforts are currently underway to discover, track, and characterize NEOs so that those on Earth-impacting trajectories are discovered far enough in advance that we would have opportunities to deflect or destroy them prior to Earth impact, if warranted. We will describe current efforts by the National Aeronautics and Space Administration (NASA) and the National Nuclear Security Administration (NNSA) to assess options for energetic methods of deflecting or destroying hazardous NEOs. These methods include kinetic impactors, which are spacecraft designed to collide with an NEO and thereby alter the NEO's trajectory, and nuclear engineering devices, which are used to rapidly vaporize a layer of NEO surface material. Depending on the amount of energy imparted, this can result in either deflection of the NEO via alteration of its trajectory, or robust disruption of the NEO and dispersal of the remaining fragments. We have studied the efficacies and limitations of these techniques in simulations, and have combined the techniques with corresponding spacecraft designs and mission designs. From those results we have generalized planetary defense mission design strategies and drawn conclusions that are applicable to a range of plausible scenarios. We will present and summarize our research efforts to date, and describe approaches to carrying out planetary defense missions with energetic NEO deflection or disruption techniques.

  3. Verification of excess defense material

    International Nuclear Information System (INIS)

    Fearey, B.L.; Pilat, J.F.; Eccleston, G.W.; Nicholas, N.J.; Tape, J.W.

    1997-01-01

    The international community in the post-Cold War period has expressed an interest in the International Atomic Energy Agency (IAEA) using its expertise in support of the arms control and disarmament process in unprecedented ways. The pledges of the US and Russian presidents to place excess defense materials under some type of international inspections raises the prospect of using IAEA safeguards approaches for monitoring excess materials, which include both classified and unclassified materials. Although the IAEA has suggested the need to address inspections of both types of materials, the most troublesome and potentially difficult problems involve approaches to the inspection of classified materials. The key issue for placing classified nuclear components and materials under IAEA safeguards is the conflict between these traditional IAEA materials accounting procedures and the US classification laws and nonproliferation policy designed to prevent the disclosure of critical weapon-design information. Possible verification approaches to classified excess defense materials could be based on item accountancy, attributes measurements, and containment and surveillance. Such approaches are not wholly new; in fact, they are quite well established for certain unclassified materials. Such concepts may be applicable to classified items, but the precise approaches have yet to be identified, fully tested, or evaluated for technical and political feasibility, or for their possible acceptability in an international inspection regime. Substantial work remains in these areas. This paper examines many of the challenges presented by international inspections of classified materials

  4. Defense mutualisms enhance plant diversification.

    Science.gov (United States)

    Weber, Marjorie G; Agrawal, Anurag A

    2014-11-18

    The ability of plants to form mutualistic relationships with animal defenders has long been suspected to influence their evolutionary success, both by decreasing extinction risk and by increasing opportunity for speciation through an expanded realized niche. Nonetheless, the hypothesis that defense mutualisms consistently enhance plant diversification across lineages has not been well tested due to a lack of phenotypic and phylogenetic information. Using a global analysis, we show that the >100 vascular plant families in which species have evolved extrafloral nectaries (EFNs), sugar-secreting organs that recruit arthropod mutualists, have twofold higher diversification rates than families that lack species with EFNs. Zooming in on six distantly related plant clades, trait-dependent diversification models confirmed the tendency for lineages with EFNs to display increased rates of diversification. These results were consistent across methodological approaches. Inference using reversible-jump Markov chain Monte Carlo (MCMC) to model the placement and number of rate shifts revealed that high net diversification rates in EFN clades were driven by an increased number of positive rate shifts following EFN evolution compared with sister clades, suggesting that EFNs may be indirect facilitators of diversification. Our replicated analysis indicates that defense mutualisms put lineages on a path toward increased diversification rates within and between clades, and is concordant with the hypothesis that mutualistic interactions with animals can have an impact on deep macroevolutionary patterns and enhance plant diversity.

  5. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  6. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  7. European Diversification and Defense Market Assessment, 2nd Edition: A Comprehensive Guide for Entry into Overseas Markets

    National Research Council Canada - National Science Library

    1997-01-01

    .... The region possesses a number of well diversified economies that exhibit growing demand for high technology products in commercial and defense sectors and, thus, provides a wide variety of trade opportunities for U.S. firms...

  8. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  9. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  10. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  11. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  12. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  13. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  14. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  15. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  16. Civil defense should be mandatory

    International Nuclear Information System (INIS)

    Kearney, C.H.

    1985-01-01

    In this paper, the author exposes myths about the effects of nuclear weapons so that the U.S. can begin the necessary task of a mandatory civil defense program. An all-out nuclear war between Russia and the United States would be the worst catastrophe in history, a tragedy so huge it is difficult to comprehend. Even so, it would be far from the end of human life on earth. The dangers from nuclear weapons have been distorted and exaggerated for varied reasons. These exaggerations have become demoralizing myths, believed by millions of Americans. The author has found that many people see no sense in talking about details of survival skills. Only after they have begun to question the truth of these myths do they become interested, under normal peacetime conditions, in acquiring nuclear war survival skills. The author examines the most harmful of the myths about nuclear war dangers, along with some of the grim facts

  17. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  18. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  19. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  20. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  1. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  2. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  3. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  4. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  5. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  6. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  7. Immunity, suicide or both? Ecological determinants for the combined evolution of anti-pathogen defense systems.

    Science.gov (United States)

    Iranzo, Jaime; Lobkovsky, Alexander E; Wolf, Yuri I; Koonin, Eugene V

    2015-03-13

    Parasite-host arms race is one of the key factors in the evolution of life. Most cellular life forms, in particular prokaryotes, possess diverse forms of defense against pathogens including innate immunity, adaptive immunity and programmed cell death (altruistic suicide). Coevolution of these different but interacting defense strategies yields complex evolutionary regimes. We develop and extensively analyze a computational model of coevolution of different defense strategies to show that suicide as a defense mechanism can evolve only in structured populations and when the attainable degree of immunity against pathogens is limited. The general principle of defense evolution seems to be that hosts do not evolve two costly defense mechanisms when one is sufficient. Thus, the evolutionary interplay of innate immunity, adaptive immunity and suicide, leads to an equilibrium state where the combination of all three defense strategies is limited to a distinct, small region of the parameter space. The three strategies can stably coexist only if none of them are highly effective. Coupled adaptive immunity-suicide systems, the existence of which is implied by the colocalization of genes for the two types of defense in prokaryotic genomes, can evolve either when immunity-associated suicide is more efficacious than other suicide systems or when adaptive immunity functionally depends on the associated suicide system. Computational modeling reveals a broad range of outcomes of coevolution of anti-pathogen defense strategies depending on the relative efficacy of different mechanisms and population structure. Some of the predictions of the model appear compatible with recent experimental evolution results and call for additional experiments.

  8. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  9. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  10. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  11. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  12. Accounting for Unliquidated Obligations for the Defense Fuel Supply Center

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Finance and Accounting Service (DFAS) Columbus Center, Columbus, Ohio, and the Defense Fuel Supply Center share responsibility for accurate accounting information and financial reporting...

  13. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  14. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  15. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  16. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  17. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  18. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  19. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  20. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  1. Metrology network: a case study on the metrology network of defense and security from SIBRATEC

    International Nuclear Information System (INIS)

    Pereira, Marisa Ferraz Figueira

    2016-01-01

    This study is focused on understanding the effects of the infrastructure improvement of these laboratories and the role of network management in offering support and metrological services to the defense and security sector enterprises, within the project purposes. It is also aimed identify gaps on offering calibration and, or testing services to supply demands of the defense and security industries, and analyze adequacy of RDS project to demands of defense and security industries, with the purpose to contribute with information for future actions. The experimental research is qualitative type, with exploratory research characteristics, based on case study. It was structured in two parts, involving primary data collection and secondary data. In order to collect the primary data two questionnaires were prepared, one (Questionnaire A) to the five RDS laboratories representatives and other (Questionnaire B) to the contacts of 63 defense and security enterprises which need calibration and test services, possible customers of RDS laboratories. Answers from four representatives of RDS laboratories and from 26 defense and security enterprises were obtained. The collection of secondary data was obtained from documentary research. The analysis was made based on five dimensions defined in order to organize and improve the understanding of the research setting. They are RDS project coverage, regional, network management, metrological traceability and importance and visibility of RDS. The results indicated that the performance of RDS does not interfere, by that time, in the metrological traceability of the products of the defense and security enterprises that participated in the research. (author)

  2. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  3. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... safety of the individual or others in the workplace. (See § 1630.2(r) defining direct threat.) (c) Other...) Conflict with other Federal laws. It may be a defense to a charge of discrimination under this part that a...

  4. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  5. Defense Contract Audit Agency Compensation Audits

    National Research Council Canada - National Science Library

    1999-01-01

    .... The Defense Contract Audit Agency (DCAA) assists the administrative contracting officer in accomplishing that responsibility by determining whether the contractor's compensation system is sound, reliable, consistently applied, and results...

  6. Defensive Swarm: An Agent Based Modeling Analysis

    Science.gov (United States)

    2017-12-01

    32  1.  System Dynamics .........................................................................33  2.  Variables...CONSIDERATIONS AND RECOMMENDATIONS ..........................83  1.  Prolonged Time of Operations ....................................................83...LIST OF FIGURES Figure 1.  Unmanned Aircraft System ..........................................................................8  Figure 2.  Defensive

  7. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  8. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  9. Formerly Used Defense Sites (FUDS) Public Properties

    Data.gov (United States)

    Department of Homeland Security — The FUDS Public GIS dataset contains point location information for the 2,709 Formerly Used Defense Sites (FUDS) properties where the U.S. Army Corps of Engineers is...

  10. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  11. Ballistic Missile Defense and ABM Treaty Limitations

    National Research Council Canada - National Science Library

    Robinson, Brian

    1998-01-01

    The U.S. must critically evaluate our current ballistic missile defense (BMD) strategy. In today's geostrategic context, is it sound strategy to continue to impose 1972 ABM Treaty restrictions on BMD systems development...

  12. Ballistic Missile Defense: An Administration Perspective

    National Research Council Canada - National Science Library

    Bell, Robert

    1995-01-01

    ...: "What is our strategy?" What the Clinton Administration is doing with regard to strategic offensive systems provides an instructive context for what we re now trying to do on the strategic defensive side...

  13. Deploying Missile Defense: Major Operational Challenges

    National Research Council Canada - National Science Library

    Bunn, M

    2004-01-01

    By October 2004, the United States will have begun initial deployment of a missile defense capability albeit a modest, limited, and not completely proven one to defend the homeland against a limited...

  14. Lease vs. Purchase in Defense Acquisition

    National Research Council Canada - National Science Library

    Hensley, Carlton L; Tinjum, Archie L

    2008-01-01

    With declining budgets and consolidation in the defense industry, should competition between prime and sub-prime contractors be fostered through innovative lease arrangements similar to the Navy's TAKX...

  15. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  16. Carp erythrodermatitis : host defense-pathogen interaction

    OpenAIRE

    Pourreau, C.N.

    1990-01-01

    The outcome of a bacterial infection depends on the interaction between pathogen and host. The ability of the microbe to survive in the host depends on its invasive potential (i.e. spreading and multiplication), and its ability to obtain essential nutrients and to resist the host's defense system. On the other hand, the host's resistance to a bacterial attack depends on its physiological state, the intensity of the bacterial attack and the efficacy of the defense system to ...

  17. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    the seven largest economies of the world (United States, China, Japan, Germany, France, United Kingdom, and Italy ).11 Major weapon systems...the Federal Acquisition Regulation.96 95 Ibid., pp. 20, 21. 96 Joseph Ferrara , “DoD’s 5000 Documents: Evolution and Change in Defense Acquisition...Wayne Smith. How Much Is Enough: Shaping the Defense Program, 1961–1969. New York: Harper & Row, 1971. Ferrara , Joseph. “DoD’s 5000 Documents

  18. Integrating the Department of Defense Supply Chain

    Science.gov (United States)

    2012-01-01

    Defense for Logistics and Materiel Readiness, DoD Supply Chain Materiel Management Procedures , DoD Manual 4140.01, Volumes 1 through 11, draft as of March...this is summarized in R. Glenn Richey, Jr., Anthony S. Roath, Judith M. Whipple , and Stanley E. Fawcett, “Exploring a Governance Theory of Supply...of this report, DoD Supply Chain Materiel Management Procedures (Assistant Secretary of Defense for Logis- tics and Materiel Readiness, DoD Manual

  19. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  20. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  1. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  2. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  3. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  4. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  5. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  6. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  7. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  8. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  9. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  10. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  11. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  12. Control of DWPF [Defense Waste Processing Facility] melter feed composition

    International Nuclear Information System (INIS)

    Edwards, R.E. Jr.; Brown, K.G.; Postles, R.L.

    1990-01-01

    The Defense Waste Processing Facility will be used to immobilize Savannah River Site high-level waste into a stable borosilicate glass for disposal in a geologic repository. Proper control of the melter feed composition in this facility is essential to the production of glass which meets product durability constraints dictated by repository regulations and facility processing constraints dictated by melter design. A technique has been developed which utilizes glass property models to determine acceptable processing regions based on the multiple constraints imposed on the glass product and to display these regions graphically. This system along with the batch simulation of the process is being used to form the basis for the statistical process control system for the facility. 13 refs., 3 figs., 1 tab

  13. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  14. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  15. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  16. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  17. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  18. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  19. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  20. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  1. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  2. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  3. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  4. Salt, chloride, bleach, and innate host defense

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M.

    2015-01-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. PMID:26048979

  5. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  6. Salt, chloride, bleach, and innate host defense.

    Science.gov (United States)

    Wang, Guoshun; Nauseef, William M

    2015-08-01

    Salt provides 2 life-essential elements: sodium and chlorine. Chloride, the ionic form of chlorine, derived exclusively from dietary absorption and constituting the most abundant anion in the human body, plays critical roles in many vital physiologic functions, from fluid retention and secretion to osmotic maintenance and pH balance. However, an often overlooked role of chloride is its function in innate host defense against infection. Chloride serves as a substrate for the generation of the potent microbicide chlorine bleach by stimulated neutrophils and also contributes to regulation of ionic homeostasis for optimal antimicrobial activity within phagosomes. An inadequate supply of chloride to phagocytes and their phagosomes, such as in CF disease and other chloride channel disorders, severely compromises host defense against infection. We provide an overview of the roles that chloride plays in normal innate immunity, highlighting specific links between defective chloride channel function and failures in host defense. © Society for Leukocyte Biology.

  7. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  8. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  9. Health transformation project and defensive medicine practice among neurosurgeons in Turkey.

    Science.gov (United States)

    Solaroglu, Ihsan; Izci, Yusuf; Yeter, H Gokce; Metin, M Mert; Keles, G Evren

    2014-01-01

    The term "Defensive" medicine was coined in the early 1970's and has been an important topic of scientific investigation and professional debate ever since. The aim of this study was to investigate the characteristics of defensive medicine, its reasons, and the extent to which it is practiced in the Turkish health care system. This is the first national survey to study the practice of defensive medicine among neurosurgeons in Turkey. The present cross-sectional study on defensive medicine assessed neurosurgeons registered at the Turkish Neurosurgical Society, who are actively working in various centers and hospitals within the Turkish health care system. A 40-question survey was adapted from existing measures described in the literature and was completed by a total of 404 neurosurgeons, representing 36.7% of the neurosurgeons registered at the Turkish Neurosurgical Society. Seventy-two percent of the participants in the current study reported practicing defensive medicine. This practice was mainly reported among inexperienced neurosurgeons (74.4%). Most were younger than 40 years of age (75.2%), working in state hospitals/universities (72.7%), and living in the Marmara region (38%). Respondents reported engaging in defensive medicine by avoiding high-risk surgery (62.6%), ordering additional imaging studies (60.9%) and laboratory tests (33.7%), and referring patients to consultants (31.2%). Most participants consider every patient as a potential threat in terms of a medical lawsuit (68.3%) and do not believe the courts can distinguish malpractice from complications (89.6%). Concerns and perceptions about medical liability lead neurosurgeons to practice defensive medicine. By avoiding high-risk surgery, ordering unnecessary diagnostic tests, and referring the patients to consultants, neurosurgeons try to minimize the risk of malpractice and protect themselves from legal risks, resulting in higher healthcare expenditure and longer treatment periods.

  10. Reentrant phase transitions and defensive alliances in social dilemmas with informed strategies

    Science.gov (United States)

    Szolnoki, Attila; Perc, Matjaž

    2015-05-01

    Knowing the strategy of an opponent in a competitive environment conveys obvious evolutionary advantages. But this information is costly, and the benefit of being informed may not necessarily offset the additional cost. Here we introduce social dilemmas with informed strategies, and we show that this gives rise to two cyclically dominant triplets that form defensive alliances. The stability of these two alliances is determined by the rotation velocity of the strategies within each triplet. A weaker strategy in a faster rotating triplet can thus overcome an individually stronger competitor. Fascinating spatial patterns favor the dominance of a single defensive alliance, but enable also the stable coexistence of both defensive alliances in very narrow regions of the parameter space. A continuous reentrant phase transition reveals before unseen complexity behind the stability of strategic alliances in evolutionary social dilemmas.

  11. Autonomous Aerial Ice Observation for Ice Defense

    Directory of Open Access Journals (Sweden)

    Joakim Haugen

    2014-10-01

    Full Text Available One of the tasks in ice defense is to gather information about the surrounding ice environment using various sensor platforms. In this manuscript we identify two monitoring tasks known in literature, namely dynamic coverage and target tracking, and motivate how these tasks are relevant in ice defense using RPAS. An optimization-based path planning concept is outlined for solving these tasks. A path planner for the target tracking problem is elaborated in more detail and a hybrid experiment, which consists of both a real fixed-wing aircraft and simulated objects, is included to show the applicability of the proposed framework.

  12. GNF Defense in Depth Update

    Energy Technology Data Exchange (ETDEWEB)

    Lingenfelter, Andrew A.; Schneider, Robert J.; Cantonwine, Paul E.; Moore, Brian; Rea, John; Crawford, Douglas C. [Global Nuclear Fuel, P.O. Box 780 M/C H25, Wilmington, NC 28402 (United States)

    2009-06-15

    Global Nuclear Fuel (GNF) has designed, fabricated, and placed into operation more than 9 million fuel rods in approximately 135 thousand assemblies. Customer satisfaction has always compelled GNF to reduce fuel rod failures (defined here as fuel rods that breach or leak in service), However, increasing success with and subsequent expectations for economic performance of nuclear reactor plants have raised broader Industry emphasis on fuel reliability. In 2005, GNF established its Defense-in-Depth (DID) Program for the purpose of focusing attention on the many aspects of fuel design, fabrication, performance, and utilization that affect fuel reliability as well as on the key methods that govern the utilization of GNF fuel. The Program is structured to address each of the identified in-service, fuel failure mechanisms. This paper provides a summary of GNF fuel performance, following previous updates. This paper will discuss recent GNF fuel reliability and channel performance, GNF2 introduction status, and methods. GNF's more recent fuel experience includes approximately 3.8 million GE11/13 (9x9) and GE12/14 (10x10) fuel rods, well over half of which are the GE12/14 design. (Those figures also include roughly 25,000 recently-introduced GNF2 fuel rods.) Reliability, expressed as annual, observed fuel failure rates (i.e., number of rods failed each year divided by the number of opportunities, or fuel rods in service), has improved for each year since 2005. The GNF fuel failure rate for years leading up to 2007 and 2008 has been on the order of 5 to 7 ppm (excluding the corrosion events of 2001-2003), and as of this writing (January 2009) the current in-service failure has decreased to around 1.5 ppm. Failures in GE14 fuel rod failures have been primarily due to debris-fretting (> 60%), with other failures being duty-related or yet undetermined. The only failure observed in GNF2 to date was a single, early-life debris failure in a bundle not equipped with GNF

  13. Towards a European Defense Identity Compatible with NATO

    Directory of Open Access Journals (Sweden)

    Rafael Estrella

    1997-12-01

    Full Text Available The European Security and Defense Identity (ESDI is a common but not defined goal, due to disagreements among Europeans on its political content. Reasons to explain this are related to the resistance to the idea of a European defense authority, fears of German hegemony, and the conviction that Europe is uncapable of defending herselfwithout the assistance of the United States. Estrella states that, with the end of the Cold War, some arguments opposing ESDI lost weight. However, the evolution and restructuring of NATO is not the product of European initiative, but rather an element of the U.S.strategy in Europe. Moreover, while the U.S. has a global strategy, Europe has not yet defined its security interests neither globally nor regionally. The author reviews the steps undertaken by NATO and the WEU towards further collaboration and the development of a European identity. He wonders whether there is enough political will either in Europe or the U.S. to overcome archaic views on trans-atlantic relations and narrow concepts about the future of Europe.

  14. Structural evaluation of multifunctional flood defenses

    NARCIS (Netherlands)

    Voorendt, M.Z.; Kothuis, Baukje; Kok, Matthijs

    2017-01-01

    Flood risk reduction aims to minimize losses in low-lying areas. One of the ways to reduce flood risks is to protect land by means of flood defenses. The Netherlands has a long tradition of flood protection and, therefore, a wide variety of technical reports written

  15. Excessive Profits of German Defense Contractors

    Science.gov (United States)

    2014-09-01

    its business unit Thyssen Krupp Marine Systems, is a German defense contractor. (2) Tognom AG Tognum AG owned the MTU Friedrichshafen GmbH before... Friedrichshafen provided engines for many ships of the German Navy and for German battle tanks, such as the Leopard I and Leopard II. MTU refers to the

  16. The Transferability and Retraining of Defense Engineers.

    Science.gov (United States)

    Rittenhouse, Carl H.

    This study was undertaken to describe any special barriers to the transfer of engineers from defense to commercial work, and to evaluate retraining and reorientation techniques that might help ease the transfer. Interviews and questionnaires were used to obtain data from about 2,100 engineers and 100 managers in 14 industries. Characteristics,…

  17. Pathogen Pressure Puts Immune Defense into Perspective

    NARCIS (Netherlands)

    Horrocks, Nicholas P. C.; Matson, Kevin D.; Tieleman, B. Irene

    2011-01-01

    The extent to which organisms can protect themselves from disease depends on both the immune defenses they maintain and the pathogens they face. At the same time, immune systems are shaped by the antigens they encounter, both over ecological and evolutionary time. Ecological immunologists often

  18. DETERMINATION OF DEFENSE MECHANISM IN Phaseolus ...

    African Journals Online (AJOL)

    Administrator

    Field studies were conducted to determine the role of defense mechanism in various parameters associated with plant protection subjected to UV-B radiation in Phaseolus trilobus Ait. commonly used as green manure and fodder. Spectrophotometric analysis showed that UV-B radiation decreases the chlorophyll content ...

  19. Defense.gov Special Report: Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2012 Fiscal Budget Published Feb. 15, 2011 Top Stories Commanders Cite Department is losing billions of dollars by Congress' failure to pass the department's fiscal 2011 budget . Gates told a Senate committee. Story Gates, Mullen Take Budget to Senate WASHINGTON, Feb. 17, 2011 - The

  20. Under Secretary of Defense (Comptroller) > Budget

    Science.gov (United States)

    functionalStatements OUSD(C) History FMR Budget Materials Budget Execution Financial Management Improving Financial Performance Reports Regulations Press Release | Budget Briefing | Transcripts: David L. Norquist, Under PDF document. Click on Excel icon for Excel document Overview - FY2019 Defense Budget Performance

  1. The fragility of the Brazilian Defense Ministry

    Directory of Open Access Journals (Sweden)

    Jorge Zaverucha

    2006-01-01

    Full Text Available The present article presents different phases that the Brazilian Defense Ministry has passed through, since its inception during Fernando Henrique Cardoso's second presidential term (1999-2002 until the current administration of Luís Inácio Lula da Silva (2003-2006, under its respective ministers of Defense. It has been seen as one of the important stages in the re-constitutionalization of the country, insofar as it establishes the submission of Armed Forces commanders to a civilian minister, and although some analysts have considered that such submission is actually achieved, we point here to the military resistance and insubordination to civil power that are the result of an authoritarian legacy. To the extent that the Ministry of Defense is unable to implement its own policies in which the military would be required to follow civilian guidance, this article concludes with considerations on the civil Defense Ministry's political and institutional fragility vis-a-vis military command. The latter has been able to retain high levels of decision making autonomy in its relationship to the Ministry and its structure.

  2. Defense waste transportation: cost and logistics studies

    International Nuclear Information System (INIS)

    Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

    1982-08-01

    Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport

  3. Defense.gov - Special Report - Cybersecurity

    Science.gov (United States)

    reduce vulnerability to cyber-attack attempts that occur regularly and are likely to continue for the together to protect cyberspace. U.S. Cyber Command Preparations Under Way WASHINGTON, March 16, 2010 - Preparations for the formal establishment of U.S. Cyber Command, which will operate and defend the Defense

  4. Department of Defense Education Activity. An Overview.

    Science.gov (United States)

    US Department of Defense, 2004

    2004-01-01

    DoDEA operates 223 public schools in 16 districts located in seven states, Puerto Rico, Guam, and 13 foreign countries to serve the children of military service members and Department of Defense civilian employees. Approximately 104,935 students are enrolled in DoDEA schools, with approximately 73,200 students in the DoDDS system, and…

  5. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  6. Preemptive strikes: Fear, hope, and defensive aggression.

    Science.gov (United States)

    Halevy, Nir

    2017-02-01

    Preemptive strikes are costly and harmful. Existing models of defensive aggression focus narrowly on the role fear plays in motivating preemptive strikes. Theoretically integrating the literatures on conflict, decision making, and emotion, the current research investigated how specific emotions associated with certainty or uncertainty, including fear, anger, disgust, hope, and happiness, influence preemptive strikes. Study 1 demonstrated that hope negatively predicts defensive exits from relationships in choice dilemmas. Studies 2 and 3 experimentally manipulated risk of being attacked in an incentivized, interactive decision making task-the Preemptive Strike Game. Risk of being attacked fueled preemptive strikes; reduced feelings of hope partially mediated this effect in Study 3. Studies 4 and 5 investigated preemptive strikes under uncertainty (rather than risk). In Study 4, reasoning about the factors that make one trustful of others curbed preemptive strikes; cogitating about the factors that underlie discrete emotions, however, did not influence defensive aggression. Study 5 demonstrated that the valence and uncertainty appraisals of incidental emotions interact in shaping preemptive strikes. Specifically, recalling an autobiographical emotional experience that produced hope significantly decreased attack rates relative to fear, happiness, and a control condition. Fear, anger, disgust, and happiness were either unrelated to preemptive strikes or showed inconsistent relationships with preemptive strikes across the 5 studies. These findings shed light on how emotions shape defensive aggression, advance knowledge on strategic choice under risk and uncertainty, and demonstrate hope's positive effects on social interactions and relationships. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  7. Innovation in the Defense Acquisition Enterprise

    Science.gov (United States)

    2015-12-01

    uni- versities in the fields of innovation and entrepreneurship . Many books and articles have been written on innovation, perhaps none more well...partners has been the possible loss of freedom to make their own IR&D invest- ment decisions. That was never my intent . I once ran a major defense

  8. Iraqi Civil Defense Headquarters Baghdad, Iraq

    National Research Council Canada - National Science Library

    Johnston, Angelina; O'Connor, Kevin; Rawal, Yogin

    2007-01-01

    .... The assessment team included two engineers/inspectors and three auditors/inspectors. The overall objective of the project was to fully renovate the Civil Defense Headquarters and other buildings on the site to become a fully operational and usable facility.

  9. DefenseLink Special: Veterans Day 2006

    Science.gov (United States)

    information so we can address your issue or question. U.S. Department of Defense Header Image (click to return especially important this year as America's military members put their lives in danger to protect the country Service. Story Cities Carry ASY Banner to Honor Past, Present Veterans WASHINGTON, Nov. 8, 2006 - Veterans

  10. Purchases of Consumable Items Transferred to the Defense Logistics Agency

    National Research Council Canada - National Science Library

    Young, Shelton

    1995-01-01

    Defense Management Report Decision 926, "Consolidation of Inventory Control Points," included a recommendation to transfer all consumable items managed by the Military Departments to the Defense Logistics Agency (DLA...

  11. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  12. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  13. Basic Dimensions of Financial Condition within the Defense Industry

    National Research Council Canada - National Science Library

    Bowden, Craig

    1998-01-01

    .... The primary purpose of this thesis was to analyze financial data from a sample of defense industry firms in order to determine the basic dimensions of financial condition in the defense industry...

  14. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  15. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    Who Should Read This Report and Why? Missile Defense Agency program managers who are responsible for the acquisition and management of targets used to test the Ballistic Missile Defense System should be interested in this report...

  16. Department of Defense Strategic Plan for Advanced Distributed Learning

    National Research Council Canada - National Science Library

    1999-01-01

    ...), requires the Secretary of Defense to develop a strategic plan for guiding and expanding distance learning initiatives within the Department of Defense, to include a provision for the expansion...

  17. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  18. Defense White Papers in the Americas: A Comparative Analysis

    National Research Council Canada - National Science Library

    Cope, John

    2002-01-01

    In preparation for the October 2000 Defense Ministerial of the Americas (DMA) in Manaus Brazil and at the request of the Office of the Secretary of Defense, the Institute for National Strategic Studies (INSS...

  19. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  20. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  1. Defense Acquisitions: Missile Defense Acquisition Strategy Generates Results but Delivers Less at a Higher Cost

    National Research Council Canada - National Science Library

    2007-01-01

    .... For example, the Ground-based Midcourse Defense (GMD) element successfully conducted its first end-to-end test of one engagement scenario, the element s first successful intercept test since 2002...

  2. The Defense Production Act of 1950: Vital Defense and Emergency Acquisition Authority for 2002

    National Research Council Canada - National Science Library

    Ruane, Matthew

    2002-01-01

    The September 11th attacks should inspire the government acquisition community to carefully study the Defense Production Act of 19502 to ensure that its powerful authorities over the civilian economy...

  3. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  4. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  5. Challenges in Defense Working Capital Fund Pricing: Analysis of the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    Keating, Edward

    2003-01-01

    ... $2 billion in expenditures per year, DFAS itself is a sizable portion of the DoD infrastructure Second, we believe the pricing issues that DFAS confronts are similar to those faced by other Defense Working Capital Fund (DWCF...

  6. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  7. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  8. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  9. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  10. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  11. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  12. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...

  13. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  14. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  15. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  16. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  17. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  18. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  19. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  20. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  1. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  2. 78 FR 32241 - Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed...

    Science.gov (United States)

    2013-05-29

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors; Notice of Closed Meeting AGENCY: National Intelligence University, Defense Intelligence Agency, Department of Defense. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the...

  3. 77 FR 32952 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2012-06-04

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: Department of Defense, Defense Intelligence Agency, National Intelligence University. ACTION: Notice of closed meeting. SUMMARY: Pursuant to the provisions of...

  4. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  5. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  6. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  7. Underground population defense structures in China

    Energy Technology Data Exchange (ETDEWEB)

    Wukasch, E.

    The design and construction ofunderground shelters to protect the Chinese population in the event of nuclear war are described. Built in the style of World War II air raid shelters and designed as neighborhood defense facilities, these are not judged to be adequate for nuclear defense needs, particularly the needs of urban populations. However, 80% of China's population is rural and 1/3 of this has lived underground for centuries in cliff dwellings and atrium houses. It is, therefore, concluded that China's rural population has a better chance the the population of any other country for long-term survival from the later consequences, as well as the immediate shock, of an urban nuclear attack. (LCL)

  8. Russia's defense spending and the economic decline

    Directory of Open Access Journals (Sweden)

    Susanne Oxenstierna

    2016-01-01

    Full Text Available The purpose of this article is to explore the development of Russian military spending in light of weak and negative growth of the Russian economy and to look at the reasons for the economic decline that has developed after the economic crisis in 2009 and is due to long-term internal structural factors that have existed since the mid-2000s. The confidence crisis resulting from Russia's aggression against Ukraine 2014, Western sanctions and falling oil prices has further aggravated these tendencies and the economy is now contracting. The main conclusions are that the share of the defense budget in GDP has risen substantially, but there is still a trade-off between defense and other public spending in the budget. Political reform would be necessary to implement market institutions and revive the economy.

  9. Defense waste processing facility startup progress report

    International Nuclear Information System (INIS)

    Iverson, D.C.; Elder, H.H.

    1992-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. About 83 million gallons of high level waste produced since operation began have been consolidated into 33 million gallons by evaporation at the waste tank farm. The Department of Energy has authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters, prior to emplacement in a federal repository. The DWPF is now mechanically complete and undergoing commissioning and run-in activities. Cold startup testing using simulated non-radioactive feeds is scheduled to begin in November 1992 with radioactive operation scheduled to begin in May 1994. While technical issues have been identified which can potentially affect DWPF operation, they are not expected to negatively impact the start of non-radioactive startup testing

  10. Defense Waste Processing Facility, Savannah River Plant

    International Nuclear Information System (INIS)

    After 10 years of research, development, and testing, the US Department of Energy is building a new facility which will prepare high-level radioactive waste for permanent disposal. The Defense Waste Processing Facility, known as the DWPF, will be the first production-scale facility of its kind in the United States. In the DWPF, high-level waste produced by defense activities at the Savannah River Plant will be processed into a solid form, borosilicate glass, suitable for permanent off-site geologic disposal. With construction beginning in the fall of 1983, the DWPT is scheduled to be operational in 1989. By 2005, the DWPF will have immobilized the backlog of high-level waste which has been accumulating in storage tanks at the Savannah River Plant since 1954. Canisters of the immobilized waste will then be ready for permanent disposal deep under the ground, safely isolated from the environment

  11. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  12. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  13. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  14. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  15. Assessment of Accelerated Acquisition of Defense Programs

    Science.gov (United States)

    2016-09-01

    Quadrennial Defense Review explicitly called for doubling production rates of ISR UAVs, including Global Hawk. By 2009, Global Hawks had logged over 25,000...Honeywell (Formerly AlliedSignal) turboprop engine, compared to the Predator’s 115 hp (86 kW) piston engine. The power increase allows the Reaper...on basic requirements subsequently translated into costs at least double initial estimates and years of schedule slippage. In other words a classic

  16. The cuticle and plant defense to pathogens

    Directory of Open Access Journals (Sweden)

    Jean-Pierre eMetraux

    2014-06-01

    Full Text Available The cuticle provides a physical barrier against water loss and protects against irradiation, xenobiotics and pathogens. Components of the cuticle are perceived by invading fungi and activate developmental processes during pathogenesis. In addition, cuticle alterations of various types induce a syndrome of reactions that often results in resistance to necrotrophs. This article reviews the current knowledge on the role of the cuticle in relation to the perception of pathogens and activation of defenses.

  17. Strategic nuclear policy and ballistic missile defense

    International Nuclear Information System (INIS)

    1981-01-01

    The article explains the problems of the antirockets (ABM) as they were part of the presentation Salt I 1972. It is a translation from the English of a publication of the Foreign Affairs Research Institute in London. A topical analysis of the strategic nuclear policy of the two superpowers and their attitudes in the question of ballistic missile defense are given by means of two monographies. (orig./HSCH) [de

  18. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    OpenAIRE

    Oleksandr Yu. Burov

    2016-01-01

    Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc.), and in everyday life (home computers, education, leisure). Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corr...

  19. Compatible Goals: Defense and Environmental Protection

    Science.gov (United States)

    1984-03-22

    Remedial Action Site. AD-P004 146 Treatment of Wastewater (Red Water ) Resulti g from TNT Trinitrotoluene) Purification. AD-P004 147 Location of Volatile... Availabilit C040e3 _Vafl" -,ior OEC 5 1984 Ths document has been appeoved Dist Spool.A distribution.Is unlimiedL..... .. . COMFATABLE GOALS : DEFENSE AND...surface water to the same good biological quality as the water entering the installation. 4. Conserve fossil fuel energy to the highest degree possi

  20. Defense Coastal/Estuarine Research Program (DCERP)

    Science.gov (United States)

    2007-09-19

    activities, splash points and Landing Craft Air Cushion (LCAC) operations) and non-military Base activities (e.g., sewage treatment , storm water runoff and...We will measure the metabolism of benthic microalgae, the water column, eelgrass, and any dominant macroalgae by developing series of photosynthesis...activities (storm water control and sewage treatment ). Defense Coastal/Estuarine Research Program (DCERP) Research Plan DCERP Research Plan 32 September 19

  1. Is Soviet Defense Policy Becoming Civilianized?

    Science.gov (United States)

    1990-08-01

    Larionov, a consultant to the institute, both at RAND and in Moscow; and Drs. Alexei Arbatov and Aleksandr Savelyev and several of their colleagues during...Soviet defense industry resources to civilian use is presented in Arthur J. Alexander , Perestroika and Change in Soviet Weapons Acquisition, The RAND...1986, especially pp. 101-102. 17 18 the more prominent younger specialists like Alexei Arbatov, Andrei Kokoshin, and Aleksandr Savelyev have long been

  2. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  3. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  4. Regional Strategic Appraisal of Central America

    Science.gov (United States)

    2003-04-07

    Central America’s multiple transitions (from war to peace, from military rule to civilian, freely and democratically elected, constitutional government...Centroamericanas ‘CFAC’: Un Instrumento de Integracion y Seguridad Regional,” Center for Hemispheric Defense Studies, REDES 2001, Panel for Strategic

  5. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  6. Defensive measures against hostile takeovers in Slovenia

    Directory of Open Access Journals (Sweden)

    Andrej Bertoncel

    2005-12-01

    Full Text Available This article summarizes the corporate takeover regime and defensive measures against hostile takeover bids in Slovenia. Although takeover legislation does not differentiate between hostile and friendly takeover, it prescribes the limitation of powers for the management of the target company, with the intention of preventing the use of defensive measures against the hostile takeover. In light of an expected rise in hostile takeover bids in Slovenia, the Corporate Act and the Takeover Act are analysed and accordingly the array of possible preventive measures as well as ad-hoc measures against hostile bids identified and evaluated for their anti-takeover effectiveness. A hostile takeover in Slovenia usually involves a hostile public tender offer at a substantial premium over the prevailing market price for a substantial percentage of the target company’s stock. Managers of target companies use in takeover battles a variety of defensive tactics, which could be controversial because they pose a conflict of interest for management. Duty of neutrality of the management of the target company during takeover process is therefore discussed in connection with the limitation of use of applicable ad hoc defence mechanisms in that period.

  7. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  8. Demeter's Resilience: an International Food Defense exercise.

    Science.gov (United States)

    Hennessey, Morgan; Kennedy, Shaun; Busta, Frank

    2010-07-01

    The National Center for Food Protection and Defense (NCFPD), which is led by the University of Minnesota, hosted an international food defense exercise on 27 to 29 May 2008. Established in 2004, NCFPD is a Department of Homeland Security Center of Excellence with the mission of defending the food system through research and education. Tabletop exercises are practice-based scenarios intended to mimic real life experiences. The objective of the exercise discussed in this article was to facilitate discussion to increase awareness among exercise participants of both the threat that would be posed by an intentional attack on the food supply and the international impact of such an attack. Through facilitated discussion, exercise participants agreed on the following themes: (i) recognition of a foodborne disease outbreak is driven by the characteristics of the illness rather than the actual number of ill individuals; (ii) during the course of a foodborne outbreak there are generally multiple levels of communication; (iii) a common case definition for a foodborne disease is difficult to develop on a global scale; and (iv) the safety and health of all individuals is the number one priority of all parties involved. Several challenges were faced during the development of the exercise, but these were overcome to produce a more robust exercise. The following discussion will provide an overview of the challenges and the strategies used to overcome them. The lessons learned provide insight into how to plan, prepare, and host an international food defense exercise.

  9. Variable Alkaloid Defenses in the Dendrobatid Poison Frog Oophaga pumilio are Perceived as Differences in Palatability to Arthropods.

    Science.gov (United States)

    Bolton, Sarah K; Dickerson, Kelsie; Saporito, Ralph A

    2017-03-01

    Conspicuously colored dendrobatid frogs sequester alkaloid defenses from dietary arthropods, resulting in considerable alkaloid variation among populations; however, little is known about how variation is perceived as a defense against predators. Previous studies have found variable alkaloids in the dendrobatid Oophaga pumilio to be associated with differences in toxicity to laboratory mice, suggesting variable defenses are important. Arthropods are natural predators that use chemoreception to detect prey, including frogs, and may therefore perceive variation in alkaloid profiles as differences in palatability. The goal of the present study is to determine how arthropods respond to variable alkaloid defenses in O. pumilio. Frog alkaloids were sampled from individual O. pumilio from ten geographic locations throughout the Bocas del Toro region of Panama and the Caribbean coast of Costa Rica. Alkaloid extracts were used in feeding bioassays with the vinegar fly Drosophila melanogaster and the ant Ectatomma ruidum. Both species of arthropods fed significantly less on frog alkaloid extracts when compared to controls, and differences in alkaloid palatability were observed among frog populations, as well as between sexes and life stages within a population. Differences in alkaloid quantity, richness, and type were the main predictors of arthropod palatability. Our findings also represent the first direct evidence of a palatability spectrum in a vertebrate that sequesters chemical defenses from dietary sources. Further, the presence of a palatability spectrum suggests that variable alkaloid defenses in O. pumilio are ecologically relevant and play an important role in natural predator-prey interactions, particularly with respect to arthropod predators.

  10. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  11. Regions Matter

    DEFF Research Database (Denmark)

    Laursen, Keld; Masciarelli, Francesca; Prencipe, Andrea

    2012-01-01

    capital at the regional level, with a large-scale data set of the innovative activities of a representative sample of 2,413 Italian manufacturing firms from 21 regions, and controlling for a large set of firm and regional characteristics, we find that being located in a region characterized by a high...

  12. Narcissism and defense mechanisms in women

    Directory of Open Access Journals (Sweden)

    Sabina Bele

    2014-06-01

    Full Text Available The purpose of this research was to examine how the level of covert and overt narcissism is connected to the frequency of the use of defense mechanisms such as denial, repression, regression, projection, compensation, projection, intellectualization, reaction formation, displacement, dissociation, and somatoform dissociation. We can distinguish healthy narcissism, an appropriate self-evaluation, from pathological narcissism, unrealistic self-evalutaion hiding sense of one's own unworthiness with self-idealization and grandiose thinking. When combined with low/no empathy and exploiting of others, one is diagnosed with narcissistic personality disorder. In this research we focused on narcissism as a personality trait, keeping in mind that we can differentiate between more covert or overt form of narcissism. We also focused on defense mechanisms protecting an individual from stimuli that are either endangering self-esteem or produce anxiety. Although their use is often unconscious, recent findings support the thesis that an individual can observe and report them. Our sample comprised 203 women. We used Narcissistic Personality Inventory, The Hypersensitive Narcissism Scale, The Life Style Index, The Dissociative Experience Scale, and Somatoform Dissociation Questionnaire. Results indicated that women with higher levels of covert narcissism as a personality trait use defense mechanisms, especially regression on earlier developmental stage, compensation deficits on other areas, projection unwanted or unacceptable aspects, reaction formation, and dissociation (absorption, depersonalization and derealization more often than women with higher levels of overt narcissism. The later use more compensation as a way of dealing with loss, intellectualization as a rational response instead of emotional one, and regression.

  13. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  14. Reagan Defense Forum: The Third Offset Strategy

    Science.gov (United States)

    2015-11-07

    guided weapons as you do, and have a homefield advantage. How would you do that? And the LRRDPP really, really did a great job in looking at that...The second thing was the Defense Science Board summer study on autonomy . To a person, every single person on the summer study said, we can’t prove...it, but we believe we are at an inflection point at an artificial intelligence and autonomy . How might we use that as an advantage in an offset

  15. Defensive Jurisprudence and Productivity Goals: Jabuticaba Consumerist

    Directory of Open Access Journals (Sweden)

    Miguel Luiz Barros Barreto de Oliveira

    2016-10-01

    Full Text Available This paper analyzes the application of so-called procedural defensive jurisprudence that values exacerbated rationalization of the judiciary activities, preventing the processing of judicial review in the higher courts, and its consequences in consumeristas indemnity processes. It analyzes the pressure to which judges are subjected, especially because of the need to comply with productivity goals. The construction work suggests the misconception of these imposed judicial policies to decrease the procedural stock since that attack the problem on screen superficially and do not solve the basic question.

  16. Drivers of Greek and Turkish Defense Spending

    Directory of Open Access Journals (Sweden)

    Waszkiewicz Grzegorz

    2016-09-01

    Full Text Available This paper evaluates the factors responsible for maintaining substantial military expenditures in Greece and Turkey. The presented research encompasses theoretical and empirical aspects. First, defense spending by both countries was analyzed based on statistical data from international sources. Next, the theoretical determinants of budgetary spending are reviewed, which consider political, economic and military factors behind high expenditures on the army in Greece and in Turkey. Finally, Granger causality tests is applied to determine whether a causal relation between variables exists in the case of these two countries.

  17. Defense Waste Processing Facility prototypic analytical laboratory

    International Nuclear Information System (INIS)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-01-01

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R ampersand D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R ampersand D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy

  18. Biotech Business Lessons for Defense Acquisition

    Science.gov (United States)

    2016-01-01

    repudiates what func- tional personnel hold dear—that their hurdles are vital to some moral or ethical responsibility to protect or safeguard...94 Strategic Studies Quarterly ♦ Summer 2016 Biotech Business Lessons for Defense Acquisition Col David L. Peeler Jr., USAF Abstract The desire to...examples and lessons from private business sectors would serve DOD interests well. ✵ ✵ ✵ ✵ ✵ Acquisition reform! No other two words so stress or trouble

  19. Indian Defense Procurements: Advantage Russia or USA?

    Science.gov (United States)

    2015-02-17

    premiers of both the countries. The recent visit of President Obama saw Mr. Modi breaking the protocol to greet him with a bear hug on his arrival at New...between Russia and US. 56 Ritesh Srivastava, India caught between Russia and US. 57 Ankit Panda , “Pakistan Courts Both US and Russia on Defense...www.indiatvnews.com/business/india/-india-invites-japan-to-join-rs-50000-crore- submarine-project-17058.html (accessed 3 February 2015). Panda , Ankit. “Pakistan

  20. Multicellular oxidant defense in unicellular organisms.

    OpenAIRE

    Ma, M; Eaton, J W

    1992-01-01

    Although catalase is thought to be a major defense against hydrogen peroxide (H2O2), the catalase activity within individual Escherichia coli fails to protect against exogenous H2O2. Contrary to earlier reports, we find that dilute suspensions of wild-type and catalase-deficient E. coli are identical in their sensitivity to H2O2, perhaps because even wild-type, catalase-positive E. coli cannot maintain an internal/external concentration gradient of this highly diffusible oxidant. However, con...

  1. Defense meteorological satellite measurements of total ozone

    International Nuclear Information System (INIS)

    Lovill, J.E.; Ellis, J.S.; Luther, F.M.; Sullivan, R.J.; Weichel, R.L.

    1992-01-01

    A multichannel filter radiometer (MFR) on Defense Meteorological Satellites (DMS) that measured total ozone on a global-scale from March 1977 - February 1980 is described. The total ozone data measured by the MFR were compared with total ozone data taken by surfaced-based Dobson spectrophotometers. When comparisons were made for five months, the Dobson spectrophotometer measured 2-5% more total ozone than the MFR. Comparisons between the Dobson spectrophotometer and the MFR showed a reduced RMS difference as the comparisons were made at closer proximity. A Northern Hemisphere total ozone distribution obtained from MFR data is presented

  2. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  3. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  4. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  5. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  6. 78 FR 36108 - Defense Federal Acquisition Regulation Supplement; Defense Trade Cooperation Treaties With...

    Science.gov (United States)

    2013-06-17

    ... and for foreign firms in their supply chains. The U.S. concluded the DTC Treaties with Australia and... respondent commended the Defense Acquisition Regulations (DAR) Council on recognizing the importance of the... established a Management Board to resolve such issues, adopted a detailed management plan, and conducted...

  7. 76 FR 11361 - Defense Federal Acquisition Regulation Supplement; Preservation of Tooling for Major Defense...

    Science.gov (United States)

    2011-03-02

    ... the ``preservation and storage of unique tooling associated with the production of hardware for a... agrees with the concept to sustain capability and supportability to the extent needed under major weapons... tooling associated with the production of hardware for a major defense acquisition program. DoD thinks...

  8. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  9. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  10. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  11. Ukraine's Foreign Policy: from Military Doctrine to Defense Security One

    Directory of Open Access Journals (Sweden)

    Александр Иванович Кузьмук

    2013-12-01

    Full Text Available The article considers the problem of reforming and developing Ukraine’s Armed Forces on the basis of the analysis of the key provisions of the Strategic defense bulletin adopted in 2012. The author proposes the ways of solving this problem and substantiates the transition in the defense planning from the military doctrine to the doctrine of Ukraine’s security and defense.

  12. Economic Assessment of FMDv Releases from the National Bio and Agro Defense Facility

    Science.gov (United States)

    Pendell, Dustin L.; Marsh, Thomas L.; Coble, Keith H.; Lusk, Jayson L.; Szmania, Sara C.

    2015-01-01

    This study evaluates the economic consequences of hypothetical foot-and-mouth disease releases from the future National Bio and Agro Defense Facility in Manhattan, Kansas. Using an economic framework that estimates the impacts to agricultural firms and consumers, quantifies costs to non-agricultural activities in the epidemiologically impacted region, and assesses costs of response to the government, we find the distribution of economic impacts to be very significant. Furthermore, agricultural firms and consumers bear most of the impacts followed by the government and the regional non-agricultural firms. PMID:26114546

  13. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  14. Enhancing U.S. Defenses Against Terrorist Air Attacks

    National Research Council Canada - National Science Library

    2004-01-01

    .... Air Force, law enforcement authorities, the Federal Aviation Administration, airport security personnel, and many other agencies share responsibility for closing gaps in our national air defenses...

  15. Electronic Warfare: Comprehensive Strategy Needed for Suppressing Enemy Air Defenses

    National Research Council Canada - National Science Library

    2001-01-01

    .... To achieve this suppression, the services use specialized aircraft designed to neutralize, destroy, or temporarily degrade enemy air defense systems through either physical attack or electronic warfare...

  16. Department of Defense Facilities Energy Conservation Policies and Spending

    National Research Council Canada - National Science Library

    Andrews, Anthony

    2008-01-01

    .... This report reviews energy conservation legislation and Executive Orders that apply to the Department of Defense, directives and instructions to the military departments and agencies on implementing...

  17. Comprehensiveness of the FY 1996 Other Defense Organizations Financial Statements

    National Research Council Canada - National Science Library

    1997-01-01

    The primary audit objective was to determine whether the Defense Finance and Accounting Service Indianapolis Center consistently and accurately compiled financial data received from field accounting...

  18. 77 FR 13013 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2012-03-05

    ... Organization Government Procurement Agreement and the Free Trade Agreements, as determined by the United States... 252 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System...

  19. Veiled Normalization: The Implications of Japanese Missile Defense

    National Research Council Canada - National Science Library

    Clarke, Timothy L

    2008-01-01

    Japan's development of a missile defense system has been accompanied by the acquisition of potentially offensive military assets, an increased command and control capability, significant restructuring...

  20. Lasers and particle beam for fusion and strategic defense

    International Nuclear Information System (INIS)

    Anon.

    1986-01-01

    This special issue of the Journal of Fusion Energy consists of the edited transscripts of a symposium on the applications of laser and particle beams to fusion and strategic defense. Its eleven papers discuss these topics: the Strategic Defense Initiative; accelerators for heavy ion fusion; rf accelerators for fusion and strategic defense; Pulsed power, ICF, and the Strategic Defense Initiative; chemical lasers; the feasibility of KrF lasers for fusion; the damage resistance of coated optic; liquid crystal devices for laser systems; fusion neutral-particle beam research and its contribution to the Star Wars program; and induction linacs and free electron laser amplifiers for ICF devices and directed-energy weapons

  1. Competition: A Means to Transform the Defense Industrial Base

    National Research Council Canada - National Science Library

    Hansen, Richard

    2003-01-01

    .... The defense acquisition process and its industrial base comprise a significant economic institution in need of transformation to ensure that research, development, and acquisition efforts remain...

  2. Achieving RCRA compliance in DOE defense waste management operations

    International Nuclear Information System (INIS)

    Frankhauser, W.A.; Shepard, M.D.

    1989-01-01

    The U.S. Department of Energy (DOE) generates significant volumes of radioactive mixed waste (RMW) through its defense-related activities. Defense RMW is co-regulated by DOE and the U.S. Environmental Protection Agency/State agencies in accordance with requirements of the Resource Conservation and Recovery Act (RCRA) and the Atomic Energy Act (AEA). This paper highlights some of the problems encountered in co-regulation and discusses achievements of the defense waste management program in integrating RCRA requirements into RMW operations. Defense waste sites are planning facility modifications and major new construction projects to develop treatment, storage and disposal capacity for existing RMW inventories and projected needs

  3. Accounting for Defense Logistics Agency Supply Management Receivables

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this part of the audit, we determined whether Defense Logistics Agency supply management receivables were accurately accounted for, classified, and reported in the Statement of Financial Position...

  4. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  5. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors endash the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. The report is necessarily based on a limited review of the defense production reactors. It does not address whether any of the reactors are ''safe,'' because such an analysis would involve a determination of acceptable risk endash a matter of obvious importance, but one that was beyond the purview of the committee. It also does not address whether the safety of the production reactors is comparable to that of commercial nuclear power stations, because even this narrower question extended beyond the charge to the committee and would have involved detailed analyses that the committee could not undertake

  6. Process arrangement options for Defense waste immobilization

    International Nuclear Information System (INIS)

    1980-02-01

    Current plans are to immobilize the SRP high-level liquid wastes in a high integrity form. Borosilicate glass was selected in 1977 as the reference waste form and a mjaor effort is currently underway to develop the required technology. A large new facility, referred to as the Defense Waste Processing Facility (DWPF) is being designed to carry out this mission, with project authorization targeted for 1982 and plant startup in 1989. However, a number of other process arrangements or manufacturing strategies, including staging the major elements of the project or using existing SRP facilities for some functions, have been suggested in lieu of building the reference DWPF. This study assesses these various options and compares them on a technical and cost basis with the DWPF. Eleven different manufacturing options for SRP defense waste solidification were examined in detail. These cases are: (1) vitrification of acid waste at current generation rate; (2) vitrification of current rate acid waste and caustic sludge; (3 and 4) vitrification of the sludge portion of neutralized waste; (5) decontamination of salt cake and storage of concentrated cesium and strontium for later immobilization; (6) processing waste in a facility with lower capacity than the DWPF; (7) processing waste in a combination of existing and new facilities; (8) waste immobilization in H Canyon; (9) vitrification of both sludge and salt; (10) DWPF with onsite storage; (11) deferred authorization of DWPF

  7. Mental imagery affects subsequent automatic defense responses

    Directory of Open Access Journals (Sweden)

    Muriel A Hagenaars

    2015-06-01

    Full Text Available Automatic defense responses promote survival and appropriate action under threat. They have also been associated with the development of threat-related psychiatric syndromes. Targeting such automatic responses during threat may be useful in populations with frequent threat exposure. Here, two experiments explored whether mental imagery as a pre-trauma manipulation could influence fear bradycardia (a core characteristic of freezing during subsequent analogue trauma (affective picture viewing. Image-based interventions have proven successful in the treatment of threat-related disorders, and are easily applicable. In Experiment 1 43 healthy participants were randomly assigned to an imagery script condition. Participants executed a passive viewing task with blocks of neutral, pleasant and unpleasant pictures after listening to an auditory script that was either related (with a positive or a negative outcome or unrelated to the unpleasant pictures from the passive viewing task. Heart rate was assessed during script listening and during passive viewing. Imagining negative related scripts resulted in greater bradycardia (neutral-unpleasant contrast than imagining positive scripts, especially unrelated. This effect was replicated in Experiment 2 (N = 51, again in the neutral-unpleasant contrast. An extra no-script condition showed that bradycardia was not induced by the negative related script, but rather that a positive script attenuated bradycardia. These preliminary results might indicate reduced vigilance after unrelated positive events. Future research should replicate these findings using a larger sample. Either way, the findings show that highly automatic defense behavior can be influenced by relatively simple mental imagery manipulations.

  8. Regional development and regional policy

    OpenAIRE

    Šabić, Dejan; Vujadinović, Snežana

    2017-01-01

    Economic polarization is a process that is present at global, national and regional level. Economic activity is extremely spatially concentrated. Cities and developed regions use the agglomeration effect to attract labor and capital, thus achieving more favorable economic conditions than the agrarian region. Scientific research and European experiences over the past decades have contributed to the discrepancy among theorists about the causes and consequences of regional inequalities. Regional...

  9. Acurácia dos indicadores de risco do Programa de Defesa da Vida dos Lactentes em região do Estado de São Paulo, Brasil Accuracy of risk indicators of an Infant Life Defense Program in a region of S. Paulo State, Brazil

    Directory of Open Access Journals (Sweden)

    Davi Rumel

    1992-02-01

    Full Text Available O Programa de Desfesa da Vida dos Lactentes da Secretaria de Higiene e Saúde do Munícipio de Bauru tem um critério diagnóstico para a inclusão de recém-nascidos dentro do programa. Este critério é formado pela combinação de 11 indicadores clínicos e sociais de risco à mortalidade infantil de fácil obtenção no momento do parto. Decidiu-se propor um critério diagnóstico alternativo, a partir dos mesmos indicadores clínicos e sociais, com maior sensibilidade para a mesma proporção de crianças matriculadas no Programa. Os dados hospitalares foram coletados no período de 11 de maio de 1986 a 10 de novembro de 1987. A mortalidade compreende o período entre 7 dias e 6 meses, que é o período de seguimento das crianças pelo Programa. Calculou-se para cada indicador o risco relativo bruto numa análise univariada e o risco relativo ajustado pela técnica de regressão logística. Criou-se um sistema de pontuação baseado na somatória dos excessos de risco de cada indicador.The Infant Life Defense Program of Health Department of Bauru City SP, Brazil, has diagnostic criteria for the inclusion of newborns. The diagnostic criteria combine eleven social and clinical indices of infant mortality risk, defined by in the light of a review of the literature and previous case studies. The indices are easily collected at the hospitals during delivery. The objective of this study is to propose an alternative diagnostic criteria, using the same social and clinical indices, of greater sensitivity and same proportion of children included in the program. The data on the newborns were collected between May 11, 1986 and November 10, 1987. The mortality period was defined as between 7 days and 6 months, which was the follow-up period for the infants enrolled in the program. The method of analysis was the determination for each index of the crude relative risk in a univariate analysis and the adjusted relative risk using the logistic regression

  10. 32 CFR 1605.8 - Staff of Region Headquarters for Selective Service.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Staff of Region Headquarters for Selective... SERVICE SYSTEM SELECTIVE SERVICE SYSTEM ORGANIZATION Region Administration § 1605.8 Staff of Region..., the staff of each region for Selective Service shall consist of as many officers, either military or...

  11. Large scale patterns of antimicrofouling defenses in the hard coral Pocillopora verrucosa in an environmental gradient along the Saudi Arabian coast of the Red Sea.

    Science.gov (United States)

    Wahl, Martin; Al Sofyani, Abdulmohsin; Saha, Mahasweta; Kruse, Inken; Lenz, Mark; Sawall, Yvonne

    2014-01-01

    Large scale patterns of ecologically relevant traits may help identify drivers of their variability and conditions beneficial or adverse to the expression of these traits. Antimicrofouling defenses in scleractinian corals regulate the establishment of the associated biofilm as well as the risks of infection. The Saudi Arabian Red Sea coast features a pronounced thermal and nutritional gradient including regions and seasons with potentially stressful conditions to corals. Assessing the patterns of antimicrofouling defenses across the Red Sea may hint at the susceptibility of corals to global change. We investigated microfouling pressure as well as the relative strength of 2 alternative antimicrofouling defenses (chemical antisettlement activity, mucus release) along the pronounced environmental gradient along the Saudi Arabian Red Sea coast in 2 successive years. Microfouling pressure was exceptionally low along most of the coast but sharply increased at the southernmost sites. Mucus release correlated with temperature. Chemical defense tended to anti-correlate with mucus release. As a result, the combined action of mucus release and chemical antimicrofouling defense seemed to warrant sufficient defense against microbes along the entire coast. In the future, however, we expect enhanced energetic strain on corals when warming and/or eutrophication lead to higher bacterial fouling pressure and a shift towards putatively more costly defense by mucus release.

  12. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  13. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  14. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  15. 78 FR 11947 - 60-Day Notice of Proposed Information Collection: Directorate of Defense Trade Controls...

    Science.gov (United States)

    2013-02-20

    ...: Directorate of Defense Trade Controls Information Collection: Export Declaration of Defense Technical Data or... . SUPPLEMENTARY INFORMATION: Title of Information Collection: Export Declaration of Defense Technical Data or... collection: Actual export of defense technical data and defense services must be reported directly to the...

  16. 75 FR 43944 - Membership of the Defense Logistics Agency (DLA) Senior Executive Service (SES) Performance...

    Science.gov (United States)

    2010-07-27

    ... CONTACT: Ms. Lisa Novajosky, SES Program Manager, DLA Human Resources (J-14), Defense Logistics Agency... DEPARTMENT OF DEFENSE Defense Logistics Agency Membership of the Defense Logistics Agency (DLA... management of the SES cadre. DATES: Effective Date: September 16, 2010. ADDRESSES: Defense Logistics Agency...

  17. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  18. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  19. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  20. Structural region

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Structural region. The two groups had 4 substitutions similar to Yawat strain. The Yawat strain had 5 unique mutations. 3 in the E2 region and 2 in the E1 region. The mutation, I702V (E2), though different from all the recent Indian and Reunion sequences was similar ...

  1. Changes in plant defense chemistry (pyrrolizidine alkaloids) revealed through high-resolution spectroscopy

    Science.gov (United States)

    Carvalho, Sabrina; Macel, Mirka; Schlerf, Martin; Moghaddam, Fatemeh Eghbali; Mulder, Patrick P. J.; Skidmore, Andrew K.; van der Putten, Wim H.

    2013-06-01

    Plant toxic biochemicals play an important role in defense against natural enemies and often are toxic to humans and livestock. Hyperspectral reflectance is an established method for primary chemical detection and could be further used to determine plant toxicity in the field. In order to make a first step for pyrrolizidine alkaloids detection (toxic defense compound against mammals and many insects) we studied how such spectral data can estimate plant defense chemistry under controlled conditions. In a greenhouse, we grew three related plant species that defend against generalist herbivores through pyrrolizidine alkaloids: Jacobaea vulgaris, Jacobaea erucifolia and Senecio inaequidens, and analyzed the relation between spectral measurements and chemical concentrations using multivariate statistics. Nutrient addition enhanced tertiary-amine pyrrolizidine alkaloids contents of J. vulgaris and J. erucifolia and decreased N-oxide contents in S. inaequidens and J. vulgaris. Pyrrolizidine alkaloids could be predicted with a moderate accuracy. Pyrrolizidine alkaloid forms tertiary-amines and epoxides were predicted with 63% and 56% of the variation explained, respectively. The most relevant spectral regions selected for prediction were associated with electron transitions and Csbnd H, Osbnd H, and Nsbnd H bonds in the 1530 and 2100 nm regions. Given the relatively low concentration in pyrrolizidine alkaloids concentration (in the order of mg g-1) and resultant predictions, it is promising that pyrrolizidine alkaloids interact with incident light. Further studies should be considered to determine if such a non-destructive method may predict changes in PA concentration in relation to plant natural enemies. Spectroscopy may be used to study plant defenses in intact plant tissues, and may provide managers of toxic plants, food industry and multitrophic-interaction researchers with faster and larger monitoring possibilities.

  2. Defense Department funds advanced military wireless networks research

    OpenAIRE

    Crumbley, Liz

    2005-01-01

    The U.S. Department of Defense has awarded a $246,000 Defense University Research Instrumentation Program (DURIP) grant to researchers in Virginia Tech's Bradley Department of Electrical and Computer Engineering for advanced research on wireless communications networks that are critical during military maneuvers.

  3. Defense Agencies Initiative Increment 2 (DAI Inc 2)

    Science.gov (United States)

    2016-03-01

    module. In an ADM dated September 23, 2013, the MDA established Increment 2 as a MAIS program to include budget formulation; grants financial...2016 Major Automated Information System Annual Report Defense Agencies Initiative Increment 2 (DAI Inc 2) Defense Acquisition Management...President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then

  4. Adversity Quotient and Defense Mechanism of Secondary School Students

    Science.gov (United States)

    Nikam, Vibhawari B.; Uplane, Megha M.

    2013-01-01

    The present study was conducted to explore the relationship between Adversity Quotient (AQ) and Defense Mechanism (DM) of secondary school students. The aim of the study was to ascertain relationship between Adversity Quotient and Defense mechanism i. e. Turning against object (TAO), Projection (PRO), Turning against self (TAS), Principalisation…

  5. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  6. Induction of phenolics, lignin and key defense enzymes in eggplant ...

    African Journals Online (AJOL)

    Elicitors are capable of mimicking the perception of a pathogen by a plant, thereby triggering induction of a sophisticated defense response in plants. In this study, we investigated an induced resistance in eggplant in respect to cell wall strengthening and defense enzyme activation affected by four elicitors such as, chitosan ...

  7. 8 CFR 274a.4 - Good faith defense.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Good faith defense. 274a.4 Section 274a.4... ALIENS Employer Requirements § 274a.4 Good faith defense. An employer or a recruiter or referrer for a fee for employment who shows good faith compliance with the employment verification requirements of...

  8. 29 CFR 570.128 - Good faith defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false Good faith defense. 570.128 Section 570.128 Labor... Provisions of the Fair Labor Standards Act of 1938, as Amended Enforcement § 570.128 Good faith defense. Link... commerce goods which he acquired in good faith in reliance on written assurance from the producer...

  9. Defense.gov Special Report: Suicide Prevention and Awareness - 2013

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: Suicide Prevention and Awareness Updated July 23 , 2014 Suicide Prevention and Awareness Stand by Them Take a Stand Emotional strain can be the most nation's support the most. Top Stories Suicide Prevention Takes Courage, Communication, Official Says The

  10. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  11. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  12. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  13. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  14. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  15. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  16. Emotion dysregulation and interpersonal problems : The role of defensiveness

    NARCIS (Netherlands)

    Garofalo, C.; Velotti, Patrizia; Zavattini, Giulio Cesare; Kosson, D.S.

    2017-01-01

    Despite evidence that individual differences in defensiveness (typically measured with social desirability scales) may affect associations among self-report measures, little is known about the impact of defensiveness in the well-established relations between self-report emotion dysregulation and

  17. 29 CFR 790.13 - General nature of defense.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false General nature of defense. 790.13 Section 790.13 Labor... Administrative Regulations, Etc. § 790.13 General nature of defense. (a) Under the provisions of sections 9 and... Fair Labor Standards Act, where the employer pleads and proves that “the act or omission complained of...

  18. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  19. Costs and benefits of priming for defense in Arabidopsis

    NARCIS (Netherlands)

    Hulten, M.H.A. van; Pelser, M.; Loon, L.C. Van; Pieterse, C.M.J.; Ton, J.

    2006-01-01

    Induced resistance protects plants against a wide spectrum of diseases; however, it can also entail costs due to the allocation of resources or toxicity of defensive products. The cellular defense responses involved in induced resistance are either activated directly or primed for augmented

  20. 75 FR 11868 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-03-12

    ... Colorado Springs Marriott hotel, 5580 Tech Center Drive, Colorado Springs, CO 80919. Written statements may.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... will review all timely submissions with the Department of Defense Task Force on the Prevention of...

  1. 75 FR 5289 - Defense Health Board (DHB) Meeting

    Science.gov (United States)

    2010-02-02

    ... meeting will be held at the Doubletree Hotel Cocoa Beach, 2080 North Atlantic Avenue, Cocoa Beach, Florida.... Additional information, agenda updates, and meeting registration are available online at the Defense Health... next open meeting. The Designated Federal Officer will review all timely submissions with the Defense...

  2. Defense Contracting in Iraq: Issues and Options for Congress

    Science.gov (United States)

    2008-08-15

    9 Rapid Acquisition Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Audits, Investigations, and...01468/]. 5 LOGCAP contracts have been previously awarded for work in Rwanda, Haiti, Saudi Arabia, Kosovo, Ecuador, Q atar , Italy, southeastern Europe...Acquisition Methods . Section 811 of the FY2005 National Defense Authorization Act32 grants the Secretary of Defense limited rapid acquisition

  3. NATO and EU/European Defense Initiatives: Competitive or Complementary

    National Research Council Canada - National Science Library

    Muckel, Hubert

    2006-01-01

    .... This paper analyzes the current status of NATO and the European Union (EU) defense initiatives examines national objectives and interests of European key-players and the US and evaluates the aspects of competitiveness or complement of NATO and EU defense initiatives.

  4. Animal defense strategies and anxiety disorders

    Directory of Open Access Journals (Sweden)

    Rosana Shuhama

    2007-03-01

    Full Text Available Anxiety disorders are classified according to symptoms, time course and therapeutic response. Concurrently, the experimental analysis of defensive behavior has identified three strategies of defense that are shared by different animal species, triggered by situations of potential, distal and proximal predatory threat, respectively. The first one consists of cautious exploration of the environment for risk assessment. The associated emotion is supposed to be anxiety and its pathology, Generalized Anxiety Disorder. The second is manifested by oriented escape or by behavioral inhibition, being related to normal fear and to Specific Phobias, as disorders. The third consists of disorganized flight or complete immobility, associated to dread and Panic Disorder. Among conspecific interactions lies a forth defense strategy, submission, that has been related to normal social anxiety (shyness and to Social Anxiety Disorder. In turn, Posttraumatic Stress Disorder and Obsessive-Compulsive Disorder do not seem to be directly related to innate defense reactions. Such evolutionary approach offers a reliable theoretical framework for the study of the biological determinants of anxiety disorders, and a sound basis for psychiatric classification.Os transtornos de ansiedade são classificados conforme a sintomatologia, decurso temporal e resposta terapêutica. Paralelamente, a análise experimental dos comportamentos de defesa identificou três estratégias comuns a diferentes espécies de animais, desencadeadas por situações de perigo predatório potencial, distal ou proximal, respectivamente. A primeira consiste na investigação cautelosa do ambiente, avaliando o risco. Supõe-se que a emoção que a acompanha seja a ansiedade e sua patologia, o Transtorno de Ansiedade Generalizada. A segunda é expressa pela fuga orientada ou pela inibição comportamental, sendo a emoção correlata o medo, e a patologia representada pelas Fobias Específicas. Finalmente, a

  5. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  6. Defense waste processing facility precipitate hydrolysis process

    International Nuclear Information System (INIS)

    Doherty, J.P.; Eibling, R.E.; Marek, J.C.

    1986-03-01

    Sodium tetraphenylborate and sodium titanate are used to assist in the concentration of soluble radionuclide in the Savannah River Plant's high-level waste. In the Defense Waste Processing Facility, concentrated tetraphenylborate/sodium titanate slurry containing cesium-137, strontium-90 and traces of plutonium from the waste tank farm is hydrolyzed in the Salt Processing Cell forming organic and aqueous phases. The two phases are then separated and the organic phase is decontaminated for incineration outside the DWPF building. The aqueous phase, containing the radionuclides and less than 10% of the original organic, is blended with the insoluble radionuclides in the high-level waste sludge and is fed to the glass melter for vitrification into borosilicate glass. During the Savannah River Laboratory's development of this process, copper (II) was found to act as a catalyst during the hydrolysis reactions, which improved the organic removal and simplified the design of the reactor

  7. [Bio-terrorism, bio-defense, bioethics].

    Science.gov (United States)

    Kottow, Miguel

    2003-01-01

    The terrorist attacks launched on September 11, 2001, ignited fear of further aggression with biological weapons, leading to a discourse and allocation of resources for both defensive and dissuasive/ offensive use in order to counteract such threats. Many such measures involved the investigation and production of biological agents, and the public health field has been called upon to participate in these strategic efforts. Participation by health programs is in moral contradiction with military tactics and should be limited to protecting the health of the purportedly threatened population, in itself a difficult task due to the numerous imponderable factors. The additional resources being made available to public health are largely conditioned on their strategic military application, leaving traditional public health care in its chronic state of insufficient funding and non-egalitarian allocation.

  8. Overview - Defense Waste Processing Facility Operating Experience

    International Nuclear Information System (INIS)

    Norton, M.R.

    2002-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the world's largest radioactive waste vitrification facility. Radioactive operations began in March 1996 and over 1,000 canisters have been produced. This paper presents an overview of the DWPF process and a summary of recent facility operations and process improvements. These process improvements include efforts to extend the life of the DWPF melter, projects to increase facility throughput, initiatives to reduce the quantity of wastewater generated, improved remote decontamination capabilities, and improvements to remote canyon equipment to extend equipment life span. This paper also includes a review of a melt rate improvement program conducted by Savannah River Technology Center personnel. This program involved identifying the factors that impacted melt rate, conducting small scale testing of proposed process changes and developing a cost effective implementation plan

  9. Safety issues at the defense production reactors

    International Nuclear Information System (INIS)

    1987-01-01

    The United States produces plutonium and tritium for use in nuclear weapons at the defense production reactors - the N Reactor in Washington and the Savannah River reactors in South Carolina. This report reaches general conclusions about the management of those reactors and highlights a number of safety and technical issues that should be resolved. The report provides an assessment of the safety management, safety review, and safety methodology employed by the Department of Energy and the private contractors who operate the reactors for the federal government. This report examines the safety objective established by the Department of Energy for the production reactors and the process the Department of its contractors use to implement the objective; focuses on a variety of uncertainties concerning the production reactors, particularly those related to potential vulnerabilities to severe accidents; and identifies ways in which the DOE approach to management of the safety of the production reactors can be improved

  10. History of Hanford Site Defense Production (Brief)

    International Nuclear Information System (INIS)

    GERBER, M.S.

    2001-01-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history

  11. News/High speed oil defense boat

    Energy Technology Data Exchange (ETDEWEB)

    1978-01-01

    An oil defense boat that can travel at 30 knots to the scene of a spill and surround the polluted area or protect a nearby beach or harbor, with a 200 m floating plastic barrier within 20 minutes, has been developed by Vator Oy of Helsinki in association with the Finnish Board of Navigation. The Vator 18T boat, which can carry a crew of three or four, has a trimaran glass reinforced plastic hull. The floating plastic barrier (Nokia SUP Spillbooms) is produced by the Oy Nokia A.B., Cable Works Division of Helsinki and is made of a PVC-coated fabric enclosing floats of polyethylene foam and either chain ballast or iron sinkers.

  12. Handbook of cosmic hazards and planetary defense

    CERN Document Server

    Allahdadi, Firooz

    2015-01-01

    Covers in a comprehensive fashion all aspects of cosmic hazards and possible strategies for contending with these threats through a comprehensive planetary defense strategy. This handbook brings together in a single reference work a rich blend of information about the various types of cosmic threats that are posed to human civilization by asteroids, comets, bolides, meteors, solar flares and coronal mass ejections, cosmic radiation and other types of threats that are only recently beginning to be understood and studied, such as investigation of the “cracks” in the protective shield provided by the Van Allen belts and the geomagnetosphere, of matter-antimatter collisions, orbital debris and radiological or biological contamination. Some areas that are addressed involve areas about which there is a good deal of information that has been collected for many decades by multiple space missions run by many different space agencies, observatories and scientific researchers. Other areas involving research and ...

  13. Environmental information document defense waste processing facility

    International Nuclear Information System (INIS)

    1981-07-01

    This report documents the impact analysis of a proposed Defense Waste Processing Facility (DWPF) for immobilizing high-level waste currently being stored on an interim basis at the Savannah River Plant (SRP). The DWPF will process the waste into a form suitable for shipment to and disposal in a federal repository. The DWPF will convert the high-level waste into: a leach-resistant form containing above 99.9% of all the radioactivity, and a residue of slightly contaminated salt. The document describes the SRP site and environs, including population, land and water uses; surface and subsurface soils and waters; meteorology; and ecology. A conceptual integrated facility for concurrently producing glass waste and saltcrete is described, and the environmental effects of constructing and operating the facility are presented. Alternative sites and waste disposal options are addressed. Also environmental consultations and permits are discussed

  14. Building Stakeholder Trust: Defensible Government Decisions - 13110

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

    2013-07-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the

  15. Building Stakeholder Trust: Defensible Government Decisions - 13110

    International Nuclear Information System (INIS)

    Franklin, Victor A.

    2013-01-01

    Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of

  16. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  17. The topological defense in SIS epidemic models

    International Nuclear Information System (INIS)

    Arbore, Andrea; Fioriti, Vincenzo; Chinnici, Marta

    2016-01-01

    The spreading of dangerous malware or faults in inter-dependent networks of electronics devices has raised deep concern, because from the ICT networks infections may propagate to other Critical Infrastructures producing the well-known domino or cascading effect. Researchers are attempting to develop a high level analysis of malware propagation discarding software details, in order to generalize to the maximum extent the defensive strategies. For example, it has been suggested that the maximum eigenvalue of the network adjacency matrix could act as a threshold for the malware’s spreading. This leads naturally to use the spectral graph theory to identify the most critical and influential nodes in technological networks. Many well-known graph parameters have been studied in the past years to accomplish the task. In this work, we test our AV11 algorithm showing that outperforms degree, closeness, betweenness centrality and the dynamical importance.

  18. ["Animal hypnosis" and defensive dominant, behavioral aspect].

    Science.gov (United States)

    Pavlygina, R A; Galashina, A G; Bogdanov, A V

    2002-01-01

    A stationary excitation focus produced in the sensorimotor cortex of a rabbit by rhythmic electrodermal paw stimulation was manifested in the reaction to a testing sound stimulus earlier indifferent for the animal. Regardless of the stimulated paw (left or right), reactions to the testing stimuli appeared approximately in the equal percent of cases (70.7% and 71.5%, respectively). After a single-trial induction of the "animal hypnosis" state, it was difficult to produce the dominant focus by simulation of the left paw, whereas the results of the right-paw stimulation did not differ from those obtained during control stimulation. Consequently, the influence of hypnosis on defensive stationary excitation foci in different hemispheres was not the same.

  19. Artificial Intelligence and the Future of Defense

    DEFF Research Database (Denmark)

    De Spiegeleire, Stephan; Maas, Matthijs Michiel; Sweijs, Tim

    Artificial intelligence (AI) is on everybody’s minds these days. Most of the world’s leading companies are making massive investments in it. Governments are scrambling to catch up. Every single one of us who uses Google Search or any of the new digital assistants on our smartphones has witnessed...... suggests that the advent of artificial super-intelligence (i.e. AI that is superior across the board to human intelligence), which many experts now put firmly within the longer-term planning horizons of our DSOs, presents us with unprecedented risks but also opportunities that we have to start to explore....... The report contains an overview of the role that ‘intelligence’ - the computational part of the ability to achieve goals in the world - has played in defense and security throughout human history; a primer on AI (what it is, where it comes from and where it stands today - in both civilian and military...

  20. Impact of defense conversion and US response

    International Nuclear Information System (INIS)

    Montanarelli, N.

    1994-01-01

    Conversion from military to civilian products due to defense conversion after the end of the Cold War takes a long as 20 years. In USA there are over 50 government programs funded to assist in defence conversion. This paper concentrates on the three major programs that will have the greatest impact on the economy, in the framework of the issues and needs of American industry. Federal government and US industry are making a considerable effort to transform how to do business today. One of the most important emerging themes in the federal program is international competitiveness. Large federal expenditures are made to support research and development that will increase productivity, thereby helping industry in global economic competition. This, in turn will play a key role in absorbing a large quantity od resources affected by the end of the Cold War

  1. Defense transuranic waste program strategy document

    International Nuclear Information System (INIS)

    1982-07-01

    This document summarizes the strategy for managing transuranic (TRU) wastes generated in defense and research activities regulated by the US Department of Energy. It supercedes a document issued in July 1980. In addition to showing how current strategies of the Defense Transuranic Waste Program (DTWP) are consistent with the national objective of isolating radioactive wastes from the biosphere, this document includes information about the activities of the Transuranic Lead Organization (TLO). To explain how the DTWP strategy is implemented, this document also discusses how the TLO coordinates and integrates the six separate elements of the DTWP: (1) Waste Generation Site Activities, (2) Storage Site Activities, (3) Burial Site Activities, (4) Technology Development, (5) Transportation Development, and (6) Permanent Disposal. Storage practices for TRU wastes do not pose short-term hazards to public health and safety or to the environment. Isolation of TRU wastes in a deep-mined geologic repository is considered the most promising of the waste disposal alternatives available. This assessment is supported by the DOE Record of Decision to proceed with research and development work at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico - a deep-mined geologic research and development project. In support of the WIPP research project and the permanent disposal of TRU waste, the DTWP strategy for the near term will concentrate on completion of procedures and the design and construction of all facilities necessary to certify newly-generated (NG) and stored TRU wastes for emplacement in the WIPP. In addition, the strategy involves evaluating alternatives for disposing of some transuranic wastes by methods which may allow for on-site disposal of these wastes and yet preserve adequate margins of safety to protect public health and the environment

  2. Evaluating Moving Target Defense with PLADD

    Energy Technology Data Exchange (ETDEWEB)

    Jones, Stephen T. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Outkin, Alexander V. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Gearhart, Jared Lee [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Hobbs, Jacob Aaron [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Siirola, John Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Phillips, Cynthia A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Verzi, Stephen Joseph [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Tauritz, Daniel [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Mulder, Samuel A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States); Naugle, Asmeret Bier [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-15

    This project evaluates the effectiveness of moving target defense (MTD) techniques using a new game we have designed, called PLADD, inspired by the game FlipIt [28]. PLADD extends FlipIt by incorporating what we believe are key MTD concepts. We have analyzed PLADD and proven the existence of a defender strategy that pushes a rational attacker out of the game, demonstrated how limited the strategies available to an attacker are in PLADD, and derived analytic expressions for the expected utility of the game’s players in multiple game variants. We have created an algorithm for finding a defender’s optimal PLADD strategy. We show that in the special case of achieving deterrence in PLADD, MTD is not always cost effective and that its optimal deployment may shift abruptly from not using MTD at all to using it as aggressively as possible. We believe our effort provides basic, fundamental insights into the use of MTD, but conclude that a truly practical analysis requires model selection and calibration based on real scenarios and empirical data. We propose several avenues for further inquiry, including (1) agents with adaptive capabilities more reflective of real world adversaries, (2) the presence of multiple, heterogeneous adversaries, (3) computational game theory-based approaches such as coevolution to allow scaling to the real world beyond the limitations of analytical analysis and classical game theory, (4) mapping the game to real-world scenarios, (5) taking player risk into account when designing a strategy (in addition to expected payoff), (6) improving our understanding of the dynamic nature of MTD-inspired games by using a martingale representation, defensive forecasting, and techniques from signal processing, and (7) using adversarial games to develop inherently resilient cyber systems.

  3. Defense Sector Consolidation: Will Consolidation Within the Defense Sector Improve the Financial Performance of Defense Contractors While, Simultaneously Yielding Cost Savings to Taxpayers

    National Research Council Canada - National Science Library

    Martin, Chinyelu M

    2005-01-01

    ...? Would there be an income transfer from taxpayers to shareholders? Very Large, defense focused conglomerates were/are being formed, increasing the bargaining position of the few firms that remain in the market...

  4. Cytosine deletion at AP2-box region of HSP70 promoter and its ...

    Indian Academy of Sciences (India)

    of thermotolerance in cells (Leung et al. 1996). ... region of HSP70 significantly affected cellular thermotol- erance ... The double PCR-RFLP using ScrFI confirmed the occur- ... suade of HSP70 on defense of proteins related to respiration.

  5. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  6. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  7. Effector-triggered immunity: from pathogen perception to robust defense.

    Science.gov (United States)

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  8. Defenses and morality: Adam Smith, Sigmund Freud, and contemporary psychoanalysis.

    Science.gov (United States)

    Gabrinetti, Paul A; Özler, Sule

    2014-10-01

    In this paper we follow the development and transmission of moral learning from Adam Smith's impartial spectator to Sigmund Freud's superego and then to contemporary psychoanalysis. We argue that defenses are an integral component in the acquisition of any moral system. Elaborating on this argument, we assert that there is a progression from defensive systems that are "closed" to defensive systems that are "open," as defined in a recent work by Novick and Novick. The former system is "static, avoids reality, and is characterized by power dynamics, sadomasochism, and omnipotent defense." The latter, on the other hand, is a system that allows for "joy, creativity, spontaneity, love and it is attuned to reality." Furthermore, while Smith and Freud's systems are more one-person systems of defense, contemporary psychoanalysis has moved to more of a two-person system.

  9. The Story of the Defense Technical Information Center 1945 - 1995, 50 Years of Information for Defense

    Science.gov (United States)

    1995-07-01

    necessary. As John Naisbitt observed in his 1982 book Megatrends , ...with the coming of the infor- mation society, we have for the first time an economy...information in the hands of many. —John Naisbitt Megatrends As the Defense Technical Information Center moves forward into the last decade of the...Gulf War, for example, Iraq’s leader, Saddam Hussein, threatened to use biological or biochemical warfare. To defend against this threat, the U.S

  10. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    Science.gov (United States)

    2013-06-01

    create a coast-to-coast, interoperable digital emergency communications network.36 Accordingly, Homeland Security Act 2002 and Homeland Security...or fixed monitor that depicts friendly forces on an easy-to-read digitized geospatial map. The number of assets being tracked directly determines...Common Defense diminished since Colombian security forces killed notorious Medellin cartel leader Pablo Escobar in 1993.74 There undeniably is an

  11. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  12. Optimal defense: snails avoid reproductive parts of the lichen Lobaria scrobiculata due to internal defense allocation.

    Science.gov (United States)

    Asplund, Johan; Solhaug, Knut Asbjørn; Gauslaa, Yngvar

    2010-10-01

    The optimal defense theory (ODT) deals with defensive compounds improving fitness of a particular organism. It predicts that these compounds are allocated in proportion to the risk for a specific plant tissue being attacked and this tissue's value for plant fitness. As the benefit of defense cannot easily be measured in plants, the empirical evidence for ODT is limited. However, lichens are unique in the sense that their carbon-based secondary compounds can nondestructively be removed or reduced in concentration by acetone rinsing. By using such an extraction protocol, which is lethal to plants, we have tested the ODT by studying lichens instead of plants as photosynthetically active organisms. Prior to acetone rinsing, we found five times higher concentration of meta-scrobiculin in the reproductive parts (soralia) of Lobaria scrobiculata compared to somatic parts of this foliose epiphytic lichen species. At this stage, the lichen-feeding snail Cochlodina laminata avoided the soralia. However, after removal of secondary compounds, the snail instead preferred the soralia. In this way, we have successfully shown that grazing pattern inversely reflects the partitioning of the secondary compounds that have a documented deterring effect. Thus our study provides strong and novel evidence for the ODT.

  13. 78 FR 90 - Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting

    Science.gov (United States)

    2013-01-02

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Intelligence University Board of Visitors Closed Meeting AGENCY: National Intelligence University, Defense Intelligence... hereby given that a closed meeting of the National Intelligence University Board of Visitors has been...

  14. 78 FR 68829 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Contract...

    Science.gov (United States)

    2013-11-15

    ... DFARS 252.232-7007, Limitation of Government's Obligation. DFARS subpart 232.7, Contract [[Page 68830...; Defense Federal Acquisition Regulation Supplement; Contract Financing AGENCY: Defense Acquisition... and OMB Number: Defense Federal Acquisition Regulation Supplement (DFARS) Part 232, Contract Financing...

  15. Ballistic Missile Defense: National Security and the High Frontier of Space.

    Science.gov (United States)

    Adragna, Steven P.

    1985-01-01

    Ballistic missile defense is discussed, and the rationale behind the proposal to place defensive weapons in space is examined. Strategic defense is a national security, political, and moral imperative. (RM)

  16. PACS: implementation in the U.S. Department of Defense

    Science.gov (United States)

    Chacko, Anna K.; Wider, Ronald; Romlein, John R.; Cawthon, Michael A.; Richardson, Ronald R., Jr.; Lollar, H. William; Cook, Jay F.; Timboe, Harold L.; Johnson, Thomas G.; Fellows, Douglas W.

    2000-05-01

    The Department of Defense has been a leader in Radiology re- engineering for the past decade. Efforts have included the development of two landmark PACS specifications (MDIS and DIN- PACS), respective vendor selection and implementation programs. A Tri-Service (Army, Navy and Air Force) Radiology re-engineering program was initiated which identified transitioning to digital imaging, PACS and teleradiology as key enabling technologies in a changing business scenario. Subsequently, the systematic adjustment of procurement process for radiological imaging equipment included a focus on specifying PACS-capable-digital imaging modalities and mini- PACS as stepping stones to make the hospitals and health clinics PACS-ready. The success of the PACS and teleradiology program in the DOD is evidenced by the near filmless operation of most Army and Air Force Medical Centers, several community hospitals and several operational teleradiology constellations. Additionally, the MDIS PACSystem has become the commercial PACS product for General Electric Medical Systems. The DOD continues to forge ahead in the PACS arena by implementing advanced configurations and operational concepts such as the VRE (Virtual Radiology Environment), the negotiation of Regional Archiving and Regional PACS Maintenance Programs. Newer regulations (HIPAA, the FDA approval of digital mammography) have been promulgated impacting the culture and conduct of our business. Incorporating their requirements at the very outset will enable us to streamline the delivery of radiology. The DOD community has embraced the information age at multiple levels. The Healthcare portion of this community with these initiatives is integrating itself into DOD's future. The future holds great possibilities, promises and challenges for the DOD PACS programs.

  17. Control of Database Applications at the Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The Defense Finance and Accounting Service Financial Systems Organization, under the control of the Deputy Director for Information Management, Defense Finance and Accounting Service, is responsible...

  18. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  19. Defense Health Program Financial Reporting of General Property, Plant, and Equipment

    National Research Council Canada - National Science Library

    Lane, F

    2000-01-01

    .... The DoD Agency Wide financial statements include financial statements for a reporting entity called "Other Defense Organizations," a consolidation of financial information from various Defense...

  20. Accounting Procedures and Controls Over Financial Data Supporting Selected Other Defense Organizations

    National Research Council Canada - National Science Library

    2000-01-01

    The DoD Agency-Wide financial statements include a reporting entity entitled "Other Defense Organizations," which represents a consolidation of financial information from various Defense organizations...

  1. Regional Externalities

    NARCIS (Netherlands)

    Heijman, W.J.M.

    2007-01-01

    The book offers practical and theoretical insights in regional externalities. Regional externalities are a specific subset of externalities that can be defined as externalities where space plays a dominant role. This class of externalities can be divided into three categories: (1) externalities

  2. Kupffer cell complement receptor clearance function and host defense.

    Science.gov (United States)

    Loegering, D J

    1986-01-01

    Kupffer cells are well known to be important for normal host defense function. The development of methods to evaluate the in vivo function of specific receptors on Kupffer cells has made it possible to assess the role of these receptors in host defense. The rationale for studying complement receptors is based on the proposed important role of these receptors in host defense and on the observation that the hereditary deficiency of a complement receptor is associated with recurrent severe bacterial infections. The studies reviewed here demonstrate that forms of injury that are associated with depressed host defense including thermal injury, hemorrhagic shock, trauma, and surgery also cause a decrease in complement receptor clearance function. This decrease in Kupffer cell receptor clearance function was shown not to be the result of depressed hepatic blood flow or depletion of complement components. Complement receptor function was also depressed following the phagocytosis of particulates that are known to depress Kupffer cell host defense function. Endotoxemia and bacteremia also were associated with a depression of complement receptor function. Complement receptor function was experimentally depressed in uninjured animals by the phagocytosis of IgG-coated erythrocytes. There was a close association between the depression of complement receptor clearance function and increased susceptibility to the lethal effects of endotoxin and bacterial infection. These studies support the hypotheses that complement receptors on Kupffer cells are important for normal host defense and that depression of the function of these receptors impairs host defense.

  3. APOBEC3G: a Double Agent in Defense

    OpenAIRE

    Smith, Harold C.

    2011-01-01

    APOBEC3G (A3G) is an effective cellular host defense factor under experimental conditions in which a functional form of the HIV-encoded protein Vif cannot be expressed. Wild type Vif targets A3G for proteasomal degradation and along with it, any host defense advantage A3G might provide is severely diminished or lost. Recent evidence cast doubt on the potency of A3G in host defense and suggested that it could, under some circumstances, promote the emergence of more virulent HIV strains. In thi...

  4. Preparing South Africa for cyber crime and cyber defense

    CSIR Research Space (South Africa)

    Grobler, M

    2013-01-01

    Full Text Available revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa... legislation and a lack of cyber defense mechanisms. As a starting point, cyber warfare for the purpose of this article is defined as the use of exploits in cyber space as a way to intentionally cause harm to people, assets or economies (Owen 2008). It can...

  5. A motivational analysis of defensive pessimism and self-handicapping.

    Science.gov (United States)

    Elliot, Andrew J; Church, Marcy A

    2003-06-01

    Two studies examined motivational influences on and correlates of defensive pessimism and self-handicapping and investigated the relationship between these two cognitive strategies and performance attainment. The findings indicated that defensive pessimism and self-handicapping have similar motivational profiles, with the primary difference being that self-handicapping represents the absence of approach motivation in the achievement domain, as well as the presence of avoidance motivation. Self-handicapping, but not defensive pessimism, was shown to undermine performance-attainment, and performance-avoidance goals were validated as mediators of this negative relationship. Issues regarding the functional nature of the two cognitive strategies are discussed.

  6. Elongator Plays a Positive Role in Exogenous NAD-Induced Defense Responses in Arabidopsis.

    Science.gov (United States)

    An, Chuanfu; Ding, Yezhang; Zhang, Xudong; Wang, Chenggang; Mou, Zhonglin

    2016-05-01

    Extracellular NAD is emerging as an important signal molecule in animal cells, but its role in plants has not been well-established. Although it has been shown that exogenous NAD(+) activates defense responses in Arabidopsis, components in the exogenous NAD(+)-activated defense pathway remain to be fully discovered. In a genetic screen for mutants insensitive to exogenous NAD(+) (ien), we isolated a mutant named ien2. Map-based cloning revealed that IEN2 encodes ELONGATA3 (ELO3)/AtELP3, a subunit of the Arabidopsis Elongator complex, which functions in multiple biological processes, including histone modification, DNA (de)methylation, and transfer RNA modification. Mutations in the ELO3/AtELP3 gene compromise exogenous NAD(+)-induced expression of pathogenesis-related (PR) genes and resistance to the bacterial pathogen Pseudomonas syringae pv. maculicola ES4326, and transgenic expression of the coding region of ELO3/AtELP3 in elo3/Atelp3 restores NAD(+) responsiveness to the mutant plants, demonstrating that ELO3/AtELP3 is required for exogenous NAD(+)-induced defense responses. Furthermore, mutations in genes encoding the other five Arabidopsis Elongator subunits (ELO2/AtELP1, AtELP2, ELO1/AtELP4, AtELP5, and AtELP6) also compromise exogenous NAD(+)-induced PR gene expression and resistance to P. syringae pv. maculicola ES4326. These results indicate that the Elongator complex functions as a whole in exogenous NAD(+)-activated defense signaling in Arabidopsis.

  7. History of Hanford Site Defense Production (Brief)

    Energy Technology Data Exchange (ETDEWEB)

    GERBER, M S

    2001-02-01

    This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

  8. Defense Threat Reduction Agency Radiochemical Needs

    Science.gov (United States)

    Walsh, Michael A. R.; Velazquez, Daniel L.

    2009-08-01

    The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.

  9. EDUCATIONAL NETWORKING: HUMAN VIEW TO CYBER DEFENSE

    Directory of Open Access Journals (Sweden)

    Oleksandr Yu. Burov

    2016-05-01

    Full Text Available Networks play more and more important role for human life and activity, both in critical occupations (aviation, power industry, military missions etc., and in everyday life (home computers, education, leisure. Interaction between human and other elements of human-machine system have changed, because they coincide in the information habitat. Human-system integration has reached new level of defense needs. The paper will introduce features of information society in respect of a human and corresponding changes in HF/E: (1 information becomes a tool, goal, mean and environment of a human activity, (2 it becomes a part of the human nature and this makes him/her unprotected, (3 human psycho-physiological status becomes not only a basis of effective performance, but an object of control and support, and means of a human security and safety should be a part of information habitat, (4 networking environment becomes an independent actor in a human activity. Accompanying cyber-security challenges and tasks are discussed, as well as types of networking threats and Human View regarding the cyber security challenges.

  10. Defense Threat Reduction Agency Radiochemical Needs

    International Nuclear Information System (INIS)

    Walsh, Michael A. R.; Velazquez, Daniel L.

    2009-01-01

    The United States Government (USG) first developed nuclear forensics-related capabilities to analyze radiological and nuclear materials, including underground nuclear test debris and interdicted materials. Nuclear forensics is not a new mission for Department of Defense (DoD). The department's existing nuclear forensics capability is the result of programs that span six (6) decades and includes activities to assess foreign nuclear weapons testing activities, monitor and verify nuclear arms control treaties, and to support intelligence and law enforcement activities. Today, nuclear forensics must support not only weapons programs and nuclear smuggling incidents, but also the scientific analysis and subsequent attribution of terrorists' use of radiological or nuclear materials/devices. Nuclear forensics can help divulge the source of origin of nuclear materials, the type of design for an interdicted or detonated device, as well as the pathway of the materials or device to the incident. To accomplish this mission, the USG will need trained radiochemists and nuclear scientists to fill new positions and replace the retiring staff.

  11. Roadmap for an EArth Defense Initiative (READI)

    Science.gov (United States)

    Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.

    2015-12-01

    During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.

  12. Ecological Interface Design for Computer Network Defense.

    Science.gov (United States)

    Bennett, Kevin B; Bryant, Adam; Sushereba, Christen

    2018-05-01

    A prototype ecological interface for computer network defense (CND) was developed. Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. The cognitive systems engineering (CSE)/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. Direct application in supporting cyber analysts.

  13. Ebola salience, death-thought accessibility, and worldview defense: A terror management theory perspective.

    Science.gov (United States)

    Arrowood, Robert B; Cox, Cathy R; Kersten, Michael; Routledge, Clay; Shelton, Jill Talley; Hood, Ralph W

    2017-10-01

    According to terror management theory, individuals defend their cultural beliefs following mortality salience. The current research examined whether naturally occurring instances of death (i.e., Ebola) correspond to results found in laboratory studies. The results of two experiments demonstrated that participants experienced a greater accessibility of death-related thoughts in response to an Ebola prime during a regional outbreak. Study 2 also showed that increased mortality awareness following an Ebola manipulation was associated with greater worldview defense (i.e., religious fundamentalism). Together, these results suggest that reminders of death in the form of a disease threat operate similarly to a mortality salience manipulation.

  14. Defense.gov Special Report: Travels with Gates - October 2010

    Science.gov (United States)

    - Secretary of State Hillary Rodham Clinton and Defense Secretary Robert M. Gates expressed support for the Travels Top Story Clinton, Gates Voice Support For Afghan Reconciliation BRUSSELS, Belgium, Oct. 14, 2010

  15. Department of Defense Timely & Effective Care Data – military hospitals

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file contains U.S. military hospital data for timely & effective care (process of care) measures collected by the Department of Defense (DoD). DoD collects...

  16. Defense or Development? A Decisive Question in Latin America

    National Research Council Canada - National Science Library

    Guarda, Esteban

    2008-01-01

    The purpose of this work is to inform the reader about the recent past, present, and future tendency in the Latin American countries regarding the balance of expenditures between defense and development...

  17. Study of the Department of Defense Student Testing Program

    National Research Council Canada - National Science Library

    Davidson, Lance G

    2005-01-01

    ...) Career Exploration Program (CEP) and its contributions to Navy recruiting. The ASVAB-CEP is a Department of Defense program created in 1968, operating in 12,598 high schools throughout the nation as of 2004...

  18. Defensive repertoire of Drosophila larvae in response to toxic fungi

    NARCIS (Netherlands)

    Trienens, Monika; Kraaijeveld, Ken; Wertheim, Bregje

    2017-01-01

    Chemical warfare including insecticidal secondary metabolites is a well-known strategy for environmental microbes to monopolize a food source. Insects in turn have evolved behavioural and physiological defences to eradicate or neutralize the harmful microorganisms. We studied the defensive

  19. Management of Contract Waivers and Deviations for Defense Systems

    National Research Council Canada - National Science Library

    1998-01-01

    This report is the fourth and final in a series of reports resulting from our audit of management of contract waivers and deviations for Defense systems and summarizes our overall evaluation. Report...

  20. Defense or Development? A Decisive Question in Latin America

    National Research Council Canada - National Science Library

    Guarda, Esteban

    2008-01-01

    .... First, this paper reviews the theory for establishing the concepts of defense expenditures and development/social expenditures, second, it analyzes the facts and possible relation in the expenses...

  1. "Homeland Defense: At Risk as a Result of Civil Support?"

    National Research Council Canada - National Science Library

    Brickhouse, Tonja

    2003-01-01

    This research effort is an attempt by the author to examine the broad area of military support to civil authorities and the potential for a significant demand on Department of Defense (DoD) resources...

  2. 77 FR 6169 - Defense Trade Advisory Group; Notice of Membership

    Science.gov (United States)

    2012-02-07

    ...-Military Affairs with a formal channel for regular consultation and coordination with U.S. private sector... defense trade and industrial competitiveness, and all members must be able to advise the Bureau on these...

  3. Department of Defense Agency Financial Report. Fiscal Year 2007

    National Research Council Canada - National Science Library

    2007-01-01

    The Department of Defense (DoD) Fiscal Year (FY) 2007 Agency Financial Report (AFR) provides the President, the Congress, other Federal departments and agencies, and the American public an overview of the Department's financial condition...

  4. 28 CFR 97.24 - No civil defense created.

    Science.gov (United States)

    2010-07-01

    ... intended to and does not establish a defense against an allegation of negligence or breach of contract..., statutory, and common law upon their activities (or other activities of a similarly hazardous nature). ...

  5. Defense Support of Civil Authorities - Are We Organized Right?

    National Research Council Canada - National Science Library

    Austin, Joseph

    2007-01-01

    The Department of Defense (DoD) has a long history of supporting civil authorities in the wake of catastrophic events with specialized skills and assets that can rapidly stabilize and improve the situation...

  6. Air Warfare and Air Base Defense 1914-1973

    Science.gov (United States)

    1988-01-01

    338 X Conclusion ............................................. 343 A ppendices ...military operations. During the battle of Stalingrad, however, the need for a more focussed defense became acute . Between November 19, 1942, when the

  7. Efficiency defense and administrative fuzziness in merger regulation

    Czech Academy of Sciences Publication Activity Database

    Medvedev, Andrei

    -, č. 234 (2004), s. 1-42 ISSN 1211-3298 Institutional research plan: CEZ:AV0Z7085904 Keywords : merger regulation * efficiency defense Subject RIV: AH - Economics http://www.cerge-ei.cz/pdf/wp/Wp234.pdf

  8. Defense Technology Journal, Vol. 16, No. 2, February 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    ;Contents: VERTIGO Simulation; Education Reform of National Defense Academy; Artilleries and Ammunitions (4); Newly developed encryption algorithm (MISTY) that surpasses DES; CAS EXPO`95 in California USA; Underwater Weapons; Phaser Gun; and Japanese Missile.

  9. Letter to Congressional Leaders on Top Defense Management Challenges

    National Research Council Canada - National Science Library

    2000-01-01

    ... Budget Committee and you on Department of Defense (DoD) management challenges. The joint letter requested that we update our previous assessments of the most significant management problems facing the DoD...

  10. The Budget Scoring Alternatives Financing Methods for Defense Requirements

    National Research Council Canada - National Science Library

    Leos, Leonard; Rouleau, Paul; Wadsworth, Mark

    2007-01-01

    .... One of the major impediments to using alternative forms of procurement financing for acquiring defense capabilities is in the budgetary treatment, or "scoring," of these initiatives by the Congressional Budget Office (CBO...

  11. Changing Manufacturing Technology and Jobs in Defense Industries.

    Science.gov (United States)

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  12. Budget Scoring of Alternative Financing Methods for Defense Requirements

    National Research Council Canada - National Science Library

    Leos, Leonard; Rouleau, Paul; Wadsworth, Mark

    2007-01-01

    .... One of the major impediments to using alternative forms of procurement financing for acquiring defense capabilities is in the budgetary treatment, or scoring, of these initiatives by the Congressional Budget Office (CBO...

  13. Integrated Product Team Effectiveness in the Department of Defense

    National Research Council Canada - National Science Library

    Monk, Gregg

    2002-01-01

    In 1995, then Secretary of Defense William Perry, directed a 'fundamental change' in the way DoD did business when he endorsed and required the use of the Integrated Product and Process Development (IPPD...

  14. Defense Against Rocket Attacks in the Presence of False Cues

    National Research Council Canada - National Science Library

    Harari, Lior

    2008-01-01

    Rocket attacks on civilian and military targets, from both Hezbollah (South Lebanon) and Hamas (Gaza strip) have been causing a major operational problem for the Israeli Defense Force for over two decades...

  15. Defense Transformation: Background and Oversight Issues for Congress

    National Research Council Canada - National Science Library

    O'Rourke, Ronald

    2004-01-01

    .... The Administration's vision for defense transformation calls for shifting the U.S. military toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower...

  16. Defense Industry Restructuring: Updated Cost and Savings Information

    National Research Council Canada - National Science Library

    1998-01-01

    ...) the restructuring costs were allowable under the Federal Acquisition Regulation and (2) a DOD contracting officer determined the business combination would result in overall reduced costs to DOD or preserve a critical defense capability...

  17. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  18. Defense Support of Civil Authorities. Handbook No. 1.04

    National Research Council Canada - National Science Library

    2005-01-01

    This supplemental handbook presents an appreciation of U.S. military forces and their roles as part of Department of Defense support to Federal emergency response in a terrorist Weapons of Mass Destruction or Effect (WMD/E) incident...

  19. Defense Trade: Data Collection and Coordination on Offsets

    National Research Council Canada - National Science Library

    2000-01-01

    ... on the U.S. economy and national security. Defense offsets are the full range of industrial and commercial benefits that firms provide to foreign governments as inducements or conditions for the purchase of military goods and services...

  20. Factors Affecting the Defense-State Operational Partnership

    National Research Council Canada - National Science Library

    Campbell, William

    1999-01-01

    .... Both agencies would benefit directly if State used this money to provide its employees the practical training in evacuation and other crisis skills that Defense routinely provides its personnel...

  1. Defense Acquisition Initiatives Review: An Assessment of Extant Initiatives

    National Research Council Canada - National Science Library

    Porter, Gene; Berteau, David; Christle, Gary; Mandelbaum, Jay; Diehl, Richard

    2005-01-01

    ...) to identify and analyze a subset of initiatives that the team finds to have potential for near term management emphasis that could provide visible improvements to the much criticized Defense acquisition system...

  2. The Department of Defense's Role in Disaster Recovery

    National Research Council Canada - National Science Library

    Arn, Mark R

    2006-01-01

    ... logistical operations on a moment's notice." This paper will examine the historical role of the armed forces in disaster management, the current response plans as well as existing legislation that employ the Department of Defense (DoD...

  3. Game Theoretic Solutions to Cyber Attack and Network Defense Problems

    National Research Council Canada - National Science Library

    Shen, Dan; Chen, Genshe; Cruz, Jr., , Jose B; Blasch, Erik; Kruger, Martin

    2007-01-01

    .... The protection and defense against cyber attacks to computer network is becoming inadequate as the hacker knowledge sophisticates and as the network and each computer system become more complex...

  4. Department of Defense Dictionary of Military and Associated Terms

    National Research Council Canada - National Science Library

    2005-01-01

    The Department of Defense Dictionary of Military and Associated Terms set forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States...

  5. Correlation between resistance of eggplant and defense-related ...

    African Journals Online (AJOL)

    ajl user 1

    2012-09-13

    Sep 13, 2012 ... verticillium wilt, the activities of defense-related enzymes, and the contents of some biochemical substances of ... mainly divided into blocking theory and toxin theory ..... and researchers have paid attention to verticillium wilt.

  6. Center for Homeland Defense and Security Homeland Security Affairs Journal

    OpenAIRE

    2015-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Center for Homeland Defense and Security (CHDS). The journal provides a forum to propose and debate strategies, policies and organizational arrangements to strengthen U.S. homeland security.

  7. Valid, legally defensible data from your analytical laboratories

    International Nuclear Information System (INIS)

    Gay, D.D.; Allen, V.C.

    1989-01-01

    This paper discusses the definition of valid, legally defensible data. The authors describe the expectations of project managers and what should be gleaned from the laboratory in regard to analytical data

  8. Rosoboroneksport: Arms Sales and the Structure of Russian Defense Industry

    National Research Council Canada - National Science Library

    Blank, Stephen J

    2007-01-01

    .... Although Russian observers believe that Washington did so because of these firms arms sales to Venezuela, these sales to such dangerous states oblige us to analyze the Russian defense export program...

  9. Department of Defense (DOD) Military Casualty/Wounded Warrior

    Data.gov (United States)

    Social Security Administration — SSA initiated this agreement with the Department of Defense (DOD) to transmit to SSA information that will identify military personnel injured or taken ill while in...

  10. NATO Technology: From Gap to Divergence? (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Daniel, Donald

    2004-01-01

    .... Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence a condition...

  11. Defense AR Journal. Volume 16, Number 2, July 2008

    National Research Council Canada - National Science Library

    2008-01-01

    ...?, Lessons from the Development of Army Systems, How to Make Incentive Fees Work, Can Defense Sensemakers Really be Rational in a Hyperturbulent World, System of Systems Development for the DoDs...

  12. Allegations Concerning Defense Reutilization and Marketing Service Business Practices

    National Research Council Canada - National Science Library

    2001-01-01

    We performed this audit in response to a request from Senator John Warner. The request was based on several allegations the senator's office received concerning the operations of the Defense Reutilization and Marketing Service (DRMS...

  13. Defense Inventory: Army War Reserve Spare Parts Requirements Are Uncertain

    National Research Council Canada - National Science Library

    2001-01-01

    .... Department of Defense policy calls for each of the services to acquire and maintain sufficient war materiel inventories to commence execution of the two-war scenario and sustain operations until...

  14. Acquisition: Acquisition of Targets at the Missile Defense Agency

    National Research Council Canada - National Science Library

    Ugone, Mary L; Meling, John E; James, Harold C; Haynes, Christine L; Heller, Brad M; Pomietto, Kenneth M; Bobbio, Jaime; Chang, Bill; Pugh, Jacqueline

    2005-01-01

    .... This audit was performed in response to allegations made to the DoD Hotline in March 2003. This report addresses 10 allegations about the effectiveness of the process that the Missile Defense Agency used to manage and acquire targets...

  15. Audit of Major Defense Acquisition Programs Cycle Time

    National Research Council Canada - National Science Library

    Ugone, Mary

    2001-01-01

    ... (GPRA) as indicated in the FY 2000 Annual Report of the Secretary of Defense. Specifically, we assessed whether the process and factors, used to establish the metric goal of MDAP cycle time, were valid...

  16. Major Management Challenges and Program Risks Department of Defense

    National Research Council Canada - National Science Library

    1999-01-01

    .... The report also addresses corrective actions that DOD has taken or initiated on these issues- including DOD'S blueprint for a strategy-based, balanced, and affordable defense program as outlined...

  17. Defense Meteorological Satellite Program (DMSP) - Space Weather Sensors

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) maintains a constellation of sun-synchronous, near-polar orbiting satellites. The orbital period is 101 minutes...

  18. Detection of neural activity in the brains of Japanese honeybee workers during the formation of a "hot defensive bee ball".

    Directory of Open Access Journals (Sweden)

    Atsushi Ugajin

    Full Text Available Anti-predator behaviors are essential to survival for most animals. The neural bases of such behaviors, however, remain largely unknown. Although honeybees commonly use their stingers to counterattack predators, the Japanese honeybee (Apis cerana japonica uses a different strategy to fight against the giant hornet (Vespa mandarinia japonica. Instead of stinging the hornet, Japanese honeybees form a "hot defensive bee ball" by surrounding the hornet en masse, killing it with heat. The European honeybee (A. mellifera ligustica, on the other hand, does not exhibit this behavior, and their colonies are often destroyed by a hornet attack. In the present study, we attempted to analyze the neural basis of this behavior by mapping the active brain regions of Japanese honeybee workers during the formation of a hot defensive bee ball. First, we identified an A. cerana homolog (Acks = Apis cerana kakusei of kakusei, an immediate early gene that we previously identified from A. mellifera, and showed that Acks has characteristics similar to kakusei and can be used to visualize active brain regions in A. cerana. Using Acks as a neural activity marker, we demonstrated that neural activity in the mushroom bodies, especially in Class II Kenyon cells, one subtype of mushroom body intrinsic neurons, and a restricted area between the dorsal lobes and the optic lobes was increased in the brains of Japanese honeybee workers involved in the formation of a hot defensive bee ball. In addition, workers exposed to 46°C heat also exhibited Acks expression patterns similar to those observed in the brains of workers involved in the formation of a hot defensive bee ball, suggesting that the neural activity observed in the brains of workers involved in the hot defensive bee ball mainly reflects thermal stimuli processing.

  19. Implementing Set Based Design into Department of Defense Acquisition

    Science.gov (United States)

    2016-12-01

    The team employed a tailored waterfall process model in order to explore SBD applications in the support of defense acquisition and PORs. Figure 1...Engineering Model . Additionally, the team reviewed DOD case studies that implemented SBD. The SBD principles, along with the common themes from the...acquisition. 14. SUBJECT TERMS set based design, set based thinking, model based systems engineering, concurrent engineering, defense acquisition

  20. Soviet civil defense plans make nuclear war winnable

    International Nuclear Information System (INIS)

    Goure, L.

    1985-01-01

    In this paper, the author expresses his opinion that the U.S. is naive and suicidal in its lack of civil defense preparation for nuclear war. The Soviets' extensive civil defense planning is evidence that they plan to use their nuclear weapons and survive a counterattack by the U.S. The author compares the two systems and explains why the Soviets' system is superior