WorldWideScience

Sample records for technology defense daily

  1. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  2. Technologies for distributed defense

    Science.gov (United States)

    Seiders, Barbara; Rybka, Anthony

    2002-07-01

    For Americans, the nature of warfare changed on September 11, 2001. Our national security henceforth will require distributed defense. One extreme of distributed defense is represented by fully deployed military troops responding to a threat from a hostile nation state. At the other extreme is a country of 'citizen soldiers', with families and communities securing their common defense through heightened awareness, engagement as good neighbors, and local support of and cooperation with local law enforcement, emergency and health care providers. Technologies - for information exploitation, biological agent detection, health care surveillance, and security - will be critical to ensuring success in distributed defense.

  3. Advanced thermal management technologies for defense electronics

    Science.gov (United States)

    Bloschock, Kristen P.; Bar-Cohen, Avram

    2012-05-01

    Thermal management technology plays a key role in the continuing miniaturization, performance improvements, and higher reliability of electronic systems. For the past decade, and particularly, the past 4 years, the Defense Advanced Research Projects Agency (DARPA) has aggressively pursued the application of micro- and nano-technology to reduce or remove thermal constraints on the performance of defense electronic systems. The DARPA Thermal Management Technologies (TMT) portfolio is comprised of five technical thrust areas: Thermal Ground Plane (TGP), Microtechnologies for Air-Cooled Exchangers (MACE), NanoThermal Interfaces (NTI), Active Cooling Modules (ACM), and Near Junction Thermal Transport (NJTT). An overview of the TMT program will be presented with emphasis on the goals and status of these efforts relative to the current State-of-the-Art. The presentation will close with future challenges and opportunities in the thermal management of defense electronics.

  4. Overview: Defense high-level waste technology program

    International Nuclear Information System (INIS)

    Shupe, M.W.; Turner, D.A.

    1987-01-01

    Defense high-level waste generated by atomic energy defense activities is stored on an interim basis at three U.S. Department of Energy (DOE) operating locations; the Savannah River Plant in South Carolina, the Hanford Site in Washington, and the Idaho National Engineering Laboratory in Idaho. Responsibility for the permanent disposal of this waste resides with DOE's Office of Defense Waste and Transportation Management. The objective of the Defense High-Level Wast Technology Program is to develop the technology for ending interim storage and achieving permanent disposal of all U.S. defense high-level waste. New and readily retrievable high-level waste are immobilized for disposal in a geologic repository. Other high-level waste will be stabilized in-place if, after completion of the National Environmental Policy Act (NEPA) process, it is determined, on a site-specific basis, that this option is safe, cost effective and environmentally sound. The immediate program focus is on implementing the waste disposal strategy selected in compliance with the NEPA process at Savannah River, while continuing progress toward development of final waste disposal strategies at Hanford and Idaho. This paper presents an overview of the technology development program which supports these waste management activities and an assessment of the impact that recent and anticipated legal and institutional developments are expected to have on the program

  5. Future directions of defense programs high-level waste technology programs

    International Nuclear Information System (INIS)

    Chee, T.C.; Shupe, M.W.; Turner, D.A.; Campbell, M.H.

    1987-01-01

    The Department of Energy has been managing high-level waste from the production of nuclear materials for defense activities over the last forty years. An objective for the Defense Waste and Transportation Management program is to develop technology which ensures the safe, permanent disposal of all defense radioactive wastes. Technology programs are underway to address the long-term strategy for permanent disposal of high-level waste generated at each Department of Energy site. Technology is being developed for assessing the hazards, environmental impacts, and costs of each long-term disposal alternative for selection and implementation. This paper addresses key technology development areas, and consideration of recent regulatory requirements associated with the long-term management of defense radioactive high-level waste

  6. Influence of IR sensor technology on the military and civil defense

    Science.gov (United States)

    Becker, Latika

    2006-02-01

    Advances in basic infrared science and developments in pertinent technology applications have led to mature designs being incorporated in civil as well as military area defense systems. Military systems include both tactical and strategic, and civil area defense includes homeland security. Technical challenges arise in applying infrared sensor technology to detect and track targets for space and missile defense. Infrared sensors are valuable due to their passive capability, lower mass and power consumption, and their usefulness in all phases of missile defense engagements. Nanotechnology holds significant promise in the near future by offering unique material and physical properties to infrared components. This technology is rapidly developing. This presentation will review the current IR sensor technology, its applications, and future developments that will have an influence in military and civil defense applications.

  7. Current situation and countermeasures of the defense technology industry intellectual property management

    International Nuclear Information System (INIS)

    Fan Fei

    2014-01-01

    In Defense technology industry is a strategic industry of our country, is an important foundation for China to achieve modernization of national defense, is also important driving force of our national economy. Intellectual property plays a very important role in the defense industry ' strengthen the basis of capacity, combining military and civilian, leapfrog development' strategy. Defense-related science, technology and industry advanced nature of intellectual property management and its ownership is a direct reflection of the capability of independent innovation and sustainable development of the defense industry. Therefore, how to make the effective protection and management of intellectual property rights in the Defense Industry has also become a new issue that we face. In this paper, by analyzing the status of the defense technology industry intellectual property management, at home and abroad, and other industry advanced experience in intellectual property management, put forward recommendations to strengthen our national defense science and technology industry intellectual property management. (author)

  8. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  9. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  10. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  11. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  12. Changing Manufacturing Technology and Jobs in Defense Industries.

    Science.gov (United States)

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  13. Daily allergic multimorbidity in rhinitis using mobile technology

    DEFF Research Database (Denmark)

    Bousquet, J.; Devillier, P.; Anto, J. M.

    2018-01-01

    impact on work productivity using a mobile technology, the Allergy Diary. Methods: We undertook a 1-year prospective observational study in which 4 210 users and 32 585 days were monitored in 19 countries. Five visual analogue scales (VAS) assessed the daily burden of the disease (i.e., global evaluation...... approach examining daily symptoms with mobile technology, we found considerable intra-individual variability of allergic multimorbidity including a previously unrecognized extreme pattern of uncontrolled multimorbidity....

  14. NATO Technology: From Gap to Divergence? (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Daniel, Donald

    2004-01-01

    .... Over several decades, great disparities in the funding of defense research and technology by NATO members has produced a widening technological gap that threatens to become a divergence a condition...

  15. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    HIT” The threat of biological weapons arises in part from a decades-old megatrend in the life sciences. New advances in molecular biology, genetics...99 The Technology Landscape Today.................................... 101 Biological Warfare Defense...planning and programming, today’s environment comprises a broader, more diffuse set of concerns: terrorism, biological warfare, regional tensions

  16. Civilian applications for superconducting magnet technology developed for defense

    International Nuclear Information System (INIS)

    Johnson, R.A.; Klein, S.W.; Gurol, H.

    1986-01-01

    Seventy years after its discovery, superconducting technology is beginning to play an important role in the civilian sector. Strategic defense initiative (SDI)-related research in space- and ground-based strategic defense weapons, particularly research efforts utilizing superconducting magnet energy storage, magnetohydrodynamics (MHD), and superconducting pulsed-power devices, have direct applications in the civilian sector as well and are discussed in the paper. Other applications of superconducting magnets, which will be indirectly enhanced by the overall advancement in superconducting technology, include high-energy physics accelerators, magnetic resonance imaging, materials purifying, water purifying, superconducting generators, electric power transmission, magnetically levitated trains, magnetic-fusion power plants, and superconducting computers

  17. How Might Civilian Technology Firms Play A Role In The Defense Industrial Base Going Forward

    Science.gov (United States)

    2017-12-01

    CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL BASE GOING FORWARD? by Daniel J. Shipman December 2017 Thesis Advisor: Mie...2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE HOW MIGHT CIVILIAN TECHNOLOGY FIRMS PLAY A ROLE IN THE DEFENSE INDUSTRIAL...the competitive business environment of Department of Defense (DOD) vendors and whether the market is favorable for non-traditional, technology

  18. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    International Nuclear Information System (INIS)

    James L. Jones

    2003-01-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more ''out-of-the-box'' solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed ''out-of-the-box'' solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense

  19. Analyzing Department of Defense's Use of Other Transactions as a Method for Accessing Non-Traditional Technology

    National Research Council Canada - National Science Library

    Gilliland, John

    2001-01-01

    ... technological superiority To attract advanced technology companies that normally do not participate in defense business to the defense market, Congress provided a new contracting authority, Section 845...

  20. 75 FR 40857 - Webinar About Advanced Defense Technologies RFP

    Science.gov (United States)

    2010-07-14

    ... regional innovation clusters, as well as experience fostering small business development and growth... from existing regional innovation clusters specializing in defense technologies to provide counseling... cluster areas and industries. SBA intends to make awards to multiple regional innovation clusters that can...

  1. DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management

    Science.gov (United States)

    2017-06-01

    Defense Technology Development: Technology Transition Programs Support Military Users, but Opportunities Exist to Improve Measurement of Outcomes, GAO-13... LTE ), for cellular wireless communication applications. They also develop and commercialize numerous technologies used in handsets and tablets. They...17-499 Note: Technology Readiness Levels (TRL) are a tool that DOD, among others, uses to assess technology maturity. TRLs are measured on a scale

  2. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    Stockmann, Xiao Qiang. Changing Media, Changing China , New York: Oxford University Press, (01 2011) Dieter Ernst. Indigenous Innovation and...2211 China , science, technology, dual use, defense, security, innovation REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10...ABSTRACT Final Report: The Evolving Relationship Between Technology and National Security in China : Innovation , Defense Transformation, and China’s

  3. Science and Technology of Nanostructures in the Department of Defense

    International Nuclear Information System (INIS)

    Murday, James S.

    1999-01-01

    The United States Department of Defense maintains a research and development program in nanostructures with special attention to miniaturization of information technology devices, nanostructured materials, and nanobiotechnology for detection of biological agents. This article provides a brief guide to those DoD funding officers and research scientists actively interested in nanostructures

  4. NATO Technology: From Gap to Divergence? (Defense Horizons, July 2004)

    National Research Council Canada - National Science Library

    Daniel, Donald

    2004-01-01

    .... With only slight modifications (not additions) to current total defense expenditures, and using funds that will be available as they restructure their forces, European members could not only double their current investment but take significant strides to ensure that they are not left behind in a world dominated by technology.

  5. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  6. Roadmap Modeling and Assessment Approach for Defense Technology System of Systems

    Directory of Open Access Journals (Sweden)

    Hui Lu

    2018-06-01

    Full Text Available Advanced defense technology plays a crucial role in safeguarding national safety and development interests. Aiming to handle the problems of current research and development (R&D management approaches faced with the rocketing complexities of system of systems, the authors propose a novel roadmap modeling and assessment methodology through studying the driving forces of general technology development and analyzing realistic requirements of defense technology management in this article. First, a requirement decomposition framework is designed based on multi-view theories and text-mining tools are used to construct a multi-layer knowledge-flow network model. Second, the contribution rates of requirement elements at different levels are evaluated using a multi-criteria decision-making approach and the node importance is assessed based on the topological structure of multi-layer network. Third, it is utilized to demonstrate the effectiveness of the proposed approaches that illustrative examples of the technology requirements in maritime security strategy investigating and a dual-layer knowledge-flow network consists of patents that belong to the “Coherent Light Generator (CLC” classification from the United States Patent and Trademark Office (USPTO database and the related academic papers from Web of Science. Finally, the contributions, potential applications, and drawbacks of this work are discussed and research outlooks are provided.

  7. Defensive technology and welfare analysis of environmental quality change with uncertain consumer health impacts

    International Nuclear Information System (INIS)

    Lee, L.K.; Moffitt, L.J.

    1993-01-01

    Measuring the ex post losses from environmental quality change is an important issue when environmental contamination creates health risks, liability is assigned, and private compensation efforts are required. This paper proposes a methodology for measuring the ex post welfare impact of environmental quality change using market behavior from defensive expenditures. Conditions under which a defensive technology can provide a bound on welfare estimates are identified

  8. The Relationship Between Digital Technology Experience, Daily Media Exposure and Working Memory Capacity

    Directory of Open Access Journals (Sweden)

    Muhterem DİNDAR

    2016-06-01

    Full Text Available Today’s youngsters interact with digital technologies to a great extent which leads scholars to question the influence of this exposure on human cognitive structure. Through resorting to digital nativity assumptions, it is presumed that cognitive architecture of the youth may change in accordance with digital technology use. In this regard, the current study investigated the relationship between digital technology experience, daily media exposure and working memory capacity of so-called digital native participants. A total of 572 undergraduate students responded to self-report measures, which addressed years of experience for 7 different digital devices and the daily time spent for 14 different digital activities. Participants’ working memory capacity was measured through the Computation Span and the Dot Matrix Test. While the former was used to measure the phonological loop capacity, the latter was used to address the visuo-spatial sketchpad capacity. Correlational analyses revealed that neither the phonological loop capacity nor the visuo-spatial sketchpad capacity was related to digital technology experience and daily media exposure. Thus, the transformative contribution of digital technology experience to human cognitive architecture could not be observed through the current measures

  9. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  10. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    In recent years, many states have developed and implemented green solutions for defense. Building on these initiatives NATO formulated the NATO Green Defence Framework in 2014. The framework provides a broad basis for cooperation within the Alliance on green solutions for defense. This report aims...... to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...

  11. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  12. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  13. Defense Contractors SBIR/STTR Partnering Manual: A Primer on Technology Risk Management and Partnering Strategies

    National Research Council Canada - National Science Library

    Williams, John R

    2008-01-01

    As the world looks increasingly to technology innovation to meet the challenges of defense, security, disaster relief and increased health, many in industry have come to identify this nation's SBIR...

  14. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  15. Potential of Exoskeleton Technology to Assist Older Adults with Daily Living

    NARCIS (Netherlands)

    Jung, Merel Madeleine; Ludden, Geke D.S.

    Mobility impairments can prevent older adults from performing their daily activities which highly impacts a person's quality of life. Exoskeleton technology can assist older adults by providing additional support to compensate for age-related decline in muscle strength. To date little is known about

  16. Gaze-based assistive technology used in daily life by children with severe physical impairments - parents' experiences

    OpenAIRE

    Borgestig, Maria; Rytterstrom, Patrik; Hemmingsson, Helena

    2017-01-01

    Objective: To describe and explore parents' experiences when their children with severe physical impairments receive gaze-based assistive technology (gaze-based assistive technology (AT)) for use in daily life. Methods: Semi-structured interviews were conducted twice, with one year in between, with parents of eight children with cerebral palsy that used gaze-based AT in their daily activities. To understand the parents' experiences, hermeneutical interpretations were used during data analysis...

  17. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  18. Assessing the Effectiveness of Defensive Aid Suite Technology Using a Field Trial and Modelling and Simulation

    National Research Council Canada - National Science Library

    Fournier, Pierre

    2002-01-01

    ...) community that Defensive Aid Suite (DAS) technologies can improve the protection of LAVs. A prototype DAS system was developed by DRDC Valcartier and tested in field trials held in 1995 and 1999...

  19. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  20. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... Deputy Secretary of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics... complex technology problems facing the Department of Defense in such areas as research, engineering, and... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to...

  1. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    Defense Business Transformation by Jacques S. Gansler and William Lucyshyn The Center for Technology and National...REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Defense Business Transformation 5a. CONTRACT NUMBER 5b. GRANT NUMBER...vii Part One: DoD Business Transformation

  2. Review of defense display research programs

    Science.gov (United States)

    Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan

    2001-09-01

    Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.

  3. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  4. New technologies and defense policy for the European theater

    International Nuclear Information System (INIS)

    Tsipis, K.

    1992-01-01

    This paper reports that in what should be a reassuring phenomenon for America's European allies, US military planners think of applications of new technologies in new conventional weapons systems almost exclusively in the context of defending Western Europe. Given the global interests of the United States and the nature and location of emerging threats (as the Gulf war has so dramatically emphasized) this is a rather narrow base for US conventional weapons modernization planning. As recent events in Eastern Europe make clear, the cogency of America's defense policy may be dramatically undermined by the reduction of the Soviet threat. As yet, it is unclear to what extent the development of future conventional forces will be conducted with reference to America's participation in NATO

  5. DEFENSE ACQUISITIONS: Collection and Reporting of Information Technology Purchases

    National Research Council Canada - National Science Library

    2002-01-01

    ... of Representatives by March 15,2002. Section 812 also directed us to issue a report to the congressional defense committees by January 31,2002, assessing the progress the Department of Defense (DOD...

  6. Modulation of defensive reflex conditioning in snails by serotonin

    Science.gov (United States)

    Andrianov, Vyatcheslav V.; Bogodvid, Tatiana K.; Deryabina, Irina B.; Golovchenko, Aleksandra N.; Muranova, Lyudmila N.; Tagirova, Roza R.; Vinarskaya, Aliya K.; Gainutdinov, Khalil L.

    2015-01-01

    Highlights Daily injection of serotonin before a training session accelerated defensive reflex conditioning in snails.Daily injection of 5-hydroxytryptophan before a training session in snails with a deficiency of serotonin induced by the “neurotoxic” analog of serotonin 5,7-dihydroxytryptamine, restored the ability of snails to learn.After injection of the “neurotoxic” analogs of serotonin 5,6- and 5,7-dihydroxytryptamine as well as serotonin, depolarization of the membrane and decrease of the threshold potential of premotor interneurons was observed. We studied the role of serotonin in the mechanisms of learning in terrestrial snails. To produce a serotonin deficit, the “neurotoxic” analogs of serotonin, 5,6- or 5,7-dihydroxytryptamine (5,6/5,7-DHT) were used. Injection of 5,6/5,7-DHT was found to disrupt defensive reflex conditioning. Within 2 weeks of neurotoxin application, the ability to learn had recovered. Daily injection of serotonin before a training session accelerated defensive reflex conditioning and daily injections of 5-HTP in snails with a deficiency of serotonin induced by 5,7-DHT restored the snail's ability to learn. We discovered that injections of the neurotoxins 5,6/5,7-DHT as well as serotonin, caused a decrease in the resting and threshold potentials of the premotor interneurons LPa3 and RPa3. PMID:26557063

  7. Convergence of emerging science and technology trends for defense, security, and human performance

    International Nuclear Information System (INIS)

    Vaseashta, Ashok

    2010-01-01

    Full text: Recent technological innovations have changed the landscape of traditional scientific research. Advances in the nano- and bio-sciences, and materials and information processing are driving innovations at a phenomenal rate, resulting in greater interest yet uncertainty in the chemical-biological threat environment, research and development and other fields of policy, and overall preparedness. Conversely, the synergy arising from the convergence of nanotechnology, biotechnology, information processing and cognitive sciences (NBIC) offers great potential for transformational, revolutionary opportunities with many technological applications. Employing a new initiative termed 'Technology Foresight, Assessment, and Road-Mapping' (Tech-FARM TM ) - a multi dimensional futures-oriented approach for identification and management of emerging and/or disruptive science and technology. In literature similar initiative termed as GRAIN and BANG appear with similarity to NBIC - however Tech-FARM is comprehensive and an exhaustive method. Trans-disciplinary principles underlying NBIC convergence facilitates the development of visions and projections of future possible scientific and technological advances, environments, and productive collaborations for integrated, novel and/or unconventional solutions for 21 st century chem. -bio defense challenges. Incorporation of cognitive sciences refers to human performance enhancement in battlefield theatre. The dynamic relationship between contextual influence (socio-economical factors) and technological development is of critical consideration for S and T futures analyses. The Tech-FARM approach comprises three over-lapping practices of futures studies, including: foresight, the identification of future S and T development and their interaction with society and environment with the purpose of guiding actions to produce a more favorable future; assessment, which is concerned with the unintended, indirect, and delayed impacts of

  8. Application of quality function deployment in defense technology development

    Science.gov (United States)

    Cornejo, Estrella De Maria Forster

    1998-12-01

    program management concerns. The Q-PMM provided an improvement in defining the MOPs that would best describe the overall system MOEs. Both, MOP-MOE associations and a basis of comparison between the two ensembles were elucidated. Conclusion. The findings demonstrated QFD to be an effective approach to defense technology development.

  9. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  10. The science, technology, and politics of ballistic missile defense

    International Nuclear Information System (INIS)

    Coyle, Philip E.

    2014-01-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles

  11. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  12. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  13. Self-defense or undermining the self? Exploring the possibilities and limitations of a novel anti-rape technology.

    Science.gov (United States)

    White, Deborah; Rees, Gethin

    2014-03-01

    Despite decades of feminist-inspired law reforms, rape remains highly prevalent. While many continue to fight for broad cultural and institutional changes, some argue that more immediate interventions are required. Self-defense techniques represent a key strategy of resistance to rape, and empirical evidence suggests that women's active resistance may hold a number of positive benefits. In this essay, we compare the aims and objectives of a novel anti-rape technology, known as the Rape-aXe, with traditional self-defense techniques, focusing upon the potential for both to resist individual acts of sexual aggression and, more broadly, end gendered sexual violence.

  14. Science and Technology vs. Defense and Security: Dual Use Consequences, a South American Perspective

    International Nuclear Information System (INIS)

    Espona, M. J.

    2007-01-01

    Nowadays we can say that science and technology are development driven forces in most countries, with some exceptions especially in the Southern Hemisphere. Even though, we have to take into account their link to and impact on defense and security and not only when it comes to WMD but also in the economy and academy areas, both in developed and developing countries. Within this framework, when we analyze the spread of technology and knowledge, it is important to consider: the media where it takes place (e.g. journals, internet, conferences, commercial agreements); which the actors involved are (e.g. scientists, governmental agencies, commercial firms); and the motive why it occurs (e.g. scientific discoveries; commercial exchange; international agreements). Once known all these elements, which vary both intracountry and intercountry, we may have a deep and broad enough framework to consider which policies to take in order to foster scientific and technologic development without collaborating with state and non state WMD programs. Although we already have a legal framework to fight against WMD proliferation and terrorism, the diverse degree of success of such instruments makes it necessary to continue analyzing and debating ways to strengthen them and/or find new ones. Therefore, in this paper we will analyze how the phenomena of science and technology development and spread impacts on defense and security from a South American perspective, taking into account the particular differences among developed and developing countries. Among the primary findings we can mention the existing differences between countries when it comes to the place (military, academic or commercial ones) where the critical science and technology innovative developments take place; the origin of funding (private or governmental); the existence and fulfillment of plans to foster science and technology development; and the scientific community awareness in WMD topics. All these elements have a

  15. 75 FR 10163 - Providing an Order of Succession Within the Department of Defense

    Science.gov (United States)

    2010-03-05

    ...; (5) Under Secretary of Defense for Acquisition, Technology, and Logistics; (6) Under Secretary of..., Technology, and Logistics; (12) Principal Deputy Under Secretary of Defense for Policy; (13) Principal Deputy... Defense Research and Engineering; (17) General Counsel of the Department of Defense, the Assistant...

  16. Active Computer Network Defense: An Assessment

    Science.gov (United States)

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  17. TOOLS OF KNOWLEDGE DISSEMINATION WITHIN A NATIONAL DEFENSE INSTITUTION FOR INNOVATION, TECHNOLOGY AND SCIENCE

    Directory of Open Access Journals (Sweden)

    Edson Aparecida de Araújo Querido Oliveira

    2006-11-01

    Full Text Available This paper describes and analyzes in a National Defense Institution for Innovation, Technology and Science its tools of knowledge dissemination. The methodology contemplates the period of 2004 and 2005. Qualitative and quantitative information orientate the research in order to understand focal aspects on knowledge dissemination, in comparison with theoretical references of renowned authors and other elaborated research searching for elements to perform an organizational diagnosis, focused on the knowledge dissemination as well as on the forces which promote or obstruct the organizational development. Conclusions are that the tools of knowledge dissemination must suitable to spread the tacit knowledge in such a way as the explicit ones and that, in a National Defense Institution, other important aspects must be considered, a time that, being the spread knowledge of wrong form can, besides bringing damages for the organization, to compromise the national sovereignty.

  18. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    contested environment. Cybersecurity being treated as key “leader business ” is criti- cal to the overall cybersecurity posture of our DoD acquisi... Cybersecurity The Road Ahead for Defense Acquisition Steve Mills n Steve Monks Mills and Monks are professors of Program Management at the Defense...not only on adequate funding for leaps in technology but also on honing that technology to protect the capability against cybersecurity threats. The

  19. Student Papers on Strategic Defense Initiative.

    Science.gov (United States)

    1985-01-01

    895. 3. "Scientific Canvas" AWST, p. 19. 4. Halliday, p. 548. 5. William Shiner, Lasers (New York: Mc Graw -Hill, 1980), p. 21. - 30...and Design. New York: Mc Graw -Hill, 1980. U.S. Department of Defense. The Strategic Defense Ini- tiative: Defensive Technologies Study. Washington...Armageddon," Armed Forces Journal, February 1983, p. 30. 7. David Baker, The Shape of Wars to Come (Cambridge: Patrick Stephens , Ltd, 1981), p. 109

  20. Defense radioactive waste management

    International Nuclear Information System (INIS)

    Hindman, T.B. Jr.

    1988-01-01

    The Office of Defense Programs (DP), U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. Pursuant to this mission, DP operates a large industrial complex that employs over 60,000 people at various installations across the country. As a byproduct of their activities, these installations generate radioactive, hazardous, or mixed wastes that must be managed in a safe and cost-effective manner in compliance with all applicable Federal and STate environmental requirements. At the Federal level such requirements derive primarily from the Atomic Energy Act, the Resource Conservation and Recovery Act (RCRA), the comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the Superfund Amendments and Reauthorization Act (SARA). Responsibility for DP activities in connection with the disposal of defense wastes is consolidated within the Office of Defense Waste and Transportation Management (DWTM). This paper discusses these activities which consist of five principal elements: the environmental restoration of inactive DP facilities and sites, the processing storage and disposal of wastes associated with ongoing operations at active DP facilities, research and development directed toward the long-term disposal of radioactive, hazardous, mixed wastes, technology development directly supporting regulatory compliance, and the development of policies, procedures, and technologies for assuring the safe transportation of radioactive and hazardous materials

  1. DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations

    Data.gov (United States)

    National Aeronautics and Space Administration — DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations in polar stereographic projection currently include Defense Meteorological Satellite...

  2. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  3. Introducing Electronic Textbooks as Daily-Use Technology in Schools: A Top-Down Adoption Process

    Science.gov (United States)

    Chiu, Thomas K. F.

    2017-01-01

    This study took frequency of use and the adoption process into account to define the participants and external variables of the research model. School electronic textbooks are a daily-use technology and they are adopted in a compulsory, top-down way. Their introduction can evoke feelings of anxiety among teachers because of a possible increase in…

  4. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  5. Massachusetts Institute of Technology Defense & Arms Control Studies Program

    Science.gov (United States)

    1996-01-01

    security of the nation. The unicorn is the obvious symbol for this box. Even with a two percent of GDP or less defense budget, we will maintain our nuclear...systems is not going away. There are some unicorns in the defense herd and this would be a time to claim to be one. ACTIVITIES AND PERSONNEL Looking...macroeconomics and public finance is advisable. The subjects in the Forces and Force Analysis section will provide sufficient review of the technical

  6. Impact of Hearing Aid Technology on Outcomes in Daily Life II: Speech Understanding and Listening Effort.

    Science.gov (United States)

    Johnson, Jani A; Xu, Jingjing; Cox, Robyn M

    2016-01-01

    Modern hearing aid (HA) devices include a collection of acoustic signal-processing features designed to improve listening outcomes in a variety of daily auditory environments. Manufacturers market these features at successive levels of technological sophistication. The features included in costlier premium hearing devices are designed to result in further improvements to daily listening outcomes compared with the features included in basic hearing devices. However, independent research has not substantiated such improvements. This research was designed to explore differences in speech-understanding and listening-effort outcomes for older adults using premium-feature and basic-feature HAs in their daily lives. For this participant-blinded, repeated, crossover trial 45 older adults (mean age 70.3 years) with mild-to-moderate sensorineural hearing loss wore each of four pairs of bilaterally fitted HAs for 1 month. HAs were premium- and basic-feature devices from two major brands. After each 1-month trial, participants' speech-understanding and listening-effort outcomes were evaluated in the laboratory and in daily life. Three types of speech-understanding and listening-effort data were collected: measures of laboratory performance, responses to standardized self-report questionnaires, and participant diary entries about daily communication. The only statistically significant superiority for the premium-feature HAs occurred for listening effort in the loud laboratory condition and was demonstrated for only one of the tested brands. The predominant complaint of older adults with mild-to-moderate hearing impairment is difficulty understanding speech in various settings. The combined results of all the outcome measures used in this research suggest that, when fitted using scientifically based practices, both premium- and basic-feature HAs are capable of providing considerable, but essentially equivalent, improvements to speech understanding and listening effort in daily

  7. Defense Acquisition Reform: Background, Analysis, and Issues for Congress

    Science.gov (United States)

    2014-05-23

    provided to CRS by Semiconductor Industry, October, 2013. 33 Zachary Fryer- Biggs , “Looking Beyond Defense: Firms Grow Revenue—By Diversifying,” DefenseNews...was chartered based on the authority set forth in Section 854 of the John Warner National Defense Authorization Act for 2007 (P.L. 109-364). See...Secretary of Defense for Acquisition, Technology, and Logistics John Young echoed this sentiment, stating “the enterprise will often pressure acquisition

  8. Gaze-based assistive technology used in daily life by children with severe physical impairments - parents' experiences.

    Science.gov (United States)

    Borgestig, Maria; Rytterström, Patrik; Hemmingsson, Helena

    2017-07-01

    To describe and explore parents' experiences when their children with severe physical impairments receive gaze-based assistive technology (gaze-based assistive technology (AT)) for use in daily life. Semi-structured interviews were conducted twice, with one year in between, with parents of eight children with cerebral palsy that used gaze-based AT in their daily activities. To understand the parents' experiences, hermeneutical interpretations were used during data analysis. The findings demonstrate that for parents, children's gaze-based AT usage meant that children demonstrated agency, provided them with opportunities to show personality and competencies, and gave children possibilities to develop. Overall, children's gaze-based AT provides hope for a better future for their children with severe physical impairments; a future in which the children can develop and gain influence in life. Gaze-based AT provides children with new opportunities to perform activities and take initiatives to communicate, giving parents hope about the children's future.

  9. Developing defensive aids suite technology on a virtual battlefield

    Science.gov (United States)

    Rapanotti, John L.; DeMontigny-Leboeuf, Annie; Palmarini, Marc; Cantin, Andre

    2002-07-01

    Modern anti-tank missiles and the requirement of rapid deployment are limiting the use of passive armour in protecting land vehicles. Vehicle survivability is becoming more dependent on sensors, computers and countermeasures to detect and avoid threats. The integration of various technologies into a Defensive Aids Suite (DAS) can be designed and analyzed by combining field trials and laboratory data with modeling and simulation. MATLAB is used as a quick prototyping tool to model DAS systems and facilitate transfer to other researchers. The DAS model can be transferred from MATLAB or programmed directly in ModSAF (Modular Semi-Automated Forces), which is used to construct the virtual battlefield. Through scripted input files, a fixed battle approach ensures implementation and analysis meeting the requirements of three different interests. These three communities include the scientists and engineers, military and operations research. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. A system can be modelled phenomenologically until more information is available. Further processing of the simulation can be used to optimize the vehicle for a specific mission. ModSAF will be used to analyze and plan trials and develop DAS technology for future vehicles. Survivability of a DAS-equipped vehicle can be assessed relative to a basic vehicle without a DAS. In later stages, more complete DAS systems will be analyzed to determine the optimum configuration of the DAS components and the effectiveness of a DAS-equipped vehicle for specific missions. These concepts and approach will be discussed in the paper.

  10. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  11. Policy implications of the Strategic Defense Initiative

    International Nuclear Information System (INIS)

    Goodwin, R.C.

    1991-01-01

    Specific topics include: the technological feasibility of proposed components and architectures; the compatibility of the proposed systems with existing and proposed arms control agreements, with special emphasis upon the ABM Treaty, Outer Space Treaty, the Defense and Space Treaty, and the START Treaty; the compatibility of proposed systems with classical warfare doctrine and the four modern strategic nuclear doctrines of Massive Retaliation, Assured Destruction, Countervailing and Flexible Response; the economics of strategic defense including an assessment of overall governmental spending, of the suballocation for defense, and of the feasibility of defensive systems which are cost-effective at the margin; and, in summary, an assessment of the New Strategic Concept which balances arms control, offensive forces, and defensive forces. This study falls within the realm of defense policy analysis in that it attempts to determine whether the administration's proposed Strategic Defense Initiative, as well as the long-term strategic defensive systems derived from SDI research, constitute efficient, desirable allocation of scarce government resources - especially in a period of seemingly relaxed superpower tensions and numerous demands upon those resources

  12. Technology-Aided Verbal Instructions to Help Persons with Mild or Moderate Alzheimer's Disease Perform Daily Activities

    Science.gov (United States)

    Lancioni, Giulio E.; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Tatulli, Emanuela; Rigante, Valeria; Zonno, Nadia; Perilli, Viviana; Pinto, Katia; Minervini, Mauro G.

    2010-01-01

    These two studies extended previous research on the use of verbal instructions and support technology for helping persons with mild or moderate Alzheimer's disease perform daily activities. Study I included seven participants who were to carry out one of two previously targeted activities (i.e., either coffee preparation or table setting). Study…

  13. Defensive medicine among obstetricians and gynecologists in tertiary hospitals.

    Directory of Open Access Journals (Sweden)

    Elad Asher

    Full Text Available OBJECTIVE: To describe the daily work practice under the threat of defensive medicine among obstetricians and gynecologists. STUDY DESIGN: A prospective cross-sectional survey of obstetricians and gynecologists working at tertiary medical centers in Israel. RESULTS: Among the 117 obstetricians and gynecologists who participated in the survey, representing 10% of the obstetricians and gynecologists registered by the Israel Medical Association, 113 (97% felt that their daily work practice is influenced by concern about being sued for medical negligence and not only by genuine medical considerations. As a result, 102 (87% physicians are more likely to offer the cesarean section option, even in the absence of a clear medical indication, 70 (60% follow court rulings concerning medical practices, and 85 (73% physicians mentioned that discussions about medical negligence court rulings are included in their departments' meetings. CONCLUSIONS: Defensive medicine is a well-embedded phenomenon affecting the medical decision process of obstetricians and gynecologists.

  14. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  15. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    Lenders Program DFAR Defense Financial Accounting Regulation DoD Department of Defense DoDSIG Department of Defense Suppliers Information Guide EFT ...through electronic funds transfer ( EFT ). Additionally, CCR shares the data with federal government procurement and electronic business systems. (CCR...government contracting procedures. Additionally, the small business contractors can also tap into SBA resources to find out the latest news on

  16. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    station control, and defense. c. Simulation Display Generator ( SDG ) [Patterson 83] I0 SDG supports the creation, display, modification, storage, and...34 Proceedings Trends and Applications 1981, IEEE, (May 28, 1981). [Parnas 86] Parnas, D.L., "When can Software be Trustworthy?" Keynote Address to Compass 󈨚

  17. Department of Defense Joint Chemical and Biological Defense Program 2009 Annual Report to Congress

    Science.gov (United States)

    2009-03-27

    private sector all partner with the DoD CBDP to fulfill its mission to provide CBRN defense capabilities in support of the National Military Strategies...Venezuelan, and Eastern Equine Encephalitis) delivered by electroporation which showed high efficacy in non-human primates. Developed five technology

  18. Defense Technology Journal, Vol. 16, No. 2, February 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-02-01

    ;Contents: VERTIGO Simulation; Education Reform of National Defense Academy; Artilleries and Ammunitions (4); Newly developed encryption algorithm (MISTY) that surpasses DES; CAS EXPO`95 in California USA; Underwater Weapons; Phaser Gun; and Japanese Missile.

  19. Participation after acquired brain injury: Associations with everyday technology and activities in daily life.

    Science.gov (United States)

    Fallahpour, Mandana; Kottorp, Anders; Nygård, Louise; Lund, Maria Larsson

    2015-01-01

    The development of the information society has led to increased use of everyday technology and changed the conditions for participation. Enabling participation in everyday life situations is an important rehabilitation goal after acquired brain injury (ABI). Identifying factors associated with individuals' experienced participation and problems therein is therefore essential. This study aimed at exploring the relationship between perceived difficulty in everyday technology use, perceived ability in the activities of daily living (ADL), and perceived participation, and participation problems in persons with ABI. Eighty-one persons with ABI participated in the study and were assessed by the Impact on Participation and Autonomy questionnaire, the Everyday Technology Use Questionnaire, and the ADL taxonomy. Findings showed that the combined model of difficulty in everyday technology (ET) use, ADL ability, and the interaction between them explained both participation in various domains of everyday life, and also overall level of perceived participation and the perceived problems. The findings underscore the importance of evaluating individuals' ability in both ET use and ADL after ABI to increase the probability of explaining these persons' participation in desired everyday life situations and, also, for rehabilitation design.

  20. Strategic Defense Initiative Organization: Corporate Plan

    National Research Council Canada - National Science Library

    1992-01-01

    ... requires a flexible yet focused approach to attain its mission; namely, to research, develop, acquire, and deploy systems and technologies which provide ballistic missile defense to include Global Protection Against Limited Strikes (OPALS...

  1. Artificial Intelligence: The Bumpy Path Through Defense Acquisition

    Science.gov (United States)

    2017-12-01

    we must prepare for. 2. AI Industry Leaders Throughout history many technological breakthroughs have occurred due to the guidance and curation of... technology demonstrations, and exercises that aim to capture technology -based lessons learned. Failure to address AI essentials causes problems in...defense acquisition: system requirements are impossible to define; transition of AI technology fails; testing cannot be evaluated with confidence; and

  2. International technology exchange in support of the Defense Waste Processing Facility wasteform production

    International Nuclear Information System (INIS)

    Kitchen, B.G.

    1989-01-01

    The nearly completed Defense Waste Processing Facility (DWPF) is a Department of Energy (DOE) facility at the Savannah River Site that is designed to immobilize defense high level radioactive waste (HLW) by vitrification in borosilicate glass and containment in stainless steel canisters suitable for storage in the future DOE HLW repository. The DWPF is expected to start cold operation later this year (1990), and will be the first full scale vitrification facility operating in the United States, and the largest in the world. The DOE has been coordinating technology transfer and exchange on issues relating to HLW treatment and disposal through bi-lateral agreements with several nations. For the nearly fifteen years of the vitrification program at Savannah River Laboratory, over two hundred exchanges have been conducted with a dozen international agencies involving about five-hundred foreign national specialists. These international exchanges have been beneficial to the DOE's waste management efforts through confirmation of the choice of the waste form, enhanced understanding of melter operating phenomena, support for paths forward in political/regulatory arenas, confirmation of costs for waste form compliance programs, and establishing the need for enhancements of melter facility designs. This paper will compare designs and schedules of the international vitrification programs, and will discuss technical areas where the exchanges have provided data that have confirmed and aided US research and development efforts, impacted the design of the DWPF and guided the planning for regulatory interaction and product acceptance

  3. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  4. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... and what emerging science and technology would have the greatest intelligence potential in this type... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Counter... Defense (DoD). ACTION: Notice of advisory committee meetings. SUMMARY: The Defense Science Board Task...

  5. Defense waste management plan

    International Nuclear Information System (INIS)

    1983-06-01

    Defense high-level waste (HLW) and defense transuranic (TRU) waste are in interim storage at three sites, namely: at the Savannah River Plant, in South Carolina; at the Hanford Reservation, in Washington; and at the Idaho National Engineering Laboratory, in Idaho. Defense TRU waste is also in interim storage at the Oak Ridge National Laboratory, in Tennessee; at the Los Alamos National Laboratory, in New Mexico; and at the Nevada Test Site, in Nevada. (Figure E-2). This document describes a workable approach for the permanent disposal of high-level and transuranic waste from atomic energy defense activities. The plan does not address the disposal of suspect waste which has been conservatively considered to be high-level or transuranic waste but which can be shown to be low-level waste. This material will be processed and disposed of in accordance with low-level waste practices. The primary goal of this program is to utilize or dispose of high-level and transuranic waste routinely, safely, and effectively. This goal will include the disposal of the backlog of stored defense waste. A Reference Plan for each of the sites describes the sequence of steps leading to permanent disposal. No technological breakthroughs are required to implement the reference plan. Not all final decisions concerning the activities described in this document have been made. These decisions will depend on: completion of the National Environmental Policy Act process, authorization and appropriation of funds, agreements with states as appropriate, and in some cases, the results of pilot plant experiments and operational experience. The major elements of the reference plan for permanent disposal of defense high-level and transuranic waste are summarized

  6. Next Generation Nuclear Plant Defense-in-Depth Approach

    International Nuclear Information System (INIS)

    Wallace, Edward G.; Fleming, Karl N.; Burns, Edward M.

    2009-01-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  7. Foresight Model of Turkey's Defense Industries' Space Studies until 2040

    Science.gov (United States)

    Yuksel, Nurdan; Cifci, Hasan; Cakir, Serhat

    2016-07-01

    Being advanced in science and technology is inevitable reality in order to be able to have a voice in the globalized world. Therefore, for the countries, making policies in consistent with their societies' intellectual, economic and political infrastructure and attributing them to the vision having been embraced by all parties of the society is quite crucial for the success. The generated policies are supposed to ensure the usage of countries' resources in the most effective and fastest way, determine the priorities and needs of society and set their goals and related roadmaps. In this sense, technology foresight studies based on justified forecasting in science and technology have critical roles in the process of developing policies. In this article, Foresight Model of Turkey's Defense Industries' Space Studies, which is turned out to be the important part of community life and fundamental background of most technologies, up to 2040 is presented. Turkey got late in space technology studies. Hence, for being fast and efficient to use its national resources in a cost effective way and within national and international collaboration, it should be directed to its pre-set goals. By taking all these factors into consideration, the technology foresight model of Turkey's Defense Industry's Space Studies was presented in the study. In the model, the present condition of space studies in the World and Turkey was analyzed; literature survey and PEST analysis were made. PEST analysis will be the inputs of SWOT analysis and Delphi questionnaire will be used in the study. A two-round Delphi survey will be applied to the participants from universities, public and private organizations operating in space studies at Defense Industry. Critical space technologies will be distinguished according to critical technology measures determined by expert survey; space technology fields and goals will be established according to their importance and feasibility indexes. Finally, for the

  8. Defense Technology Plan

    Science.gov (United States)

    1994-09-01

    implementation of the services necessary to support transparent "information pull " operation of decision support systems. This infrastructure will be implemented...technology. Some aspects of this area such as user- pull , mobile and highly distributed operation, bandwidth needs and degree of securihy are Dol)-driven...by a variety of statutory requirements. R&D will provide enhanced mission effectiveness and maintenance of fragile ecosystems. The goalis to develop

  9. Problems and Mitigation Strategies for Developing and Validating Statistical Cyber Defenses

    Science.gov (United States)

    2014-04-01

    such as Firewalls , HTTP proxies, and application-level Attribute Based Ac- cess Control [1] to provide a layered defense in depth. The spe- cific...research and technology develop- ment in several areas including: cyber defense, synthetic biology, advanced design tools, AI learning, and quantum

  10. 76 FR 5236 - 60-Day Notice of Proposed Information Collection: Form DS-4071, Export Declaration of Defense...

    Science.gov (United States)

    2011-01-28

    ... Information Collection: Export Declaration of Defense Technical Data or Services. OMB Control Number: 1405... of technology. Abstract of proposed collection: Actual export of defense technical data and defense... DS-4071, Export Declaration of Defense Technical Data or Services; OMB Control Number 1405-0157...

  11. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    Science.gov (United States)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  12. Whither Ballistic Missile Defense?

    Science.gov (United States)

    1992-11-30

    important that technology today is placing enormous power in the many camps-not only information that enables timely decision-making, but also the...WHITHER BALLISTIC MISSILE DEFENSE? BY AMBASSADOR HENRY F. COOPER NOVEMBER 30,1992 TECHNICAL MARKETING SOCIETY OF AMERICA WASHINGTON, DC...Conference on Technical Marketing 2000: Opportunities and Strategies for a Changing World) I intend to discuss the prospects for SDI in a changing

  13. Department of Defense high power laser program guidance

    Science.gov (United States)

    Muller, Clifford H.

    1994-06-01

    The DoD investment of nominally $200 million per year is focused on four high power laser (HPL) concepts: Space-Based Laser (SBL), a Ballistic Missile Defense Organization effort that addresses boost-phase intercept for Theater Missile Defense and National Missile Defense; Airborne Laser (ABL), an Air Force effort that addresses boost-phase intercept for Theater Missile Defense; Ground-Based Laser (GBL), an Air Force effort addressing space control; and Anti-Ship Missile Defense (ASMD), a Navy effort addressing ship-based defense. Each organization is also supporting technology development with the goal of achieving less expensive, brighter, and lighter high power laser systems. These activities represent the building blocks of the DoD program to exploit the compelling characteristics of the high power laser. Even though DoD's HPL program are focused and moderately strong, additional emphasis in a few technical areas could help reduce risk in these programs. In addition, a number of options are available for continuing to use the High-Energy Laser System Test Facility (HELSTF) at White Sands Missile Range. This report provides a brief overview and guidance for the five efforts which comprise the DoD HPL program (SBL, ABL, GBL, ASMD, HELSTF).

  14. Research on moving target defense based on SDN

    Science.gov (United States)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  15. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  16. Offense-Defense Theory Analysis of Russian Cyber Capability

    Science.gov (United States)

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  17. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  18. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  19. Gaze-based assistive technology in daily activities in children with severe physical impairments-An intervention study.

    Science.gov (United States)

    Borgestig, Maria; Sandqvist, Jan; Ahlsten, Gunnar; Falkmer, Torbjörn; Hemmingsson, Helena

    2017-04-01

    To establish the impact of a gaze-based assistive technology (AT) intervention on activity repertoire, autonomous use, and goal attainment in children with severe physical impairments, and to examine parents' satisfaction with the gaze-based AT and with services related to the gaze-based AT intervention. Non-experimental multiple case study with before, after, and follow-up design. Ten children with severe physical impairments without speaking ability (aged 1-15 years) participated in gaze-based AT intervention for 9-10 months, during which period the gaze-based AT was implemented in daily activities. Repertoire of computer activities increased for seven children. All children had sustained usage of gaze-based AT in daily activities at follow-up, all had attained goals, and parents' satisfaction with the AT and with services was high. The gaze-based AT intervention was effective in guiding parents and teachers to continue supporting the children to perform activities with the AT after the intervention program.

  20. Overview of Accelerator Applications for Security and Defense

    Science.gov (United States)

    Antolak, Arlyn J.

    Particle accelerators play a key role in a broad set of defense and security applications, including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization, and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat to developing a radiological dispersal device, and, can be used to produce isotopes for medical, industrial, and research purposes. An overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security is presented.

  1. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  2. Dressing in elderly’s daily lives: contributions from ergonomics and assistive technologies

    Directory of Open Access Journals (Sweden)

    Crislaine Gruber

    2016-12-01

    Full Text Available Ergonomics aims to adapt products, services and strategies to make them compatible with the needs, abilities and limitations of people. Assistive technologies (AT are devices, services, strategies and practices that reduce problems caused by functional limitations of individuals. They can help elderly to accomplish activities of daily living like dressing. Considering the aging of world population, this paper presents a research on interaction between the elderly and an assistive dressing aid to verify their perceptions about the use of the AT device. Five participants used the AT device to put a pair of socks, and evaluated this experience. We found that the main difficulty for elderly in using the device was understanding the manual. Participants could not dress the pair of socks completely. Completing the tests, we evaluated the instruments and highlighted the participant’s opinions regarding advantages and disadvantages of the product.

  3. Survey of the Diversity and Defense-in-Depth Technologies for Application to NPP Digital I and C Systems

    International Nuclear Information System (INIS)

    Cheon, S. W.; Kim, J. Y.; Choi, J. G.

    2011-09-01

    This report reviews the nature of common-cause failures (CCFs) of the digital I and C (instrumentation and control) systems, diversity and defense-in-depth (D3) technologies and those practices in nuclear power plants. The report presents the diversity strategies, which consist of combinations of diversity attributes and their associated criteria. The report also presents assessment of the nature of CCFs and compensating diversity attributes. The diversity usage classification scheme involves three families of strategies: (1) different technologies (Strategies A), (2) different approaches within the same technology (Strategies B), and (3) different architectures within the same technology (Strategies C). The grouping of diversity criteria combinations establishes baseline diversity usage and facilitates a systematic organization of strategic approaches for coping with CCF vulnerabilities. Effectively, these baseline sets of diversity criteria constitute appropriate CCF mitigating strategies for digital safety systems. The strategies represent guidance on acceptable diversity usage and can be applied directly to ensure that CCF vulnerabilities identified through a D3 assessment have been adequately resolved. Additionally, the report presents the framework of diversity usage tables are presented for capturing practices regarding diversity usage

  4. Defense Technology Objectives for the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan

    National Research Council Canada - National Science Library

    1998-01-01

    .... Technologies such as radar, jet engines, nuclear weapons, night vision, smart weapons, stealth, the Global Positioning System, and vastly more capable information management systems have changed warfare dramatically...

  5. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  6. Tracking the daily availability of burn beds for national emergencies.

    Science.gov (United States)

    Barillo, David J; Jordan, Marion H; Jocz, Richard J; Nye, Donna; Cancio, Leopoldo C; Holcomb, John B

    2005-01-01

    Medical planning for Operation Iraqi Freedom included predictive models of expected number of burn casualties. In all but the best-case scenario, casualty estimates exceeded the capacity of the only Department of Defense burn center. Examination of existing federal-civilian disaster plans for military hospital augmentation revealed that bed availability data were neither timely nor accurate. Recognizing the need for accurate knowledge of burn bed availability, the Department of Defense requested assistance from the American Burn Association (ABA). Directors of burn centers in the United States were queried for interest in participation in a mass casualty plan to provide overflow burn bed capacity. A list of 70 participating burn centers was devised based upon proximity to planned military embarkation points. A computer tracking program was developed. Daily automated e-mail messages requesting bed status were sent to burn center directors at 6 am Central time with responses requested before 11 am. The collated list of national overflow burn bed capacity was e-mailed each day to the ABA Central Office and to federal and military agencies involved with burn patient triage and transportation. Once automated, this task required only 1-2 hours a day. Available burn-bed lists were generated daily between March 17 and May 2, 2003 and then every other day until May 9, 2003. A total of 2151 responses were received (mean, 43 burn centers per day). A system to track daily nationwide burn bed availability was successfully implemented. Although intended for military conflict, this system is equally applicable to civilian mass casualty situations. We advocate adoption of this or a similar bed tracking system by the ABA for use during burn mass casualty incidents.

  7. An Initial Look at Technology and Institutions on Defense Industry Consolidation

    National Research Council Canada - National Science Library

    Driessnack, John

    2004-01-01

    .... We take an initial look at the industry, and highlight how these changes influenced transaction costs in the defense industry, more fully explain the forces driving consolidation, and provide greater...

  8. Defense Technology Opportunities for First Responders

    National Research Council Canada - National Science Library

    White, Rodney; Bedard, Louis; Derrah, Scott; Boucher, Robert

    2004-01-01

    For this study, the US and Canadian governments assessed the potential for technology transfer of five technologies, which were developed to meet military requirements, to civilian first responders...

  9. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  10. Radionuclide separations and processing for defense water management

    International Nuclear Information System (INIS)

    Fryberger, T.B.

    1993-01-01

    An overview is given of the Department of Energy's Efficient Separations and Processing Integrated Program (ESPIP). This program sponsors research in advanced chemical separations for removal of radionuclides and hazardous components from radioactive defense wastes. Separations processing will reduce the volume of high-level waste that must be disposed of in a deep geological repository and will improve the quality of low-level wastes acceptable for near-surface disposal. DOE defense complex processing needs as well as technologies that are currently under development in the program are discussed

  11. Review of flat panel display programs and defense applications

    Science.gov (United States)

    Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.

    1997-07-01

    Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.

  12. Will technology make shelters obsolete

    International Nuclear Information System (INIS)

    Haaland, C.M.; Chester, C.V.

    1981-01-01

    The fears and hopes that shelters for civil defense might be made obsolete by technology fall along diametrically opposed paths. Along the pessimistic direction is the fear that strategic offensive weapons have become so numerous and terrible that no shelter program is worthwhile. This fear has been nurtured by the US deterrence policy of Mutual Assured Destruction (MAD), about which we will say more in the first part of this article. In the opposite direction along the optimistic path is the hope that active defensive technology will become so good that shelters will be unnecessary. Very few hold this viewpoint today, although there was a time during the development of antiballistic missiles (ABM) when such a hope was common. The recent emphasis on research and development of laser- and particle-beam weapons has again raised some hopes that defense against strategic missiles may become effective. Researchers will discuss the impact of defensive technology on shelters in Part II of this article

  13. Soviet debate on missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Parrott, B.

    1987-04-01

    Although the Strategic Defense Initiative (SDI) is meant to cope with the danger of a Soviet nuclear attack, the recent US debate over SDI has paid surprisingly little attention to Soviet views of ballistic missile defense. Despite the existence of a substantial body of pertinent scholarship, the debate has failed to take adequate account of major changes in Soviet ballistic missile defense policy since the mid-1960s. It has also neglected the links between current Soviet military policy and broader Soviet political and economic choices. The Soviets regard SDI not as a novel undertaking to reduce the risks of nuclear war but as an extension of the geopolitical competition between the superpowers. This competition has been dominated in the 1980s, in the Soviet view, by sharply increased US assertiveness and the decline of detente. Viewing SDI as a manifestation of these general trends, Soviet decision makers find the prospect of an unregulated race in ballistic missile defenses and military space technologies deeply unsettling. The deterioration of superpower relations has raised serious doubts in Moscow about the wisdom of Soviet external policy during the 1970s and has provoked sharp internal differences over policy toward the US. Already highly suspicious of the Reagan administration, the elite is united by a general conviction that SDI is an American gambit that may ultimately undercut past Soviet strategic gains and pose a grave new threat to Soviet security. 14 references.

  14. Sex and repeated restraint stress interact to affect cat odor-induced defensive behavior in adult rats.

    Science.gov (United States)

    Perrot-Sinal, Tara S; Gregus, Andrea; Boudreau, Daniel; Kalynchuk, Lisa E

    2004-11-19

    The overall objective of the present experiment was to assess sex differences in the effects of repeated restraint stress on fear-induced defensive behavior and general emotional behavior. Groups of male and female Long-Evans rats received either daily restraint stress (stressed) or daily brief handling (nonstressed) for 21 consecutive days. On days 22-25, a number of behavioral tests were administered concluding with a test of defensive behavior in response to a predatory odor. Stressed and nonstressed males and females were exposed to a piece of cat collar previously worn by a female domestic cat (cat odor) or a piece of collar never worn by a cat (control odor) in a familiar open field containing a hide barrier. Rats displayed pronounced defensive behavior (increased hiding and risk assessment) and decreased nondefensive behavior (grooming, rearing) in response to the cat odor. Nonstressed females exposed to cat odor displayed less risk assessment behavior relative to nonstressed males exposed to cat odor. Restraint stress had little effect on defensive behavior in male rats but significantly increased risk assessment behaviors in females. Behavior on the Porsolt forced swim test (a measure of depression-like behavior) and the open field test (a measure of anxiety-like behavior) was not affected by stress or sex. These findings indicate the utility of the predator odor paradigm in detecting subtle shifts in naturally occurring anxiety-like behaviors that may occur differentially in males and females.

  15. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  16. Options for Department of Defense Total Workforce Supply and Demand Analysis: Potential Approaches and Available Data Sources

    Science.gov (United States)

    2014-01-01

    publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at...in Workforce Planning and Potential Modeling of Military Training, Land Defense Science and Technology Organisation , Australian Government Department...Technology Organisation , Australian Government Department of Defense, DSTO-TR-2037, 2007. Ward, D., “Workforce Demand Forecasting Techniques,” Human

  17. Indicators of the development of defense logistics as a science

    Directory of Open Access Journals (Sweden)

    Marko D. Andrejić

    2012-10-01

    Full Text Available In practice, there are several approaches in discussing the achieved level of development of a scientific discipline. One group of them concentrates on external indicators of the development of a scientific discipline, i.e. its research network, while the other group analyzes the science structure, i.e. its elements. The achieved level of the development of the defense system and its (external and internal environment, general knowledge on the development and the systematic treatment of science as well as the present situation in the society require an insight into the internal and external indicators of the development of defense logistics as a scientific discipline (Defense Science. General knowledge on the creation, development and interdependence of sciences as well as internal and external indicators of the achieved development level of Defense Logistics show that it should be developed in the network environment as a multidisciplinary science, in close cooperation with other special disciplines of logistics, within defense science. It could thus contribute to the improvement of the defense as an important public function as well as to closer contacts of the scientific disciplines dealing with technical systems and technologies with the so-called. orthodox military disciplines.

  18. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  19. Technology Commercialization Program 1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-11-01

    This reference compilation describes the Technology Commercialization Program of the Department of Energy, Defense Programs. The compilation consists of two sections. Section 1, Plans and Procedures, describes the plans and procedures of the Defense Programs Technology Commercialization Program. The second section, Legislation and Policy, identifies legislation and policy related to the Program. The procedures for implementing statutory and regulatory requirements are evolving with time. This document will be periodically updated to reflect changes and new material.

  20. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  1. Emerging electro-optical technologies for defense applications

    Science.gov (United States)

    Venkateswarlu, Ronda; Ser, W.; Er, Meng H.; Chan, Philip

    1999-11-01

    Technological breakthroughs in the field of imaging and non- imaging sensor sand the related signal processors helped the military users to achieve 'force multiplication'. Present day 'smart-weapon systems' are being converted to 'brilliant-weapon systems' to bridge the gap until the most potent new 'fourth generation systems' come on line based on nanotechnology. The recent military tactics have evolved to take advantage of ever improving technologies to improve the quality and performance over time. The drive behind these technologies is to get a first-pass-mission-success against the target with negligible collateral damage, protecting property and the lives of non-combatants. These technologies revolve around getting target information, detection, designation, guidance, aim-point selection, and mission accomplishment. The effectiveness of these technologies is amply demonstrated during recent wars. This paper brings out the emerging trends in visible/IR/radar smart-sensors and the related signal processing technologies that lead to brilliant guided weapon systems. The purpose of this paper is to give an overview to the readers about futuristic systems. This paper also addresses various system configurations including sensor-fusion.

  2. Development of fusion fuel cycles: Large deviations from US defense program systems

    Energy Technology Data Exchange (ETDEWEB)

    Klein, James Edward, E-mail: james.klein@srnl.doe.gov; Poore, Anita Sue; Babineau, David W.

    2015-10-15

    Highlights: • All tritium fuel cycles start with a “Tritium Process.” All have similar tritium processing steps. • Fusion tritium fuel cycles minimize process tritium inventories for various reasons. • US defense program facility designs did not minimize in-process inventories. • Reduced inventory tritium facilities will lower public risk. - Abstract: Fusion energy research is dominated by plasma physics and materials technology development needs with smaller levels of effort and funding dedicated to tritium fuel cycle development. The fuel cycle is necessary to supply and recycle tritium at the required throughput rate; additionally, tritium confinement throughout the facility is needed to meet regulatory and environmental release limits. Small fuel cycle development efforts are sometimes rationalized by stating that tritium processing technology has already been developed by nuclear weapons programs and these existing processes only need rescaling or engineering design to meet the needs of fusion fuel cycles. This paper compares and contrasts features of tritium fusion fuel cycles to United States Cold War era defense program tritium systems. It is concluded that further tritium fuel cycle development activities are needed to provide technology development beneficial to both fusion and defense programs tritium systems.

  3. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  4. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  5. The defense waste processing facility: A status report

    International Nuclear Information System (INIS)

    Cowan, S.P.; Fulmer, D.C.

    1987-01-01

    The Defense Waste Processing Fascility (DWPF) will be the nation's first production scale facility for immobilizing high-level waste for disposal. It will also be the largest facility of its kind in the world. The technology, design, and construction efforts are on schedule for ''hot'' operation in fiscal year 1990. This paper provides a status report on the DWPF technology, design, and construction, and describes some of the challenges that have arisen during design and construction

  6. Journal of Medical Chemical, Biological and Radiological Defense

    International Nuclear Information System (INIS)

    Price, B.

    2007-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense is a free, on-line journal dedicated to providing an international, peer-reviewed journal of original scientific research and clinical and doctrinal knowledge in the area of medical treatment and countermeasures for chemical, biological and radiological defense; and to developing and maintaining an archive of current research and development information on training, doctrine, and professional discussions of problems related to chemical, biological and radiological casualties. The Journal, www.JMedCBR.org, now in its fifth year, is sponsored by the US Defense Threat Reduction Agency. Areas of interest include, but are not limited to: Neuroprotectants; Bioscavengers for Nerve Agents; Medical Diagnostic Systems and Technologies; Medical Effects of Low Level Exposures; Toxicology and Biological Effects of TICs and TIMs; Broad Spectrum Medical Countermeasures; Treatments and Therapeutics for Bacterial, Viral and Toxin Agents; Radiological Medical Countermeasures; Clinical Treatment of Chemical, Biological or Radiological Casualties; Toxins Structures and Treatments. The Journal is supported by an editorial advisory board of distinguished scientists and researchers in the fields of CBR defense and medical treatment and countermeasures in eleven countries.(author)

  7. Rock mechanics contributions from defense programs

    International Nuclear Information System (INIS)

    Heuze, F.E.

    1992-02-01

    An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth's interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges

  8. Technology for the long-term management of defense HLW at the Idaho Chemical Processing Plant

    International Nuclear Information System (INIS)

    Staples, B.A.; Berreth, J.R.; Knecht, D.A.

    1986-01-01

    The Defense Waste Management Plan of June 1983 includes a reference plan for the long-term management of Idaho Chemical Processing Plant (ICPP) high-level waste (HLW), with a goal of disposing of the annual output in 500 canisters a year by FY-2008. Based on the current vitrification technology, the ICPP base-glass case would produce 1700 canisters per year after FY-2007. Thus, to meet the DWMP goal processing steps including fuel dissolution, waste treatment, and waste immobilization are being studied as areas where potential modifications could result in HLW volume reductions for repository disposal. It has been demonstrated that ICPP calcined wastes can be densified by hot isostatic pressing to multiphase ceramic forms of high loading and density. Conversion of waste by hot isostatic pressing to these forms has the potential of reducing the annual ICPP waste production to volumes near those of the goal of the DWMP. This report summarizes the laboratory-scale information currently available on the development of these forms

  9. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  10. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  11. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  12. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency...

  13. 77 FR 782 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-01-06

    ... private or public sector corporations or organizations; and (b) a wealth of top-level, global business..., economics, technology and healthcare. Board members shall be appointed by the Secretary of Defense, with...

  14. Silverleaf whitefly induces salicylic acid defenses and suppresses effectual jasmonic acid defenses.

    Science.gov (United States)

    Zarate, Sonia I; Kempema, Louisa A; Walling, Linda L

    2007-02-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF.

  15. Orienting-defense responses and psychophysiological reactivity in isolated clinic versus sustained hypertension.

    Science.gov (United States)

    García-Vera, María Paz; Sanz, Jesús; Labrador, Francisco J

    2007-04-01

    This study sought to determine whether patients with white-coat or isolated clinic hypertension (ICH) show, in comparison to patients with sustained hypertension (SH), a defense response pattern to novel stimuli and an enhanced psychophysiological reactivity to stress. Forty-three patients with essential hypertension were divided into two groups after 16 days of self-monitoring blood pressure (BP): ICH (24 men; self-measured BP men; self-measured BP >or= 135/85 mmHg). Defense responses were measured as the cardiac changes to phasic non-aversive auditory stimuli. Psychophysiological reactivity (heart and breath rate, blood volume pulse, electromyography, and skin conductance) was measured during mental arithmetic and video game tasks. The standard deviation of self-measured BPs and the difference between mean BPs at work and at home were used as indicators of cardiovascular reactivity to daily stress. No significant differences were seen in defense responses or psychophysiological reactivity to laboratory or naturally occurring stressors. These results do not support the hypothesis that ICH can be explained in terms of a generalized hyperreactivity to novel or stressful stimuli.

  16. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  17. Possible use of a computer for processing technological information of daily reports on drilling in order to optimize the drilling regimes

    Energy Technology Data Exchange (ETDEWEB)

    Sukhanov, V B; Kovalev, A A; Rezchikov, A V; Sukhanova, L G; Vyazenkin, S N; Zakolyuzhnyy, V D

    1982-01-01

    It is suggested that a computer be used for processing technological information of data reports on drilling. This will permit solution in the future to the task of monitoring the observation of the assigned regime-technological parameters of drilling wells by compiling planning recommendations and factual information about their fulfillment. Comprehensive analysis of the factual data regarding the regimes of making wells based on the information of daily reports on drilling using a computer in the OAIS system of drilling of the Ministry of the Gas Industry at the existing stage of technical support of the associations with a computer will permit in the near future production of exhaustive regime-technological information regarding the operation of bits in each well and development of RTK for drilling future wells by intervals of the same drillability.

  18. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  19. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  20. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary [DOCKET ID DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised...

  1. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary [Docket ID: DOD-2011-OS-0055] Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of...

  2. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  3. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1994--September 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Morrison, J.L. [and others

    1995-04-14

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. Activities this reporting period included performing coal beneficiation/preparation studies, conducting combustion performance evaluations, preparing retrofit engineering designs, determining retrofit economics, and installing a micronized coal-water mixture (MCWM) circuit.

  4. Sanitization and Disposal of Excess Information Technology Equipment

    Science.gov (United States)

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  5. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  6. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of Defense. ACTION: Notice of Closed Meeting. SUMMARY: Pursuant to the...

  7. Defense Logistics: DOD Needs to Take Additional Actions to Address Challenges in Supply Chain Management

    Science.gov (United States)

    2011-07-01

    Jack E. Edwa appendix III. t rds Director, Defense Capabilities and Managemen Page 36 GAO-11-569 Defense Logistics List of Committees...Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302... operations . DOD faces asset visibility challenges due, in part, to a lack of interoperability among information technology

  8. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  9. Capturing daily urban rhythms: the use of location aware technologies

    CSIR Research Space (South Africa)

    Krygsman, S

    2007-07-01

    Full Text Available Daily activities and travel often follow a natural rhythm or flow that is structured by the fixed spatial and temporal constraints. The work and home location act as pegs that define individual’s activity space and it is within these spaces...

  10. From Comprehensive Defense to Resilient City: Strategic Conception of Shanghai’s City Security in the New Normal

    Institute of Scientific and Technical Information of China (English)

    Shi Tingting; Li Min

    2017-01-01

    The trend of climate warming and deeper globalization is adding new content to urban risks in Shanghai, resulting in the adaption of traditional comprehensive defense planning to the new environment. Based on the resilient city theory, this paper proposes a transition for Shanghai from an original comprehensive defense to a resilient city vision through strategic framework and approaches from the three aspects of engineering technology, spatial defense, and social governance in the New Normal age. Meanwhile, it suggests that Shanghai should use information technology to enhance the level of risk monitoring and to improve engineering design standards; strengthen the resilience from the scales of “life circle-urban circle-municipal administrative area”; and innovate as well as improve the social safety governance.

  11. Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury, Annual Report 2009

    Science.gov (United States)

    2009-01-01

    applications for recovering from disaster and trauma Defense and Veterans Brain Injury Center Develops and delivers advanced TBI-specifi c treatment...specifically aimed at developing cognitive and motor therapy tools using videogame technology, game-based PH outreach tools and support tools for children of...Defense Centers of Excellence for Psychological Health and Traumatic Brain Injury Annual Report 2009 Report Documentation Page Form ApprovedOMB No

  12. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  13. An observational study of defensible space in the neighbourhood park

    Science.gov (United States)

    Marzukhi, M. A.; Afiq, M. A.; Zaki, S. Ahmad; Ling, O. H. L.

    2018-02-01

    The planning of neighborhood park is important to provide space for interaction, leisure, and recreation among residents in any neighbourhood area. However, on an almost daily basis, newspapers report inappropriate incidents such as snatch theft, robbery and street attack that occurred in the neighborhood park. These cases reflect the significance of physical planning and design of neighborhood park that directly affect the safety and comfort of the users. Thus, this study attempts to engage with the defensible space concept in ensuring the security elements be applied in the planning of the recreational area. This study adopts a qualitative method form of research that is retrofitted to an observational study. The observational study is significant for revealing the condition of a neighbourhood park in the ‘real-world,’ in which direct observation is conducted on Taman Tasik Puchong Perdana. The observer focused on four elements or variables of defensible space concept including the provision of facilities in the neighborhood park, territoriality, surveillance, image and milieu. The findings revealed that the planning of Taman Tasik Puchong Perdana does not deliberate the defensible space elements, which may contribute to the crime activities in the park. In these circumstances, the planning of neighbourhood park needs to include proposals for the implementation of defensible space in response to the challenges underpinned by crime problems. Besides, the awareness among the residents needs to be emphasized with the support from local authorities and other organizations to manage and sustain the safety environment in the neighborhood park.

  14. Strategic Defense Initiative Organization adaptive structures program overview

    Science.gov (United States)

    Obal, Michael; Sater, Janet M.

    In the currently envisioned architecture none of the Strategic Defense System (SDS) elements to be deployed will receive scheduled maintenance. Assessments of performance capability due to changes caused by the uncertain effects of environments will be difficult, at best. In addition, the system will have limited ability to adjust in order to maintain its required performance levels. The Materials and Structures Office of the Strategic Defense Initiative Organization (SDIO) has begun to address solutions to these potential difficulties via an adaptive structures technology program that combines health and environment monitoring with static and dynamic structural control. Conceivable system benefits include improved target tracking and hit-to-kill performance, on-orbit system health monitoring and reporting, and threat attack warning and assessment.

  15. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  16. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models....... In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated...

  17. Defense Weather Satellites: DOD Faces Acquisition Challenges for Addressing Capability Needs

    Science.gov (United States)

    2016-07-07

    and compare the operational effectiveness and life cycle costs of potential solutions. This testimony is based on a report GAO issued in March...Technology, House of Representatives For Release on Delivery Expected at 10 a.m. ET Thursday, July 7, 2016 GAO-16-769T United States...Environment, Committee on Science, Space, and Technology, House of Representatives July 2016 DEFENSE WEATHER SATELLITES DOD Faces Acquisition

  18. Defense AT&L. Volume 40, Number 3, May-June 2011

    Science.gov (United States)

    2011-05-01

    of Defense Technology and the Lessons of History IGA Robert Ranquet, IHEDN, Paris The United States has long relied on tech-nology to secure...Gen. Vincent Desportes, latest commandant of the French National War College, puts it in his recent book, La Guerre Probable ( Paris , 2008: Economica...engineering, he served as manager of the nuclear propul- sion department of the French navy’s pri- mary shipbuilding unit, the Brest division of the

  19. Russia and NATO Missile Defense: The European Phased Adaptive Approach Experience, 2009-2017

    Science.gov (United States)

    2018-03-01

    Volume I, 1945-1955. Ft. McNair, Washington, DC: US Army Center of Military History , 2009. Defense Science Board. Science and Technology Issues of...but were not the only contributing factors. Budgetary constraints, technological issues, and reassessments of threats also led to modifications in the...design for adaptability to benefit from technological innovations and to meet the evolving needs for Alliance protection in the international security

  20. The development of coal-based technologies for Department of Defense facilities: Phase 1 final report. Volume 1: Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Pisupati, S.V. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1997-01-31

    The first phase of a three-phase project investigating the development of coal-based technologies for Department of Defense facilities has been completed. The objectives of the project are to: decrease DOD`s dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase 1 activities were focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. The specific objective in Phase 1 was to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWM or DMC. This was achieved through a project consisting of fundamental, pilot-sale, and demonstration-scale activities investigating coal beneficiation and preparation, and MCWM and DMC combustion performance. In addition, detailed engineering designs and an economic analysis were conducted for a boiler located at the Naval Surface Warfare Center, near Crane, Indiana. Results are reported on MCWM and DMC combustion performance evaluation; engineering design; and cost/economic analysis.

  1. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    user

    2012-09-06

    Sep 6, 2012 ... defense against two different fungal pathogens in pear calli ... study the biochemical changes in relation to plant defense ... relatively easy to manipulate by empirical means, allowing for a ... earlier phase, and the degree of rot was significantly ..... resistance of fruit, and they play an important role in the.

  2. Analisis Teori Offense-Defense Pada Reformasi Kebijakan Pertahanan Jepang Dalam Dinamika Keamanan Di Asia Timur

    Directory of Open Access Journals (Sweden)

    Fadhil Alghifari

    2016-05-01

    Full Text Available This paper will seek to demonstrate how the use of Offense-Defense Theory can best explain the Japan’s new defense reform legislation that enables the country to play a more comprehensive global security role commensurate with its capabilities, resources, national interests, and international responsibilities. Through this offense-defense lens, it will be argued that Japan’s new defense reform legislation is a response to the growing dominance of ‘offensive’ behaviour by the neighbouring countries in East Asia. This paper will then elaborate more about the elements that are used in the offense-defense theory to analyze the ‘offense’ dominance that prompts East Asian states behave aggressively and defensively including Japan. Furthermore, this paper will explain why Japan is currently playing the ‘defensive’ role to counter the growing dominance of ‘offense’ in East Asia through the four variables of offense-defense balance; military doctrine and technology, geographical considerations, social and political order, and diplomatic arrangements. Thus, we will see that Japan holds the key to the offense-defense and security balance in the increasingly hostile environment in East Asia.

  3. Defense.gov Special Report: Defense Officials Release Operational Energy

    Science.gov (United States)

    , DOD Operational Energy Strategy DOD's Operational Energy Strategy will guide the Defense Department to operations are among the goals of the Defense Department's operational energy strategy, a senior Pentagon operational energy footprint, experts in solar power, microgrids and "smart" generators recently

  4. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Committee; Missile Defense Advisory Committee AGENCY: Department of Defense (DoD). ACTION: Renewal of..., the Department of Defense gives notice that it is renewing the charter for the Missile Defense... Director, Missile Defense Agency, independent advice and recommendations on all matters relating to missile...

  5. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  6. Technology Proliferation: Acquisition Strategies and Opportunities for an Uncertain Future

    Science.gov (United States)

    2018-04-20

    COVERED (From - To) 07/31/17 to 04/09/18 Technology Proliferation: Acquisition Strategies and Opportunities for an Uncertain Future Colonel Heather A...efficient and expeditious fielding of technologically superior capabilities. In today’s environment, it is commonplace for private industry to be the...first to develop and deploy technologies that can be adopted for defense systems. The result is that the Department of Defense (DoD) is largely a

  7. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  8. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  9. Cross-sectional associations between daily rest periods during weekdays and psychological distress, non-restorative sleep, fatigue, and work performance among information technology workers.

    Science.gov (United States)

    Tsuchiya, Masao; Takahashi, Masaya; Miki, Keiichi; Kubo, Tomohide; Izawa, Shuhei

    2017-04-07

    A daily rest period (DRP; rest taken from daily work during a 24 h period), is essential to work recovery. This study examined DRPs' distribution and association with health outcomes among information technology workers recruited from an internet panel (N=1,811). Participants completed a web questionnaire examining psychological distress as a primary outcome, along with non-restorative sleep, fatigue (stress reaction), and work performance. Logistic regression analysis showed elevated psychological distress when DRP was working and commuting hours. After the above adjustment, similar associations were found with non-restorative sleep and fatigue, but not work performance, when DRP was <12 h. These findings constitute the first analysis of a dose-response relationship between DRP and subjective health outcomes among white-collar workers.

  10. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

  11. Defense AT&L. Volume 44, Number 4

    Science.gov (United States)

    2015-08-01

    integrated web applications. These apps will share the same map engine, chat function, and secure underlying data, decreasing training time for soldiers...security challenges. Revital - izing technology innovation must be at the forefront of this strategy in order to answer President Obama’s call to action...workforce will have available a num- ber of tools on business. defense.gov/ apps —a man- agement system to track performance and goaling. Buying

  12. Defense Coastal/Estuarine Research Program 2 (DCERP2)

    Science.gov (United States)

    2013-05-01

    Assessing TMDL effectiveness using flow-adjusted concentrations:  A case study of the Neuse River , North Carolina. Environmental Science & Technology 37...activities, and data collection in the NRE Basin and New River by local stakeholder groups. Defense Coastal/Estuarine Research Program (DCERP) Monitoring...relationships between light penetration and solids/chl a levels. ArcGIS and spatial statistics will be used to estimate average bathymetric areas

  13. Inherently Offensive: Airpower and the Dialectic with Defense

    Science.gov (United States)

    2017-06-01

    detailed definition up front. Ted Hopf, writing in The American Political Science Review, argues, “the offense-defense balance consists of three elements...technology contributed to air power’s ability to maintain overwhelming offensive 12 Hopf, Ted . "Polarity...fighters and surface-to-air missile systems. John Patterson explains why this is true, “most fighter aircraft operate in the X - and Ku-bands because

  14. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  15. Defense styles of pedophilic offenders.

    Science.gov (United States)

    Drapeau, Martin; Beretta, Véronique; de Roten, Yves; Koerner, Annett; Despland, Jean-Nicolas

    2008-04-01

    This pilot study investigated the defense styles of pedophile sexual offenders. Interviews with 20 pedophiles and 20 controls were scored using the Defense Mechanisms Rating Scales. Results showed that pedophiles had a significantly lower overall defensive functioning score than the controls. Pedophiles used significantly fewer obsessional-level defenses but more major image-distorting and action-level defenses. Results also suggested differences in the prevalence of individual defenses where pedophiles used more dissociation, displacement, denial, autistic fantasy, splitting of object, projective identification, acting out, and passive aggressive behavior but less intellectualization and rationalization.

  16. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  17. Recognizing Plant Defense Priming

    NARCIS (Netherlands)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J|info:eu-repo/dai/nl/113115113; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  18. Recognizing plant defense priming

    NARCIS (Netherlands)

    Martinez-Medina, A.; Flors, V.; Heil, M.; Mauch-Mani, B.; Pieterse, C.M.J.; Pozo, M.J.; Ton, J.; Van Dam, N.M.; Conrath, U.

    2016-01-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in

  19. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    , defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar...... defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  20. Other Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective

    Science.gov (United States)

    2016-03-28

    Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective M A R C H 2 8 , 2 0 1 6...Defense Organizations and Defense Finance and Accounting Service Controls Over High-Risk Transactions Were Not Effective Visit us at www.dodig.mil... FINANCE AND ACCOUNTING SERVICE DIRECTOR, DEFENSE HEALTH AGENCY SUBJECT: Other Defense Organizations and Defense Finance and Accounting Service

  1. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  2. ’Point of Injury’ Sampling Technology for Battlefield Molecular Diagnostics

    Science.gov (United States)

    2012-03-17

    Injury" Sampling Technology for Battlefield Molecular Diagnostics March 17,2012 Sponsored by Defense Advanced Research Projects Agency (DOD) Defense...Contract: April 25, 2011 Short Title of Work: "Point of Injury" Sampling Technology for Battlefield Molecular Diagnostics " Contract Expiration Date...SBIR PHASE I OPTION REPORT: Point of Injury, Sampling Technology for Battlefield Molecular Diagnostics . W31P4Q-1 l-C-0222 (UNCLASSIFIED) P.I

  3. Silverleaf Whitefly Induces Salicylic Acid Defenses and Suppresses Effectual Jasmonic Acid Defenses1[W][OA

    Science.gov (United States)

    Zarate, Sonia I.; Kempema, Louisa A.; Walling, Linda L.

    2007-01-01

    The basal defenses important in curtailing the development of the phloem-feeding silverleaf whitefly (Bemisia tabaci type B; SLWF) on Arabidopsis (Arabidopsis thaliana) were investigated. Sentinel defense gene RNAs were monitored in SLWF-infested and control plants. Salicylic acid (SA)-responsive gene transcripts accumulated locally (PR1, BGL2, PR5, SID2, EDS5, PAD4) and systemically (PR1, BGL2, PR5) during SLWF nymph feeding. In contrast, jasmonic acid (JA)- and ethylene-dependent RNAs (PDF1.2, VSP1, HEL, THI2.1, FAD3, ERS1, ERF1) were repressed or not modulated in SLWF-infested leaves. To test for a role of SA and JA pathways in basal defense, SLWF development on mutant and transgenic lines that constitutively activate or impair defense pathways was determined. By monitoring the percentage of SLWF nymphs in each instar, we show that mutants that activate SA defenses (cim10) or impair JA defenses (coi1) accelerated SLWF nymphal development. Reciprocally, mutants that activate JA defenses (cev1) or impair SA defenses (npr1, NahG) slowed SLWF nymphal development. Furthermore, when npr1 plants, which do not activate downstream SA defenses, were treated with methyl jasmonate, a dramatic delay in nymph development was observed. Collectively, these results showed that SLWF-repressed, JA-regulated defenses were associated with basal defense to the SLWF. PMID:17189328

  4. Rethinking Defensive Information Warfare

    National Research Council Canada - National Science Library

    French, Geoffrey S

    2004-01-01

    .... This paper examines defensive tactics and strategies from the German defense in depth that emerged from World War I to the American Active Defense that developed in the Cold War and proposes a new mindset for DIW that draws on these operational concepts from military history.

  5. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Committee; Department of Defense Military Family Readiness Council AGENCY: Department of Defense (DoD... renewing the charter for the Department of Defense Military Family Readiness Council (hereafter referred to... requirements for the support of military family readiness by the Department of Defense; and (c) evaluate and...

  6. 76 FR 2151 - Assumption Buster Workshop: Defense-in-Depth is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-01-12

    ... day-long workshop on the pros and cons of the defense-in-depth strategy for cyber security. The... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... Information Technology Research and Development (NITRD) Program on behalf of the SCORE Committee. Background...

  7. 75 FR 71647 - Defense Federal Acquisition Regulation Supplement; Discussions Prior to Contract Award (DFARS...

    Science.gov (United States)

    2010-11-24

    ... Deputy Under Secretary of Defense (Acquisition, Technology, and Logistics) to revise the DoD source... misunderstood requirements. DoD notes the potential disadvantages of this proposed change in increased time to...

  8. Holding the Edge: Maintaining the Defense Technology Base

    Science.gov (United States)

    1989-04-01

    psychological , with the shedding of isolationist technology that is close or equal to that of the United attitudes and inhibitions. Reaction by European States...are directed toward aleveling could work against what should be a good common set of enabling technologies, with applica- leeida carld work aanst

  9. MicroRNA-Mediated Gene Silencing in Plant Defense and Viral Counter-Defense

    Directory of Open Access Journals (Sweden)

    Sheng-Rui Liu

    2017-09-01

    Full Text Available MicroRNAs (miRNAs are non-coding RNAs of approximately 20–24 nucleotides in length that serve as central regulators of eukaryotic gene expression by targeting mRNAs for cleavage or translational repression. In plants, miRNAs are associated with numerous regulatory pathways in growth and development processes, and defensive responses in plant–pathogen interactions. Recently, significant progress has been made in understanding miRNA-mediated gene silencing and how viruses counter this defense mechanism. Here, we summarize the current knowledge and recent advances in understanding the roles of miRNAs involved in the plant defense against viruses and viral counter-defense. We also document the application of miRNAs in plant antiviral defense. This review discusses the current understanding of the mechanisms of miRNA-mediated gene silencing and provides insights on the never-ending arms race between plants and viruses.

  10. 78 FR 15935 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement (DFARS...

    Science.gov (United States)

    2013-03-13

    ... automated collection techniques or other forms of information technology. The Office of Management and... construction contract in Spain has adequate insurance coverage. Affected Public: Businesses or other for profit... construction contract in Spain. Kortnee Stewart, Editor, Defense Acquisition Regulations System. [FR Doc. 2013...

  11. Recognizing Plant Defense Priming.

    Science.gov (United States)

    Martinez-Medina, Ainhoa; Flors, Victor; Heil, Martin; Mauch-Mani, Brigitte; Pieterse, Corné M J; Pozo, Maria J; Ton, Jurriaan; van Dam, Nicole M; Conrath, Uwe

    2016-10-01

    Defense priming conditions diverse plant species for the superinduction of defense, often resulting in enhanced pest and disease resistance and abiotic stress tolerance. Here, we propose a guideline that might assist the plant research community in a consistent assessment of defense priming in plants. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Legal review on PTSD defense of adolescent patients in criminal cases

    Directory of Open Access Journals (Sweden)

    Xiaofu Li

    2017-02-01

    Full Text Available Post-Traumatic Stress Disorder is nothing new for Chinese society; however, Chinese courts are hesitated to accept the PTSD as a mental defense for adolescent patients. PTSD defense might be popular in future and court shall give proper weight to relevant factors. It is a big problem that there are no procedures or instructions for the connection between diagnosis and judgment. The paper illustrates the origination of PTSD and its development in USA with some relevant cases. Even the American courts consider PTSD as a problem. And there should be detailed regulations in China to keep pace with the development of science technology.

  13. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Oehmen, Christopher S.

    2012-09-01

    This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

  14. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  15. Automative Technology Objectives [and] Automotive Technology: Basic Textbooks and Instructional Materials. Career Education.

    Science.gov (United States)

    Dependents Schools (DOD), Washington, DC.

    This manual provides program objectives for instructors teaching automotive technology courses in junior and senior high Department of Defense Dependents Schools. The manual begins with a description of the automotive technology courses offered in the Dependents Schools, and a list of instructor expectations. Following is the main part of the…

  16. 32 CFR Appendix A to Part 37 - What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment...

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What Is the Civil-Military Integration Policy That Is the Basis for Technology Investment Agreements? A Appendix A to Part 37 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY...

  17. Novel naval technologies: Sustaining or disrupting naval doctrine

    NARCIS (Netherlands)

    te Kulve, Haico; Smit, Willem A.

    2010-01-01

    The defense sector is generally known to be simultaneously conservative and enthusiastic about novel technologies. Uptake of new technologies by the military may differ depending on the perceived impact of new technologies. Introduction of technological changes can sustain or disrupt doctrine and

  18. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Science.gov (United States)

    2011-02-07

    ... the pros and cons of the Defense-in-Depth strategy for cyber security. The workshop will be held March... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... notice is issued by the National Coordination Office for the Networking and Information Technology...

  19. Antipredator defenses predict diversification rates

    Science.gov (United States)

    Arbuckle, Kevin; Speed, Michael P.

    2015-01-01

    The “escape-and-radiate” hypothesis predicts that antipredator defenses facilitate adaptive radiations by enabling escape from constraints of predation, diversified habitat use, and subsequently speciation. Animals have evolved diverse strategies to reduce the direct costs of predation, including cryptic coloration and behavior, chemical defenses, mimicry, and advertisement of unprofitability (conspicuous warning coloration). Whereas the survival consequences of these alternative defenses for individuals are well-studied, little attention has been given to the macroevolutionary consequences of alternative forms of defense. Here we show, using amphibians as the first, to our knowledge, large-scale empirical test in animals, that there are important macroevolutionary consequences of alternative defenses. However, the escape-and-radiate hypothesis does not adequately describe them, due to its exclusive focus on speciation. We examined how rates of speciation and extinction vary across defensive traits throughout amphibians. Lineages that use chemical defenses show higher rates of speciation as predicted by escape-and-radiate but also show higher rates of extinction compared with those without chemical defense. The effect of chemical defense is a net reduction in diversification compared with lineages without chemical defense. In contrast, acquisition of conspicuous coloration (often used as warning signals or in mimicry) is associated with heightened speciation rates but unchanged extinction rates. We conclude that predictions based on the escape-and-radiate hypothesis must incorporate the effect of traits on both speciation and extinction, which is rarely considered in such studies. Our results also suggest that knowledge of defensive traits could have a bearing on the predictability of extinction, perhaps especially important in globally threatened taxa such as amphibians. PMID:26483488

  20. Ensuring a Strong U.S. Defense for the Future: The National Defense Panel Review of the 2014 Quadrennial Defense Review

    Science.gov (United States)

    2014-07-31

    territorial disputes with China. We note recent moves to station U.S. forces in Darwin , the plan to station a number of Littoral Combat Ships in Singapore...Under Secretary of Defense, Comptroller (C) Charles “Chuck” Hagel Secretary of Defense Mara Karlin Principal Director for Strategy, Policy (P...Support Staff to the Panel Charles Arnold George Sinks U.S. Government Liaison Officers Lori Abele Chief of Staff, Deputy Under Secretary of Defense

  1. Global Historical Climatology Network - Daily (GHCN-Daily), Version 3

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Global Historical Climatology Network - Daily (GHCN-Daily) dataset integrates daily climate observations from approximately 30 different data sources. Version 3...

  2. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  3. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  4. Technology as a Craft of Deceit.

    Science.gov (United States)

    Thompson, Mark E.

    This essay briefly presents the evolution of technology and the resulting warnings that many prominent writers have offered in defense of an analytic inquiry into man's interaction with technology. Various ways in which technology has been used to manipulate people are described, e.g., Vietnam, Watergate, the CIA, the Tuskegee Study, Subliminal…

  5. Which indicators for measuring the daily physical activity? An overview on the challenges and technology limits for Telehealth applications.

    Science.gov (United States)

    Tagliente, Irene; Solvoll, Terje; Trieste, Leopoldo; De Cecco, Carlo N; Murgia, Fabrizio; Bella, Sergio

    2016-09-14

    Obesity is one of the biggest drivers of preventable chronic diseases and healthcare costs in Worldwide. Different prevention activities are suggested. By monitoring daily energy expenditure (EE) could be possible make personalized diets and programming physical activity. In this, physical inactivity is one of the most important public health problems. Some studies refer the effort of the international community in promoting physical activities. Physical activity can be promoted only by increasing citizens' empowerment on taking care of their health, and it passes from the improving of individual information. Technology can offer solutions and metrics for monitoring and measuring daily activity by interacting with individuals, sharing information and feedbacks. In this study we review indicators of total energy expenditure and weaknesses of available devices in assessing these parameters. Literature review and technology testing EuNetHta core model. For the clinical aspects, it is fundamental to take into account all the factor that can influence the personal energy expenditure as: heart rate, blood pressure and thermoregulation (influenced by the body temperature). In this study we focused the attention on the importance of tools to encourage the physical activity. We made an analysis of the factor that can influence the right analysis of energy expenditure and at the same time the energy regime. A punctual monitoring of the exercise regime could be helpful in Telemedicine application as Telemonitorig. More study are needed to value the impact of physical activity tracker in Telemonitorig protocols. On the assessment of the energy expenditure, critical issues are related to the physiological data acquisition. Sensors connected with mobile devices could be important tools for disease prevention and interventions affecting health behaviors. New devices applications are potential useful for telemedicine assistance, but security of data and the related communication

  6. The US-Russia missile defense dialogue as a factor of the Russian defense policy

    OpenAIRE

    Dmitry Suslov

    2013-01-01

    To a big extent the Russian defense policy and, as a consequence, development of the Russian defense industrial complex, is determined by the prospects of the US missile defense policy and fate of the US-Russia negotiations in this area. As a cooperative solution seems improbable in the observable future, Russia plans to develop certain response measures of military nature, including creation of a new heavy ICBM, and to create its own missile defense by 2015. However, this policy does not see...

  7. Defense Agency Travel Payments at Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    1997-01-01

    The audit objective was to assess the effectiveness of Defense Finance and Accounting Service Indianapolis Center management controls over payments to Defense agency personnel for temporary duty and local travel...

  8. The Chinese Defense Economy’s Long March from Imitation to Innovation

    OpenAIRE

    Cheung, Tai Ming

    2010-01-01

    Since the beginning of the twenty-first century, China’s defense science, technology, and innovation (DSTI) system has been vigorously developing a comprehensive set of innovation capabilities that will eventually allow it to join the world’s top tier of military technological powers. Ample access to financial, human, and research resources; strong political support; inflows of foreign technologies and know-how; and the introduction of advanced modes of governance, market competition, and...

  9. An outline of military technological dynamics as restraints for acquisition, international cooperation and domestic technological development

    Directory of Open Access Journals (Sweden)

    Édison Renato Silva

    2014-12-01

    Full Text Available The expectation that technological returns from defense expenditure through acquisition, international cooperation and domestic research would further national development underappreciates the different technological dynamic of the armed services. This paper outlines the technological dynamic the stems from fighting in the air, at sea and on land, exemplifying consequences for the case of acquisition.

  10. Activities in department of energy hazardous and mixed waste defense waste management

    International Nuclear Information System (INIS)

    Eyman, L.D.

    1988-01-01

    In January 1986, the U.S. Department of Energy (DOE) Office of Assistant Secretary for Defense Programs (DP) created the Hazardous Waste and Remedial Actions Division within the Office of Defense Waste and Transportation Management. The Oak Ridge Operations Office (ORO) was assigned the responsibility for supporting DOE Headquarters (HQ) in planning nationally integrated activities for Resource Conservation and Recovery Act/Comprehensive Environmental Response, Compensation, and Liability Act/Superfund Amendments and Reauthorization Act (RCRA/CERCLA/SARA) compliance. In turn, ORO created the Hazardous Waste Remedial Actions Program Support Contractor Office (HAZWRAPSCO) to assist with the expanded lead assignment. The HAZWRAPSCO activities are currently supported by three distinct DOE-HQ funding elements: the Environmental Restoration Program, the Hazardous Waste Compliance Technology Program, and the Hazardous Waste Research and Development R and D Program. The Environmental Restoration Program is discussed in the paper, entitled The DOE Defense Program for Environmental Restoration

  11. SELF-DEFENSE IN KARABAKH CONFLICT?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law which has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. But applying self-defense requires some conditions. Immediacy is one of the important conditions of self-defense. Immediacy defined as the time span between armed attacks and reaction to it, is the main discourse. This condition requires self defense immediately after the armed conflict or during a rational time span since its occurance.In this respect, the emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. After Armenia’s armed attacks, Azerbaijan has acted within the scope of legitimate self-defense. But in accordance with UN Security Council cease-fire resolution Azerbaijan has suspended its self-defense actions. However, today, still twenty percent of Azerbaijani territory is still under Armenian occupation. Accordingly, after a long time the validity of Azerbaijan’s right to legitimate self-defense is still subject to arguments.In this article, by comparing two different approaches (strict and board interpretation approaches on the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and armed attacks by Armenia in Karabakh Conflict will be examined.

  12. After Globalization Future Security in a Technology Rich World

    Energy Technology Data Exchange (ETDEWEB)

    Gilmartin,T J

    2001-08-17

    Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency, and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and

  13. Lean principles and defense information technology acquisition: An investigation of the determinants of successful application

    Science.gov (United States)

    Haley, M.

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules reductions. Additionally, the study set out to determine what potential critical success factors (CSF's) were documented in the secondary data captured for each release, and extracted the variables used in the decision making for acceptability of fielding. In evaluating lean applicability to the high variability environment of USAF IT acquisitions, the research was conducted using non-experimental quantitative methods of archival secondary data. The sample for this case study was compiled from a USAF office that had implemented these techniques in pre-development, development and testing, and fielding phases. Based on the research data, acquisitionists and lean practitioners are inherently interconnected. Therefore, an understanding that critical success factors (CSFs) are integral to successful lean application in DoD IT acquisitions is crucial. Through a combination of synergistic alignments, plyometric CSFs were discovered to maximize the effects of each single CSF to produce rapid results in defense IT acquisitions. These include: (1) Enterprise Incorporation, (2) Team Trust, (3) Transformational Leadership, (4) Recursive Improvement, (5) Integrated Synergy, (6) Customer-Centric Culture and (7) Heuristic Communication.

  14. Encouraging environmentally strategic technologies

    International Nuclear Information System (INIS)

    Heaton, G.R.

    1994-01-01

    Having moved beyond its initial absorption with controlling new technology, environmental policy today must focus more strongly on promoting the development and adoption of new technologies. World Resource Institute's (WRI) ongoing study of 'environmentally strategic technology' is addressed to this fundamental policy issue. The study proposes criteria for identifying such technology, offers a specific list, suggests the kinds of public policy changes necessary to encourage their development and finally presents a comparison of critical technology lists (from the White House, the European Community, Japan and the US Department of Defense). (TEC)

  15. Defense AT and L. Volume 41, Number 6

    Science.gov (United States)

    2012-12-01

    own specialty. To paraphrase Abraham Maslow : If all you have is a hammer, everything looks like a nail. Systems engineers are supposed to take a...technology, and logistics face in the austere times we have entered. We will have to provide the ser- vices and products our warfighters need and...understanding of: (1) the constraints we must live within; (2) a willingness to prioritize our needs and accept less than we Defense AT&L: November–December

  16. A STUDY ON DEFENSE ACQUISITION MODELS WITH AN EMERGING MARKET PERSPECTIVE. THE CASE OF TURKEY

    Directory of Open Access Journals (Sweden)

    Mustafa Kemal Topcu

    2015-10-01

    Full Text Available With the end of the Cold War, the static environment, characteristic of the bipolar world, has changed quickly into a dynamic and complicated environment with new actors. These changes have also affected the countries’ armed forces and new approaches to procurement/acquisition come into progress. After the Cold War, countries have focused on responding to changing threats with their decreasing defense budgets. In this study, acquisition models and their effects on Turkey’s technology acquisition and defense industry are evaluated. The evaluation is performed based on criteria such as contribution to national economy, customization, acquisition cost, time and risk, life cycle cost, and technology acquisition. Major acquisition models in this study are determined as direct procurement, production under license, joint venture, indigenous development, production via international consortium. Finally, it is observed that the best model is indigenous development while the others will serve as technology acquisition for indigenous development.

  17. Status of GAO Recommendations to the Department of Defense (Fiscal Years 2001-2007)

    Science.gov (United States)

    2008-12-11

    Name-Brand, Fast - Food Restaurants 5 GAO-01-943 Defense Manufacturing Technology Program: More Joint Projects and Tracking of Results Could...Oversight of Contractors under Foreign Influence Is Sufficient 6 2 GAO-05-456 Interagency Contracting: Franchise Funds Provide Convenience, but Value to

  18. The journal of medical chemical, biological and radiological defense, an update

    International Nuclear Information System (INIS)

    Price, B. B. S.; Peitersen, L.E.

    2009-01-01

    The Journal of Medical Chemical, Biological, and Radiological Defense (www.JMedCBR.org) is a peer-reviewed scientific online journal focusing on the biology, chemistry, physiology, toxicology and treatment of exposure to threat agents. JMedCBR provides a central international forum for the publication of current research and development information on medical chemical, biological and radiological defense, as well as training, doctrine, and problems related to chemical, biological and radiological casualties. JMedCBR is sponsored by the US Defense Threat Reduction Agency (DTRA) Chem-Bio Technologies Directorate as part of its scientific outreach program in chemical and biological defense solutions for the Department of Defense. In addition to scientific and medical research, JMedCBR hosts an archive of related papers from authors in the field. Although organized into annual issues, articles are published on the web continuously. The complete JMedCBR is published electronically and is made available to the scientific community free of charge. JMedCBR is committed to providing its readers with quality scientific information and critical analyses. All submissions are peer-reviewed by an editorial board of recognized and respected international scientists who represent expertise in different aspects of medical chemical, biological and radiological defense. Contributions to JMedCBR must be original works of the author(s) and must not have been previously published or simultaneously submitted to other publications. The author(s) transfer the copyright of articles published in JMedCBR to the journal. A copyright transfer form must accompany each manuscript submission. For more information on submitting to JMedCBR, see the Authors' Guide, available at http://www.jmedcbr.org/authorGuide.html.(author)

  19. Defense Treaty Inspection Readiness Program

    International Nuclear Information System (INIS)

    Cronin, J.J.; Kohen, M.D.; Rivers, J.D.

    1996-01-01

    The Defense Treaty Inspection Readiness Program (DTIRP) was established by the Department of Defense in 1990 to assist defense facilities in preparing for treaty verification activities. Led by the On-Site Inspection Agency (OSIA), an element of the Department of Defense, DTIRP''s membership includes representatives from other Department of Defense agencies, the Department of Energy (DOE), the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Commerce, and others. The Office of Safeguards and Security has a significant interest in this program, due to the number of national defense facilities within its purview that are candidates for future inspections. As a result, the Office of Safeguards and Security has taken a very active role in DTIRP. This paper discusses the Office of Safeguards and Security''s increasing involvement in various elements of the DTIRP, ranging from facility assessments to training development and implementation

  20. The strategic value of industrial radiation manufacturing and processing technologies

    International Nuclear Information System (INIS)

    Chappas, W.J.; Silverman, J.

    1993-01-01

    Planned and projected budget cuts over the next many years will reduce the number of Department of Defense (DoD) personnel and the diversity and quantity of their armaments and systems. Consequently, there is a requirement for the deployment of more effective defense equipment and their more efficient operation. Concomitant with this challenge is an opportunity for innovative technologies that can, at a lower cost, produce new, stronger, more durable materials-and do so with less environmental impact. Radiation processing offers this potential for (a) creating significant cost savings and performance advantages in a broad range of defense materials; (b) destroying and detoxifying dangerous chemicals, ordnance, and rocket propellants; (c) cleaning noxious gaseous effluents; and (d) purifying contaminated water. Radiation technology has the potential to immediately affect defense materials and, in the short and long terms, US industrial international competitiveness

  1. Intent to Quit among Daily and Non-Daily College Student Smokers

    Science.gov (United States)

    Pinsker, E. A.; Berg, C. J.; Nehl, E. J.; Prokhorov, A. V.; Buchanan, T. S.; Ahluwalia, J. S.

    2013-01-01

    Given the high prevalence of young adult smoking, we examined (i) psychosocial factors and substance use among college students representing five smoking patterns and histories [non-smokers, quitters, native non-daily smokers (i.e. never daily smokers), converted non-daily smokers (i.e. former daily smokers) and daily smokers] and (ii) smoking…

  2. Forming the Research Component of the U.S. Defense Budget Policy

    Directory of Open Access Journals (Sweden)

    Alexandr V. Balyshev

    2015-01-01

    Full Text Available The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved. The article offers specific cases to illustrate the role of key players of the U.S. budgetary process, the U.S. President, Congress, Department of Defense, and their relations with the scientific community. Spending in this area is organized as a three-level structure, which includes development of new weapons systems, creation of military platforms and systemic integration of the armed forces. One of the most noteworthy participants on the weapons development level is the Defense advanced research projects agency (DARPA, which provides support for R&D projects able to facilitate technological breakthroughs and provide results applicable by the armed forces. The emphasis of the article is on the participation of the private sector on all levels of the defense spending and especially in the systemic integration. At this level even formulating the request becomes a highly challenging task, which demands involvement of the most highly qualified specialists and organizations. The authors analyze the advantages and disadvantages of the wide participation of commercial enterprises and provide cases illustrating possible conflicts between government and private actors and ways of their resolution.

  3. Views of Students about Technology, Effects of Technology on Daily Living and Their Professional Preferences

    Science.gov (United States)

    Daghan, Gökhan

    2017-01-01

    The aim of this study is to examine the views of students about technology and their professional preferences and put forth the correlation between professional preferences and views about technology. For this purpose, in a private school in Ankara, 109 students from 6th and 7th grades were asked about their views on what technology is, the…

  4. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, March 28, 1997--September 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Morrison, J.L. [and others

    1998-01-06

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Phase I was completed on November 1, 1995. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included performing pilot-scale air toxics (i.e., trace elements and volatile organic compounds) testing and evaluating a ceramic filtering device on the demonstration boiler. Also, a sodium bicarbonate duct injection system was installed on the demonstration boiler. An economic analysis was conducted which investigated the benefits of decreased dependence on imported oil by using new coal combustion technologies. Work related to coal preparation and utilization was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, and surface-based separation processes. The evaluation of deeply-cleaned coal as boiler fuel included receiving three cleaned coals from Cyprus-Amax.

  5. 32 CFR Appendix A to Part 555 - Director of Defense Research and Engineering

    Science.gov (United States)

    2010-07-01

    ... be limited to 3% of the professional man-years at that laboratory unless expressed approval of the... function at the National Science Foundation shall not exceed two man-years per year through FY 76, subject... definition where existing Defense technology offers a unique potential solution. ...

  6. On limiting technology by negotiated agreement

    Science.gov (United States)

    Carnesale, Albert

    1983-10-01

    The substance of my remarks tonight will be far narrower in scope than the prescribed title of my talk would indicate. This reflects two considerations: first, this topical meeting is focused on technologies associated with nuclear weapons systems; and, second, President Reagan recently (i.e., on March 23, 1983) called for ``a program to counter the awesome Soviet missile threat with measures that are defensive.'' In light of these considerations, I will concentrate tonight on the case of anti-ballistic missile (ABM) systems as an example of a countinuing effort to limit technology by negotiated agreement? Why limit ABM systems? After all, such systems are defensive in nature, not offensive. Defensive systems are intended to protect people and the things of value to them. It is the offensive systems that cause death and destruction. Why don't we just go ahead and deploy the best available ABM system, and develop and test even better systems for deployment in the future?

  7. Self-Defense in Karabakh Conflict?

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2015-01-01

    Full Text Available Use of force is one of the principles of international law that has been banned by the UN Charter and modern constitutions. However, since the enforcement of the UN Charter, self-defense has become the preferred excuse for states to justify their use of force. Applying self-defense, however, requires some conditions. Immediacy is one of the important conditions of self-defense. This is defined as the timeframe between armed attacks and reaction to it. This situation requires self-defense immediately after the armed conflict or during a reasonable timeframe since its occurance.In this respect, emerging Karabakh Conflict between Armenia and Azerbaijan in the 1990s is important. In this article, by comparing two different approaches (strict and board interpretation of the temporal link between the measures of self-defense and the armed attacks (immediacy, the temporal link between the self-defense countermeasures of Azerbaijan and attacks by Armenia in Karabakh Conflict will be examined.

  8. Definition of Technology Readiness Levels for Transmutation Fuel Development

    International Nuclear Information System (INIS)

    Jon Carmack; Kemal O. Pasamehmetoglu

    2008-01-01

    To quantitatively assess the maturity of a given technology, the Technology Readiness Level (TRL) process is used. The TRL process has been developed and successfully used by the Department of Defense (DOD) for development and deployment of new technology and systems for defense applications. In addition, NASA has also successfully used the TRL process to develop and deploy new systems for space applications. Transmutation fuel development is a critical technology needed for closing the nuclear fuel cycle. Because the deployment of a new nuclear fuel forms requires a lengthy and expensive research, development, and demonstration program, applying the TRL concept to the transmutation fuel development program is very useful as a management and tracking tool. This report provides definition of the technology readiness level assessment process as defined for use in assessing nuclear fuel technology development for the Transuranic Fuel Development Campaign

  9. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  10. Overview of nanotechnology and its applicability to the Department of Defense

    Science.gov (United States)

    Hernandez, Allison; Stevens, Rick; Thorson, Kevin; Whaley, Gregory J.

    2005-08-01

    Advances in a wide variety of nanotechnologies are expected to substantially benefit future military weapon systems. The technology development cycle for military platforms requires a given technology to reach a defined state of maturity before its use in a deployable system. Nanotechnologies such as quantum dots and carbon nanotubes, while showing great promise of performance benefits, are still considered too immature for immediate use. Defense contractors are in active research of applications of nanoscale engineered materials and devices and are beginning to engage nanotechnology suppliers for future military platforms.

  11. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, September 28, 1993--March 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R.; Shepard, J.F.; Scaroni, A.W.; Hogg, R.; Chander, S.; Cho, H.; Ityokumbul, M.T.; Klima, M.S. [and others

    1994-11-30

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. To achieve the objectives of the program, a team of researchers was assembled. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFS) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phases I and II are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  12. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1995--September 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Hatcher, P.; Knicker, H. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-21

    The U.S. Department of Defense (DOD), through the Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Mixture Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, preparation of the Phase I final report continued. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included initiating a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work started on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filter device will be used to demonstrate a more compact and efficient filtering device for retrofit applications. Coal preparation and utilization activities, and the economic analysis were completed and work focused on preparing the final report. Work on Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on selecting incentives for commercialization of coal using technologies, community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  13. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  14. The impact of common metal allergens in daily devices

    DEFF Research Database (Denmark)

    Hamann, Dathan; Hamann, Carsten R; Thyssen, Jacob P

    2013-01-01

    We are widely exposed to metal allergens in our daily doings. As exposures constantly changes because of fashion trends and technological developments, there is a need for a continuous update of patch testers. An overview of consumer metal exposure studies that have been published in 2012 and 2013...

  15. Chronic and Daily Stressors Along With Negative Affect Interact to Predict Daily Tiredness.

    Science.gov (United States)

    Hartsell, Elizabeth N; Neupert, Shevaun D

    2017-11-01

    The present study examines the within-person relationship of daily stressors and tiredness and whether this depends on daily negative affect and individual differences in chronic stress. One hundred sixteen older adult participants were recruited via Amazon's Mechanical Turk for a 9-day daily diary study. Daily tiredness, daily stressors, and negative affect were measured each day, and chronic stress was measured at baseline. Daily stressors, daily negative affect, and chronic stress interacted to predict daily tiredness. People with high chronic stress who experienced an increase in daily negative affect were the most reactive to daily stressors in terms of experiencing an increase in daily tiredness. We also found that people with low levels of chronic stress were the most reactive to daily stressors when they experienced low levels of daily negative affect. Our results highlight the need for individualized and contextualized approaches to combating daily tiredness in older adults.

  16. Technology makes life better

    Institute of Scientific and Technical Information of China (English)

    李红

    2015-01-01

    There are many theories about the relationship between technology and society.With the development of world economy,technology has made great progress.However,many changes were taken place in our daily life,especially the appearance of computer.Sending emails,chatting with others online,search for information which is what we need to learn and many other demands in people’s daily life,computers make all of it into possibility.

  17. Nuclear power technologies for application in developing countries

    International Nuclear Information System (INIS)

    Zrodnikov, A.V.

    2000-01-01

    The tremendous social and political changes which have occurred during the recent decade in the former USSR made it possible to launch the process of commercialization of defense-related technologies in Russia. The so-called dual-use technologies are meant to be initially developed by the state for defense needs, but having a high commercial potential as well. To date, the process of such technology transfer from the state sector to a private one has been limited primarily by insufficient progress of the national private sector. Essentially, the main economic problem still remains the attraction of private capital for the promotion of dual-use technologies to the point at where they acquire commercially viable. A large number of advanced technologies are waiting to be commercialized. The report presented considers the prospects of civil use of some technologies related to the nuclear power area: space nuclear power systems, nuclear powered submarines and rector-pumped lasers. (author)

  18. The Effect of Defense R&D Expenditures on Military Capability and Technological Spillover

    Science.gov (United States)

    2013-03-01

    as France, divide the expenditure between the civilian (power plants ) and the defense (weapons) sectors (Brzoska, 2005). Finally, enterprise...0.007092 0.008992092 114 Cuba 0.00617 0.007823069 115 Montenegro 0.005834 0.007397048 116 Rwanda 0.005678 0.007199252 117 Jamaica 0.005405 0.00685311...0.0001794 126 1043716034 121 Gabon 0.0001527 127 9138902194 81 Brunei Darussalam 0.0001447 128 14141361533 75 Montenegro 0.0001332 129 1292862098

  19. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  20. Feasibility of a dynamic web guidance approach for personalized physical activity prescription based on daily information from wearable technology.

    Science.gov (United States)

    Coolbaugh, Crystal L; Raymond, Stephen C; Hawkins, David A

    2015-06-04

    participants enabled evaluation of administrative features of the app including the generation of automated email reminders, participation surveys, and daily AM file upload logs. This study describes the development of the PPAP app, a closed-loop technology framework that enables personalized physical activity prescription and remote monitoring of an individual's compliance and health response to the intervention. Data obtained during a 12-week feasibility study demonstrated the ability of the PPAP app to use objective AM data to create daily, personalized physical activity guidance, provide interactive feedback to users, and enable remote administrative monitoring of data quality and subject compliance. Using this approach, public health professionals, clinicians, and researchers can adapt the PPAP app to facilitate a range of personalized physical activity interventions to improve health outcomes, assess injury risk, and achieve fitness performance goals in diverse populations.

  1. Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure Data Collection Process.

    Science.gov (United States)

    1995-06-19

    VXW-ÄVAVKVX’AWXW/XVXV:*: OFFICE OF THE INSPECTOR GENERAL SUMMARY REPORT ON THE AUDIT OF DEFENSE LOGISTICS AGENCY 1995 DEFENSE BASE REALIGNMENT...FOR DIRECTOR, DEFENSE LOGISTICS AGENCY SUBJECT: Summary Report on the Audit of Defense Logistics Agency 1995 Defense Base Realignment and Closure...the data that DLA provides to support recommendations for the 1995 Commission. The specific objective for the audits was to determine whether the

  2. Intent to quit among daily and non-daily college student smokers

    OpenAIRE

    Pinsker, E. A.; Berg, C. J.; Nehl, E. J.; Prokhorov, A. V.; Buchanan, T. S.; Ahluwalia, J. S.

    2012-01-01

    Given the high prevalence of young adult smoking, we examined (i) psychosocial factors and substance use among college students representing five smoking patterns and histories [non-smokers, quitters, native non-daily smokers (i.e. never daily smokers), converted non-daily smokers (i.e. former daily smokers) and daily smokers] and (ii) smoking category as it relates to readiness to quit among current smokers. Of the 4438 students at six Southeast colleges who completed an online survey, 69.7%...

  3. 2003 annual report. Information and health, defense, energy

    International Nuclear Information System (INIS)

    2004-01-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  4. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  5. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  6. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, ''walk-away safe'' design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (OandM) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  7. Low power unattended defense reactor

    International Nuclear Information System (INIS)

    Kirchner, W.L.; Meier, K.L.

    1984-01-01

    A small, low power, passive, nuclear reactor electric power supply has been designed for unattended defense applications. Through innovative utilization of existing proven technologies and components, a highly reliable, walk-away safe design has been obtained. Operating at a thermal power level of 200 kWt, the reactor uses low enrichment uranium fuel in a graphite block core to generate heat that is transferred through heat pipes to a thermoelectric (TE) converter. Waste heat is removed from the TEs by circulation of ambient air. Because such a power supply offers the promise of minimal operation and maintenance (O and M) costs as well as no fuel logistics, it is particularly attractive for remote, unattended applications such as the North Warning System

  8. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, September 28, 1996--March 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Pisupati, S.V. [and others

    1997-07-22

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. Preliminary pilot-scale NO{sub x} reduction catalyst tests were conducted when firing natural gas in Penn State`s down-fired combustor. This is the first step in the scale-up of bench-scale results obtained in Phase II to the demonstration boiler scale when firing coal. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio. The evaluation of deeply-cleaned coal as boiler fuel included installing a ribbon mixer into Penn State`s micronized coal-water mixture circuit for reentraining filter cake. In addition, three cleaned coals were received from CQ Inc. and three cleaned coals were received from Cyprus-Amax.

  9. On the importance of analyzing flood defense failures

    Directory of Open Access Journals (Sweden)

    Özer Işıl Ece

    2016-01-01

    Full Text Available Flood defense failures are rare events but when they do occur lead to significant amounts of damage. The defenses are usually designed for rather low-frequency hydraulic loading and as such typically at least high enough to prevent overflow. When they fail, flood defenses like levees built with modern design codes usually either fail due to wave overtopping or geotechnical failure mechanisms such as instability or internal erosion. Subsequently geotechnical failures could trigger an overflow leading for the breach to grow in size Not only the conditions relevant for these failure mechanisms are highly uncertain, also the model uncertainty in geomechanical, internal erosion models, or breach models are high compared to other structural models. Hence, there is a need for better validation and calibration of models or, in other words, better insight in model uncertainty. As scale effects typically play an important role and full-scale testing is challenging and costly, historic flood defense failures can be used to provide insights into the real failure processes and conditions. The recently initiated SAFElevee project at Delft University of Technology aims to exploit this source of information by performing back analysis of levee failures at different level of detail. Besides detailed process based analyses, the project aims to investigate spatial and temporal patterns in deformation as a function of the hydrodynamic loading using satellite radar interferometry (i.e. PS-InSAR in order to examine its relation with levee failure mechanisms. The project aims to combine probabilistic approaches with the mechanics of the various relevant failure mechanisms to reduce model uncertainty and propose improvements to assessment and design models. This paper describes the approach of the study to levee breach analysis and the use of satellites for breach initiation analysis, both adopted within the SAFElevee project.

  10. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  11. Defense Waste Processing Facility prototypic analytical laboratory

    International Nuclear Information System (INIS)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-01-01

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R ampersand D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R ampersand D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy

  12. Examining daily activity routines of older adults using workflow.

    Science.gov (United States)

    Chung, Jane; Ozkaynak, Mustafa; Demiris, George

    2017-07-01

    We evaluated the value of workflow analysis supported by a novel visualization technique to better understand the daily routines of older adults and highlight their patterns of daily activities and normal variability in physical functions. We used a self-reported activity diary to obtain data from six community-dwelling older adults for 14 consecutive days. Workflow for daily routine was analyzed using the EventFlow tool, which aggregates workflow information to highlight patterns and variabilities. A total of 1453 events were included in the data analysis. To demonstrate the patterns and variability of each individual's daily activities, participant activity workflows were visualized and compared. The workflow analysis revealed great variability in activity types, regularity, frequency, duration, and timing of performing certain activities across individuals. Also, when workflow approach was applied to spatial information of activities, the analysis revealed the ability to provide meaningful data on individuals' mobility in different levels of life spaces from home to community. Results suggest that using workflows to characterize the daily activities of older adults will be helpful for clinicians and researchers in understanding their daily routines and preparing education and prevention strategies tailored to each individual's activity level. This tool also has the potential to be integrated into consumer informatics technologies, such as patient portals or personal health records, so that consumers may be encouraged to become actively involved in monitoring and managing their health. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Defense, basic, and industrial research at the Los Alamos Neutron Science Center: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Longshore, A.; Salgado, K. [comps.

    1995-10-01

    The Workshop on Defense, Basic, and Industrial Research at the Los Alamos Neutron Science Center gathered scientists from Department of Energy national laboratories, other federal institutions, universities, and industry to discuss the use of neutrons in science-based stockpile stewardship, The workshop began with presentations by government officials, senior representatives from the three weapons laboratories, and scientific opinion leaders. Workshop participants then met in breakout sessions on the following topics: materials science and engineering; polymers, complex fluids, and biomaterials; fundamental neutron physics; applied nuclear physics; condensed matter physics and chemistry; and nuclear weapons research. They concluded that neutrons can play an essential role in science-based stockpile stewardship and that there is overlap and synergy between defense and other uses of neutrons in basic, applied, and industrial research from which defense and civilian research can benefit. This proceedings is a collection of talks and papers from the plenary, technical, and breakout session presentations. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  14. Program summary for the Office of Remedial Action and Waste Technology

    International Nuclear Information System (INIS)

    1989-10-01

    The US Department of Energy is the lead Federal agency responsible for planning and implementing the programs that ensure safe and efficient management of nuclear wastes from both civilian and defense activities. Within the Department, three offices share this responsibility: the Office of Remedial Action and Waste Technology, the Office of Civilian Radioactive Waste Management, and the Office of Defense Waste and Transportation Management. This document summarizes the programs managed by the Office of Remedial Action and Waste Technology

  15. COP21: defense stakes

    International Nuclear Information System (INIS)

    Coldefy, Alain; Hulot, Nicolas; Aichi, Leila; Tertrais, Bruno; Paillard, Christophe-Alexandre; Piodi, Jerome; Regnier, Serge; Volpi, Jean-Luc; Descleves, Emmanuel; Garcin, Thierry; Granholm, Niklas; Wedin, Lars; Pouvreau, Ana; Henninger, Laurent

    2015-01-01

    The 21. Conference of the Parties (COP21) from the UN Framework Convention took place in Paris between November 30 and December 11, 2015. The challenge is to reach a universal agreement of fight against global warming and to control the carbon footprint of human activities. This topic is in the core of the Defense Ministry preoccupations. This special dossier takes stock of the question of defense issues linked with global warming. The dossier comprises 13 papers dealing with: 1 - COP21: defense stakes (Coldefy, A.); 2 - Warfare climate, a chance for peace (Hulot, N.); 3 - COP21 and defense (Aichi, L.); 4 - A war climate? (Tertrais, B.); 5 - Challenges the World has to face in the 21. century (Paillard, C.A.); 6 - Desertification: a time bomb in the heart of Sahel (Piodi, J.); 7 - The infrastructure department of defense in the fight against climate disturbance (Regnier, S.); 8 - Fight against global warming, a chance for the forces? (Volpi, J.L.); 9 - Sea and sustainable development (Descleves, E.); 10 - Rationales of Arctic's surrounding powers (Garcin, T.); 11 - Arctic: strategic stake (Granholm, N.; Wedin, L.); 12 - Strategic impact of Turkey's new energy choices (Pouvreau, A.); 13 - Climate and war: a brief historical outlook (Henninger, L.)

  16. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  17. 78 FR 69267 - Defense Federal Acquisition Regulation Supplement: Requirements Relating to Supply Chain Risk...

    Science.gov (United States)

    2013-11-18

    ... payroll, finance, logistics, and personnel management applications; or (2) Is protected at all times by... recommendation from the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) and the... assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to...

  18. THE CONCEPT OF "SMART DEFENSE" IN THE CONTEXT OF AN EFFICIENT DEFENSE PLANNING

    Directory of Open Access Journals (Sweden)

    Teodor FRUNZETI

    2012-01-01

    Full Text Available The international security environment is currently undergoing a series of fundamental changes becoming increasingly complex. Consequently, international actors need to find innovative ways to manage security and defense. The global financial and economic crisis has had a strong impact on military budgets, making it necessary for states and regional and international organizations concerned with such issues to streamline their defense planning and the more so because, in addition to the already consecrated risks and security threats, there are also new challenges. The concepts of “pooling and sharing” and “smart defense” have become, in this context, increasingly popular generating new initiatives in defense planning. However, despite some successes in this regard and their presentation as ideal solutions for managing defense in the current context, these concepts involve a number of difficulties to overcome that sometimes may translate into strategic political military and even economic disadvantages.

  19. 47 CFR 90.411 - Civil defense communications.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Civil defense communications. 90.411 Section 90... PRIVATE LAND MOBILE RADIO SERVICES Operating Requirements § 90.411 Civil defense communications. The... necessary for the implementation of civil defense activities assigned such station by local civil defense...

  20. DCT-based cyber defense techniques

    Science.gov (United States)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  1. Missile defense in the United States

    OpenAIRE

    Heurlin, Bertil

    2004-01-01

    The basic arguments of this paper are, first, that the current US-missile defense, being operative from fall 2004, is based upon the former experiences with missile defense, second, that missile defense closely associated with weapons of mass destruction has gained the highest priority in American national security policy due to the 9.11 attacks, and third, that the superior argument for establishing an American missile defense is to maintain global, long term political-strategic superiority....

  2. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  3. Defense Mechanisms: A Bibliography.

    Science.gov (United States)

    Pedrini, D. T.; Pedrini, Bonnie C.

    This bibliography includes studies of defense mechanisms, in general, and studies of multiple mechanisms. Defense mechanisms, briefly and simply defined, are the unconscious ego defendants against unpleasure, threat, or anxiety. Sigmund Freud deserves the clinical credit for studying many mechanisms and introducing them in professional literature.…

  4. Nano/micromotors for security/defense applications. A review

    Science.gov (United States)

    Singh, Virendra V.; Wang, Joseph

    2015-11-01

    The new capabilities of man-made micro/nanomotors open up considerable opportunities for diverse security and defense applications. This review highlights new micromotor-based strategies for enhanced security monitoring and detoxification of chemical and biological warfare agents (CBWA). The movement of receptor-functionalized nanomotors offers great potential for sensing and isolating target bio-threats from complex samples. New mobile reactive materials based on zeolite or activated carbon offer considerable promise for the accelerated removal of chemical warfare agents. A wide range of proof-of-concept motor-based approaches, including the detection and destruction of anthrax spores, `on-off' nerve-agent detection or effective neutralization of chemical warfare agents have thus been demonstrated. The propulsion of micromotors and their corresponding bubble tails impart significant mixing that greatly accelerates such detoxification processes. These nanomotors will thus empower sensing and destruction where stirring large quantities of decontaminating reagents and controlled mechanical agitation are impossible or undesired. New technological breakthroughs and greater sophistication of micro/nanoscale machines will lead to rapid translation of the micromotor research activity into practical defense applications, addressing the escalating threat of CBWA.

  5. Variation in plant defense suppresses herbivore performance

    Science.gov (United States)

    Pearse, Ian; Paul, Ryan; Ode, Paul J.

    2018-01-01

    Defensive variability of crops and natural systems can alter herbivore communities and reduce herbivory. However, it is still unknown how defense variability translates into herbivore suppression. Nonlinear averaging and constraints in physiological tracking (also more generally called time-dependent effects) are the two mechanisms by which defense variability might impact herbivores. We conducted a set of experiments manipulating the mean and variability of a plant defense, showing that defense variability does suppress herbivore performance and that it does so through physiological tracking effects that cannot be explained by nonlinear averaging. While nonlinear averaging predicted higher or the same herbivore performance on a variable defense than on an invariable defense, we show that variability actually decreased herbivore performance and population growth rate. Defense variability reduces herbivore performance in a way that is more than the average of its parts. This is consistent with constraints in physiological matching of detoxification systems for herbivores experiencing variable toxin levels in their diet and represents a more generalizable way of understanding the impacts of variability on herbivory. Increasing defense variability in croplands at a scale encountered by individual herbivores can suppress herbivory, even if that is not anticipated by nonlinear averaging.

  6. UNIPOLAR, BIPOLAR OR MULTIPOLAR INTERNATIONAL SYSTEM? THE DEFENSE INDUSTRY FACTOR

    OpenAIRE

    ÖZKAN, Gökhan

    2008-01-01

    International system can be defined as a complex system of systems that is comprised of economic, political, scientific, technological and military systems. It is hard to analyze this complex system. It is even harder to forecast its future. Nonetheless, there are factors such as the defense industry and military power that affect the dynamics of the international system much more than other factors. After the Revolution in Military Affairs, which transformed the military paradigm, significa...

  7. Tactile defensiveness and stereotyped behaviors.

    Science.gov (United States)

    Baranek, G T; Foster, L G; Berkson, G

    1997-02-01

    This study explores the constructs of stereotyped behaviors (e.g., repetitive motor patterns, object manipulations, behavioral rigidities) and tactile defensiveness as relevant to occupational therapy theory and practice and attempts to test their purported relationships in children with developmental disabilities. Twenty-eight children with developmental disabilities and autism were assessed on eight factors of stereotyped behavior via a questionnaire and by four measures of tactile defensiveness. The subjects' scores from the questionnaire were correlated with their scores on the tactile defensiveness measures to see what, if any, relationship among these behaviors exists. Significant relationships emerged from the data, indicating that subjects with higher levels of tactile defensiveness were also more likely to evidence rigid or inflexible behaviors, repetitive verbalizations, visual stereotypes, and abnormal focused affections that are often associated with autism. No significant association was found between motor and object stereotypes and tactile defensiveness. These relationships could not be explained solely by maturational factors. The results suggest that clinicians should include observations of stereotyped behaviors, particularly behavioral rigidities, in conjunction with assessments of sensory defensiveness because these are related phenomena that may pose unique challenges for children with developmental disabilities and autism. Further study is needed to determine the causal mechanisms responsible for these relationships.

  8. New ultraportable display technology and applications

    Science.gov (United States)

    Alvelda, Phillip; Lewis, Nancy D.

    1998-08-01

    MicroDisplay devices are based on a combination of technologies rooted in the extreme integration capability of conventionally fabricated CMOS active-matrix liquid crystal display substrates. Customized diffraction grating and optical distortion correction technology for lens-system compensation allow the elimination of many lenses and systems-level components. The MicroDisplay Corporation's miniature integrated information display technology is rapidly leading to many new defense and commercial applications. There are no moving parts in MicroDisplay substrates, and the fabrication of the color generating gratings, already part of the CMOS circuit fabrication process, is effectively cost and manufacturing process-free. The entire suite of the MicroDisplay Corporation's technologies was devised to create a line of application- specific integrated circuit single-chip display systems with integrated computing, memory, and communication circuitry. Next-generation portable communication, computer, and consumer electronic devices such as truly portable monitor and TV projectors, eyeglass and head mounted displays, pagers and Personal Communication Services hand-sets, and wristwatch-mounted video phones are among the may target commercial markets for MicroDisplay technology. Defense applications range from Maintenance and Repair support, to night-vision systems, to portable projectors for mobile command and control centers.

  9. Mood States Associated with Induced Defensiveness.

    Science.gov (United States)

    Jaderlund, Natasha Slesnick; Waldron, Holly Barrett

    1994-01-01

    Compared effects of neutral and defensive mood induction in 70 students reporting conflicted versus nonconflicted families for presence of hostility, aggression, fear, anxiety, and sadness. Found that defensive students from high-conflict families reported stronger negative emotions than did neutral high-conflict and defensive low-conflict…

  10. 22 CFR 120.9 - Defense service.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense service. 120.9 Section 120.9 Foreign... Defense service. (a) Defense service means: (1) The furnishing of assistance (including training) to..., educational, or information publications and media of all kinds, training aid, orientation, training exercise...

  11. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Priming of antiherbivore defensive responses in plants

    Institute of Scientific and Technical Information of China (English)

    Jinwon Kim; Gary W.Felton

    2013-01-01

    Defense priming is defined as increased readiness of defense induction.A growing body of literature indicates that plants (or intact parts of a plant) are primed in anticipation of impending environmental stresses,both biotic and abiotic,and upon the following stimulus,induce defenses more quickly and strongly.For instance,some plants previously exposed to herbivore-inducible plant volatiles (HIPVs) from neighboring plants under herbivore attack show faster or stronger defense activation and enhanced insect resistance when challenged with secondary insect feeding.Research on priming of antiherbivore defense has been limited to the HIPV-mediated mechanism until recently,but significant advances were made in the past three years,including non-HIPV-mediated defense priming,epigenetic modifications as the molecular mechanism of priming,and others.It is timely to consider the advances in research on defense priming in the plantinsect interactions.

  13. Implementing Solar Technologies at Airports

    Energy Technology Data Exchange (ETDEWEB)

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  14. The development of coal-based technologies for Department of Defense facilities. Semi-annual report, March 28, 1996--September 27, 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scarone, A.W. [and others

    1996-12-13

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. Phase I was completed on November 1, 1995. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included continuing bench-scale tests to identify an NO{sub x} reduction catalyst which is appropriate for industrial boiler applications. In addition, installation of a ceramic filtering device on the demonstration boiler started. Also, a sodium bicarbonate duct injection system was procured for installation on the demonstration boiler. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations,surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  15. European Diversification and Defense Market Assessment, 2nd Edition: A Comprehensive Guide for Entry into Overseas Markets

    National Research Council Canada - National Science Library

    1997-01-01

    .... The region possesses a number of well diversified economies that exhibit growing demand for high technology products in commercial and defense sectors and, thus, provides a wide variety of trade opportunities for U.S. firms...

  16. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  17. Independent technical review of Savannah River Site Defense Waste Processing Facility technical issues

    International Nuclear Information System (INIS)

    1992-07-01

    The Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) will vitrify high-level radioactive waste that is presently stored as liquid, salt-cake, and sludge in 51 waste-storage tanks. Construction of the DWPF began in 1984, and the Westinghouse Savannah Company (WSRC) considers the plant to be 100% turned over from construction and 91% complete. Cold-chemical runs are scheduled to begin in November 1992, and hot start up is projected for June 1994. It is estimated that the plant lifetime must exceed 15 years to complete the vitrification of the current, high-level tank waste. In a memo to the Assistant Secretary for Defense Programs (DP-1), the Assistant Secretary for Environmental Restoration and Waste management (EM-1) established the need for an Independent Technical Review (ITR), or the Red Team, to ''review process technology issues preventing start up of the DWPF.'' This report documents the findings of an Independent Technical Review (ITR) conducted by the Department of Energy (DOE), Office of Environmental Restoration and Waste Management (EM), at the request of the Assistant Secretary for Environmental Restoration and Waste Management, of specified aspects of Defense Waste Process Facility (DWPF) process technology. Information for the assessment was drawn from documents provided to the ITR Team by the Westinghouse Savannah River Company (WSRC), and presentations, discussions, interviews, and tours held at the Savannah River Site (SRS) during the weeks of February and March 9, 1992

  18. CrossTalk: The Journal of Defense Software Engineering. Volume 24, Number 1, Jan/Feb 2011

    Science.gov (United States)

    2011-02-01

    Aircraft Sustainment Group Tony Henderson 309th Software Maintenance Group Lt. Col. Brian Hermann, Ph.D. Defense Information Systems Agency Lt. Col...Solutions, Inc. Gordon Sleve Robbins Gioia LLC Larry Smith Software Technology Support Center Dr. John Sohl Weber State University Elizabeth Starrett OO-ALC

  19. The Integration Role of European Defense Procurement in Achieving a More Competitive and Stronger European Defense Equipment Market

    Science.gov (United States)

    2015-06-01

    and systems, even monopolistic ) essence of the supply side of the defense market . There are only a few suppliers that can meet today’s complex...DEFENSE PROCUREMENT IN ACHIEVING A MORE COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET by Kiril O. Angelov June 2015 Thesis Advisor...COMPETITIVE AND STRONGER EUROPEAN DEFENSE EQUIPMENT MARKET 5. FUNDING NUMBERS 6. AUTHOR(S) Kiril O. Angelov 7. PERFORMING ORGANIZATION NAME(S) AND

  20. Report to the Congressional Defense Committees: Status of the Department of Defense's Business Transformation Efforts

    National Research Council Canada - National Science Library

    2008-01-01

    ...). It directs the Secretary of Defense to provide the Congressional Defense Committees with an annual report on the Department's business transformation efforts and compliance with the requirements of the law...

  1. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  2. STRUCTURING DEFENSE POLICIES FOR THE DEFENSE AND CONTROL OF STRATEGIC NATURAL RESOURCES

    Directory of Open Access Journals (Sweden)

    GABRIEL DE PAULA

    2018-02-01

    Full Text Available During the last decade, there has been a reconfiguration of a new geopolitical scenario. This new scenario focus on the assessment about strategic natural resources (oil, gas and water, and less important, biodiversity, food and fertile land and its spatial condition (the resources are in a territory which is politically defined by boundaries or zone of influence. The scenario in South America is not far from that international dynamic, which affects in different levels the strategic lines of national defense policies in Brazil, Venezuela and (in less degree Argentina. In that way, competence and confluence scenarios are defined, which may have variability in the conflict level, such as a military confrontation or cooperation mechanisms (as the South America Defense Council. These scenarios are geographically located in: oil and gas basins, Amazonas, water resources, Antarctica, Atlantic Ocean and fertile land. The defense strategies set parameters for the design of the armed forces, as far as the hypothesis of conflicts above-mentioned applied. Thus, the defense administration reconfigured the capabilities of the Armed Forces (logistic, personnel, doctrine, resources, surveillance, in order to achieve the mission of control the regions where availability of natural resources exists.

  3. Immune defense in leaf-cutting ants

    DEFF Research Database (Denmark)

    Armitage, Sophie A O; Broch, Jens F; Marín, Hermogenes Fernández

    2011-01-01

    To ameliorate the impact of disease, social insects combine individual innate immune defenses with collective social defenses. This implies that there are different levels of selection acting on investment in immunity, each with their own trade-offs. We present the results of a cross......-fostering experiment designed to address the influences of genotype and social rearing environment upon individual and social immune defenses. We used a multiply mating leaf-cutting ant, enabling us to test for patriline effects within a colony, as well as cross-colony matriline effects. The worker's father influenced...... both individual innate immunity (constitutive antibacterial activity) and the size of the metapleural gland, which secretes antimicrobial compounds and functions in individual and social defense, indicating multiple mating could have important consequences for both defense types. However, the primarily...

  4. Ballistic Missile Defense in Europe

    OpenAIRE

    Sarihan, Ali; Bush, Amy; Summers, Lawrence; Thompson, Brent; Tomasszewski, Steven

    2009-01-01

    This paper will build on ballistic missile defense in Europe. In the first part, a brief historical overview will place the current public management issue into light. This is followed by a discussion of the main actors in the international debate, the problems that arise and the available options and recommendations to address missile defense. In the second part, differences between George W. Bush and Barack H. Obama will analyze under the title “Ballistic Missile Defense in Europe: Evolving...

  5. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  6. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  7. Synergistic effects of plant defense elicitors and Trichoderma harzianum on enhanced induction of antioxidant defense system in tomato against Fusarium wilt disease.

    Science.gov (United States)

    Zehra, Andleeb; Meena, Mukesh; Dubey, Manish Kumar; Aamir, Mohd; Upadhyay, R S

    2017-11-02

    Plant defense against their pathogens can be induced by a complex network of different inducers. The present study investigates the synergistic effect of Trichoderma harzianum, exogenous salicylic acid (SA) and methyl jasmonate (MeJA) over the response and regulation of the antioxidant defense mechanisms and lipid peroxidation in tomato plants against Fusarium wilt disease. In the present work, tomato plants were infected by Fusarium oxysporum f. sp. lycopersici 3 days after inoculated with T. harzianum and/or sprayed daily for 3 days with chemical inducers (SA and MeJA). Plants were analysed at 0, 24, 48, 72 and 96 h after inoculation with Fusarium oxysporum f. sp. lycopersici. Infection of tomato plants by pathogen led to strong reduction in the dry weight of roots and shoots with the enhanced concentration of H 2 O 2 and varying degree of lipid peroxidation. Concurrently, exogenous SA, when applied with pathogen greatly enhanced H 2 O 2 content as well as activities of antioxidant enzymes except catalase (CAT) and ascorbate peroxidase (APx). The pathogen challenged plants pretreated with T. harzianum and MeJA together exhibited less lipid peroxidation and as well as the elevated level of ascorbic acid and enhanced activities of antioxidant enzymes. All applied treatments protected tomato seedlings against Fusarium wilt disease but the percentage of protection was found higher in plants pretreated with the combination of T. harzianum and chemical inducers.

  8. Why embedding Health ICT in daily practice is not that easy.

    NARCIS (Netherlands)

    Swinkels, I.

    2017-01-01

    Background: The prospects of information and communication technologies (ICT) seem endless. In daily life ICT is fully embedded, but in healthcare its uptake and use does not reach its potential yet despite high expectations. Policymakers promote Health ICT widely, e.g. by policy letters, investing

  9. Daily transactional and transformational leadership and daily employee engament

    NARCIS (Netherlands)

    Breevaart, K.; Bakker, A.B.; Hetland, Jorn; Demerouti, E.; Olsen, O.K.; Espevik, R.

    2014-01-01

    This diary study adds to the leadership literature by examining the daily influence of transformational leadership, contingent reward, and active management-by-exception (MBE active) on followers' daily work engagement. We compare the unique contribution of these leadership behaviours and focus on

  10. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  11. Defensive Federal Litigation

    Science.gov (United States)

    1998-08-20

    requires that all affirmative defenses be pleaded in the answer. The rule lists 19 specific affirmative defenses, such as estoppel , laches, res judicata...Brown, 22 F.3d 516 (2d Cir. 1994); Poole v. Rourke, 779 F. Supp. 1546 (E.D. Cal. 1991). 3-40 potential collateral estoppel .4. effect of the district...the back pay claim, which was over $10,000, to the Court of Claims. The court of appeals found that ൸Collateral estoppel prohibits relitigation of

  12. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  13. Technology Assessment for Powertrain Components Final Report CRADA No. TC-1124-95

    Energy Technology Data Exchange (ETDEWEB)

    Tokarz, F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gough, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-19

    LLNL utilized its defense technology assessment methodologies in combination with its capabilities in the energy; manufacturing, and transportation technologies to demonstrate a methodology that synthesized available but incomplete information on advanced automotive technologies into a comprehensive framework.

  14. ACCESSING FEDERAL DATA BASES FOR CONTAMINATED SITE CLEAN-UP TECHNOLOGIES

    Science.gov (United States)

    The Federal Remediation Technologies Roundtable (Roundtable) eveloped this publication to provide information on accessing Federal data bases that contain data on innovative remediation technologies. The Roundtable includes representatives from the Department of Defense (DoD), En...

  15. The Art and Science of Defense Logistics

    Science.gov (United States)

    1995-04-01

    The Art And Science Of Defense Logistics CSC 1995 SUBJECT AREA - Logistics THE ART AND SCIENCE OF DEFENSE LOGISTICS...Government EXECUTIVE SUMMARY Title: The Art and Science of Defense Logistics Author: Major S. I. Schuler, USMC Research Questions: 1...00-1995 4. TITLE AND SUBTITLE The Art And Science Of Defense Logistics 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6

  16. Mobilization and Defense Management Technical Reports Series. A Framework for Increasing Defense Production by Reducing Perceived Opportunity Costs.

    Science.gov (United States)

    1983-05-01

    advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to

  17. Modernization of the Defense Sector. Principles and Characteristics of the Argentine Model

    Science.gov (United States)

    2007-01-01

    Supply of Common Items (Pro- grama de Abastecimiento Conjunto de Insumos Comunes , PACIC) was created and implemented. Such program is intended to...institutionalize proc- esses for the unification and strengthening of the scientific and technological system of defense, in order to achieve a more flexible...the moderniza- tion process currently under way grants a central role to enhancing capabilities of the Institute of Scientific and Technical Research

  18. Research on offense and defense technology for iOS kernel security mechanism

    Science.gov (United States)

    Chu, Sijun; Wu, Hao

    2018-04-01

    iOS is a strong and widely used mobile device system. It's annual profits make up about 90% of the total profits of all mobile phone brands. Though it is famous for its security, there have been many attacks on the iOS operating system, such as the Trident apt attack in 2016. So it is important to research the iOS security mechanism and understand its weaknesses and put forward targeted protection and security check framework. By studying these attacks and previous jailbreak tools, we can see that an attacker could only run a ROP code and gain kernel read and write permissions based on the ROP after exploiting kernel and user layer vulnerabilities. However, the iOS operating system is still protected by the code signing mechanism, the sandbox mechanism, and the not-writable mechanism of the system's disk area. This is far from the steady, long-lasting control that attackers expect. Before iOS 9, breaking these security mechanisms was usually done by modifying the kernel's important data structures and security mechanism code logic. However, after iOS 9, the kernel integrity protection mechanism was added to the 64-bit operating system and none of the previous methods were adapted to the new versions of iOS [1]. But this does not mean that attackers can not break through. Therefore, based on the analysis of the vulnerability of KPP security mechanism, this paper implements two possible breakthrough methods for kernel security mechanism for iOS9 and iOS10. Meanwhile, we propose a defense method based on kernel integrity detection and sensitive API call detection to defense breakthrough method mentioned above. And we make experiments to prove that this method can prevent and detect attack attempts or invaders effectively and timely.

  19. Space-based ballistic-missile defense

    International Nuclear Information System (INIS)

    Bethe, H.A.; Garwin, R.L.; Gottfried, K.; Kendall, H.W.

    1984-01-01

    This article, based on a forthcoming book by the Union for Concerned Scientists, focuses on the technical aspects of the issue of space-based ballistic-missile defense. After analysis, the authors conclude that the questionable performance of the proposed defense, the ease with which it could be overwhelmed or circumvented, and its potential as an antisatellite system would cause grievous damage to the security of the US if the Strategic Defense Initiative were to be pursued. The path toward greater security lies in quite another direction, they feel. Although research on ballistic-missile defense should continue at the traditional level of expenditure and within the constraints of the ABM Treaty, every effort should be made to negotiate a bilateral ban on the testing and use of space weapons. The authors think it is essential that such an agreement cover all altitudes, because a ban on high-altitude antisatellite weapons alone would not viable if directed energy weapons were developed for ballistic-missile defense. Further, the Star Wars program, unlikely ever to protect the entire nation against a nuclear attack, would nonetheless trigger a major expansion of the arms race

  20. THE ENVIRONMENTAL TECHNOLOGIES ACCEPTANCE (ETA) PROGRAM

    International Nuclear Information System (INIS)

    Behr-Andres, Christina B.

    2001-01-01

    The Environmental Technologies Acceptance (ETA) Program at the Energy and Environmental Research Center (EERC) is intended to advance the development, commercial acceptance, and timely deployment of selected private sector technologies for the cleanup of sites in the nuclear defense complex as well as the greater market. As shown in Table 1, this cooperative agreement funded by the National Energy Technology Laboratory (NETL) consists of three tasks: Technology Selection, Technology Development, and Technology Verification. As currently conceived, the ETA will address the needs of as many technologies as appropriate under its current 3-year term. This report covers activities during the first 6 months of the 3-year ETA program

  1. 32 CFR 147.15 - Guideline M-Misuse of Information technology systems.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline M-Misuse of Information technology... CLASSIFIED INFORMATION Adjudication § 147.15 Guideline M—Misuse of Information technology systems. (a) The... ability to properly protect classified systems, networks, and information. Information Technology Systems...

  2. Report of the Defense Science Board/Defense Policy Board Task Force On Theater Missile Defense

    National Research Council Canada - National Science Library

    1996-01-01

    ... also tackled the controversial subject of the ABM Treaty and its effect on theater missile defenses Subsequent to its interim report, which expressed strong concerns about the demarcation path the US...

  3. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  4. Defense and Regional Integration: Brazil’s Weapons Industry Case

    Directory of Open Access Journals (Sweden)

    Suzeley Kalil Mathias

    2009-06-01

    Full Text Available This paper works with the relation between technological development and weapons industry in Brazil, pointing out the dependence of this to that one. One reveals as the changes in the commerce of armaments that currently privileges the production of small weapons for exportation. The conclusion is that to keep projects of this nature, is using to advantage the industrial park for the dual production, that is, that one takes care the civil and the military demands. At last, it defends the possibility of the defense industry works as mechanism of regional integration.

  5. The New Structure of Brazilian Ministry of Defense: Challenges and Opportunities

    Science.gov (United States)

    2011-03-04

    in the prominent northeast were called “ Trampoline to Victory.”3 Because of difficulties with mobilization, preparation and training at American...technology. These three departments of the Joint Staff of Armed Forces will be headed by general officers of the last rank in active duty from each Service...primarily on human resources. The leadership process 21 is guaranteed with Minister Nelson Jobim as head of the Ministry of Defense in the next

  6. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

  7. Detection of activities of daily living impairment in Alzheimer's disease and mild cognitive impairment using information and communication technology

    Directory of Open Access Journals (Sweden)

    Sacco G

    2012-12-01

    Full Text Available Guillaume Sacco,1–3 Véronique Joumier,1,4 Nelly Darmon,1 Arnaud Dechamps,1,5 Alexandre Derreumaux,1,3 Ji-Hyun Lee,2 Julie Piano,2 Nathalie Bordone,2 Alexandra Konig,1,6 Bernard Teboul,3 Renaud David,1,2 Olivier Guerin,1,3 François Bremond,1,4 Philippe Robert1,21EA CoBTeK, Université de Nice Sophia-Antipolis, 2Centre Mémoire de Ressource et de Recherche, CHU de Nice, 3Plateforme Patient du Centre d'Innovation et d'Usage en Santé, CHU de Nice, 4Equipe Stars, Institut National de Recherche en Informatique et en Automatique (INRIA, Sophia-Antipolis, France; 5University of Pancasila, Department of Psychology, Jakarta, Indonesia; 6University of Maastricht, Faculty of Psychology and Neuropsychology, Department of Psychiatry and Neuropsychology, Maastricht, The NetherlandsBackground: One of the key clinical features of Alzheimer's disease (AD is impairment in daily functioning. Patients with mild cognitive impairment (MCI also commonly have mild problems performing complex tasks. Information and communication technology (ICT, particularly techniques involving imaging and video processing, is of interest in order to improve assessment. The overall aim of this study is to demonstrate that it is possible using a video monitoring system to obtain a quantifiable assessment of instrumental activities of daily living (IADLs in AD and in MCI.Methods: The aim of the study is to propose a daily activity scenario (DAS score that detects functional impairment using ICTs in AD and MCI compared with normal control group (NC. Sixty-four participants over 65 years old were included: 16 AD matched with 10 NC for protocol 1 (P1 and 19 MCI matched with 19 NC for protocol 2 (P2. Each participant was asked to undertake a set of daily tasks in the setting of a “smart home” equipped with two video cameras and everyday objects for use in activities of daily living (8 IADLs for P1 and 11 for P2, plus 4 temporal execution constraints. The DAS score was then computed

  8. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating... Directory: Defense Logistics Agency Headquarters, Andrew T. McNamara Building, 8725 John J. Kingman Road...

  9. On the daily cycle of the climatological variables in the Municipality of Quibdo

    International Nuclear Information System (INIS)

    Pabon, Jose Daniel; Reiner Palomino Lemus; William Murillo Lopez

    2005-01-01

    We analyzed the daily cycle of the climatological variables (solar radiation, air temperature, atmospheric pressure, precipitation and wind) in Quibdo, (5.45 degrades N and 76.39 degrades W, 53m), department of Choco. The analysis is based on hourly data recorded during the period 2000-2004 at the meteorological and radiometric station of the technological university of Choco, Diego Luis Cordoba (UTCH). It is shown that the daily cycle of the climatological variables in the city of Quibdo is typical of the tropical areas and the particularities of the daily pattern of precipitation were found: most of the rains occur during the evening. The seasonal variation of the daily cycle was also established. Finally, an approximation was made to the analyses of the effect of extreme phases of inter annual climate variability associated to El Nino and la Nina

  10. Cone penetrometer: Innovative technology summary report

    International Nuclear Information System (INIS)

    1996-04-01

    Cone penetrometer technology (CPT) provides cost-effective, real-time data for use in the characterization of the subsurface. Recent innovations in this baseline technology allow for improved access to the subsurface for environmental restoration applications. The technology has been improved by both industry and government agencies and is constantly advancing due to research efforts. The U.S. Department of Energy (DOE) Office of Science and Technology (formerly Technology Development) has contributed significantly to these efforts. This report focuses on the advancements made in conjunction with DOE's support but recognizes Department of Defense (DOD) and industry efforts

  11. Accelerating the Pace of Change in Energy Technologies Through an Integrated Federal Energy Policy

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2010-11-01

    In this report, the President’s Council of Advisors on Science and Technology (PCAST) calls for the development of a coordinated government-wide Federal energy policy. This will be a major undertaking, given the large number of Federal policies that affect the development, implementation, and use of energy technologies. For that reason, we recommend that the Administration initiate a process analogous to the Quadrennial Defense Review undertaken every four years by the Department of Defense

  12. 32 CFR 13.4 - Duties and responsibilities of the defense.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE COUNSEL § 13.4 Duties and responsibilities of the defense. (a) Regular duties. The Defense shall perform... 32 National Defense 1 2010-07-01 2010-07-01 false Duties and responsibilities of the defense. 13.4...

  13. Chronic daily headaches

    Directory of Open Access Journals (Sweden)

    Fayyaz Ahmed

    2012-01-01

    Full Text Available Chronic Daily Headache is a descriptive term that includes disorders with headaches on more days than not and affects 4% of the general population. The condition has a debilitating effect on individuals and society through direct cost to healthcare and indirectly to the economy in general. To successfully manage chronic daily headache syndromes it is important to exclude secondary causes with comprehensive history and relevant investigations; identify risk factors that predict its development and recognise its sub-types to appropriately manage the condition. Chronic migraine, chronic tension-type headache, new daily persistent headache and medication overuse headache accounts for the vast majority of chronic daily headaches. The scope of this article is to review the primary headache disorders. Secondary headaches are not discussed except medication overuse headache that often accompanies primary headache disorders. The article critically reviews the literature on the current understanding of daily headache disorders focusing in particular on recent developments in the treatment of frequent headaches.

  14. 78 FR 17176 - Federal Acquisition Regulation; Defense Base Act

    Science.gov (United States)

    2013-03-20

    ... Regulation; Defense Base Act AGENCIES: Department of Defense (DoD), General Services Administration (GSA... the Defense Base Act. DATES: Interested parties should submit written comments to the Regulatory... Act as extended by the Defense Base Act. II. Discussion and Analysis The Defense Base Act of 1941...

  15. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...

  16. 76 FR 71467 - Defense Federal Acquisition Regulation Supplement; Extension of Department of Defense Mentor...

    Science.gov (United States)

    2011-11-18

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2011-D050) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  17. Laser Science and Technology Program Update 2002

    International Nuclear Information System (INIS)

    Hackel, L A; Chen, H L

    2003-01-01

    The Laser Science and Technology (LSandT) Program's mission is to develop advanced lasers, optics, materials technologies, and applications to solve problems and create new capabilities of importance to the nation and the Laboratory. A top, near-term priority is to provide technical support in the deployment and upgrade of the National Ignition Facility (NIF). Our other program activities synergistically develop technologies that are of interest to the NIF Directorate but outside the scope of the NIF funding. The primary objectives of LSandT activities in 2002 have been fourfold--(a) to support deployment of hardware and to enhance laser and optics performance for NIF, (b) to develop high-energy petawatt laser science and technology for the Department of Energy (DOE), (c) to develop advanced solid-state laser systems and optical components for the Department of Defense (DoD), and to invent develop, and deliver improved concepts and hardware for other government agencies and industry. Special efforts have been devoted to building and maintaining our capabilities in three technology areas: high-power short-pulse solid-state lasers, high-power optical materials, and applications of advanced lasers. LSandT activities during 2002 focused on seven major areas: (1) NIF Project--LSandT led major advances in the deployment of NIF Final Optics Assembly (FOA) and the development of 3ω optics processing and treatment technologies to enhance NIF's operations and performance capabilities. (2) Stockpile Stewardship Program (SSP)--LSandT personnel continued development of ultrashort-pulse lasers and high-power, large-aperture optics for applications in SSP, extreme-field science and national defense. To enhance the high-energy petawatt (HEPW) capability in NIF, LSandT continued development of advanced compressor-grating and front-end laser technologies utilizing optical-parametric chirped-pulse amplification (OPCPA). (3) High-energy-density physics and inertial fusion energy

  18. Defense AT and L Magazine. Volume 47, Number 2, March-April 2018

    Science.gov (United States)

    2018-03-01

    Corporation , can provide other acqui- sition organizations with valuable insight into how best to conduct LFT&E on their respective programs. LFT&E Lessons...Technology, Engineering, Test and Evaluation, Finance , Lo- gisticians and Contracting. In order to improve the survivability of our Department of Defense... corporate business strategy, a company typically will determine what it is good at and then use that core competency as a competitive ad- vantage to grow

  19. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  20. Teaching with Technology

    Science.gov (United States)

    Martineau, Pamela

    2009-01-01

    In an era when technology seems to be changing almost daily, school boards, administrators, and teachers need to revisit their technology policies almost as rapidly, education experts advise. Internet chat rooms, online video games, and other electronic features that once seemed inappropriate for the classroom are proving useful for meeting many…

  1. Defense Primer: DOD Contractors

    Science.gov (United States)

    2017-02-10

    functions, from intelligence analysis or software development to landscaping or food service. Why does DOD use individual contractors? Going back to...that provide professional services, from research to management support. The bulk of contractors—more than 70%—provide products, and these include...10 U.S.C. Part IV: Service, Supply, and Procurement. CRS Products CRS In Focus IF10548, Defense Primer: U.S. Defense Industrial Base, by Daniel

  2. Augmented Reality: Daily Prayers for Preschooler Student

    Directory of Open Access Journals (Sweden)

    Hendra Pradibta

    2018-01-01

    Full Text Available Education is one of the aspects that many synthesized with technology. Yet, this is contrary to the fact that where most of the learning materials are still based on text. This research aims to develop an alternative learning media by implementing Augmented Reality Technology for Preschooler students. Augmented Reality (AR is an application that can combine the virtual object as text, pictures and animation into the real world. Development of Augmented Reality application uses Web Aurasma Based Studio, with learning materials of daily prayer for preschool student. The development of the characters and the animations were using Adobe Illustrator and Adobe After Effects. The results of the study showed that technology Augmented Reality can be used as an alternative learning media especially in the learning process in Preschool Al Furqon. This is because the content Augmented Reality in the form of animation can gives more understanding and attention for preschool student to follow the learning process

  3. Defense Primer: The National Defense Budget Function (050)

    Science.gov (United States)

    2017-03-17

    individual policy activities. Subfunctions are assigned a numeric identifier (ending in a single digit ) related to the function to which they belong...operations, equipment repair, and maintenance of defense facilities, healthcare costs, and administration. 24% Military Personnel (MILPERS) Pay and

  4. Inducible defenses against herbivory and fouling in seaweeds

    Science.gov (United States)

    Pereira, Renato Crespo; Costa, Erica da Silva; Sudatti, Daniela Bueno; da Gama, Bernardo Antonio Perez

    2017-04-01

    Secondary metabolites play an important ecological role as a defense mechanism in seaweeds. Chemical defenses are well known to change in response to herbivory, but other driving factors, either biotic or abiotic, are often neglected. Epibiosis may not only reduce seaweed fitness, but also increase attractiveness to consumers, and thus defense production should also be triggered by epibionts. In this study, three Southwestern Atlantic seaweeds, Gracilaria cearensis, Pterocladiella capillacea (Rhodophyceae) and Codium decorticatum (Chlorophyceae) were investigated in laboratory bioassays designed to test whether the action of herbivory or simulated epibiosis influences chemical defenses. Crossed induction experiments were also performed in order to assess whether herbivore induction influences antifouling chemical defense, as well as whether epibiont induction would affect defense against herbivores. The effect of laboratory conditions on seaweeds in the absence of field stimuli was also investigated by comparing consumption of artificial food with extracts from acclimatized and non-acclimatized seaweeds (i.e., natural defense levels). Only the green seaweed C. decorticatum exhibited inducible antifouling defenses triggered by simulated epibiosis, but not by herbivores. In the other seaweeds there was no induction either by herbivory or simulated epibiosis. Acclimatization did not affect C. decorticatum defenses. However, non-acclimatized G. cearensis artificial foods were preferred over acclimatized ones, while extracts from acclimatized P. capillacea increased herbivore consumption, highlighting the need to acclimatize seaweeds before the main induction experiments. This is the first report of inducible defenses due to simulated fouling in seaweeds.

  5. Daily Stressor Reactivity during Adolescence: The Buffering Role of Parental Warmth

    Science.gov (United States)

    Lippold, Melissa; Davis, Kelly D.; McHale, Susan M.; Buxton, Orfeu; Almeida, David M.

    2016-01-01

    Objective This study examined youth stressor reactivity in the form of links between daily stressors and adolescents’ negative affect, physical health symptoms, and cortisol patterns. We also tested whether youth gender and parental warmth moderated these linkages. Method Participants were the children of employees in the Information Technology division of a large company (N = 132, mean age = 13.39 years, 55% female). Youth completed daily diary telephone interviews on 8 consecutive evenings and provided saliva samples at 4 time points over 4 days to assess daily stressors and youth physiological and affective functioning. Parental warmth was assessed during in-home interviews. Multi-level modeling was used to account for interdependencies in the data. Results Youth who experienced more daily stressors, on average, reported more negative affect and physical health symptoms, on average. Further, on days youth reported more stressors than usual (compared to their own across-day average), they also exhibited more physical health symptoms, reduced evening cortisol decline (e.g., flatter slopes), higher bedtime cortisol, and more negative affect. Girls had stronger within-person linkages between daily stressors and daily negative affect than boys. Parental warmth moderated these within-person linkages: Youth who experienced more parental warmth had lower negative affect and steeper cortisol decline than usual on less stressful days. Yet, youth who experienced less parental warmth had higher negative affect and their cortisol levels declined less, even on days with lower-than-usual stress. Conclusions Daily stressors are associated with youth's affective and physiological functioning, but parental warmth can support youth's stress recovery. PMID:27175577

  6. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  7. Daily Weather Records

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These daily weather records were compiled from a subset of stations in the Global Historical Climatological Network (GHCN)-Daily dataset. A weather record is...

  8. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 2, DAU 183

    National Research Council Canada - National Science Library

    Turk, Wayne; Wynn, Michael W; Schaeffer, Mark D; Walsh, John; Kratz, Louise A; Ward, Dan; Brown, David; McVay, Tammi

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  9. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 34, Number 1, DAU 182

    National Research Council Canada - National Science Library

    Gadeken, Owen C; Quaid, Chris; Ward, Dan; Liss, Steven; Lambert, Cathy; Li, Alan; Parmer, Shailesh; Hurt, Hayden; Sumpter, LeAntha; Malnick, Kathy

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  10. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    National Research Council Canada - National Science Library

    Chedister, Robert W; Leach, Richard; Route, Ronald; Knott, Claudia; Turk, Wayne; Quaid, Chris; Ward, Dan; Geurts, James F

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  11. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 5, DAU 181

    National Research Council Canada - National Science Library

    Wynn, Michael; Gadeken, Owen C; Triggs, Marcia; Wengrowski, Bruno S

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  12. Defense AT&L Magazine A Publication of the Defense Acquisition University. Volume 33, Number 6, DAU 181

    National Research Council Canada - National Science Library

    Horn, John F; Ronis, Sheila R; Vann, Sandy; Sylvester, Richard K

    2005-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  13. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 33, Number 4, DAU 180

    National Research Council Canada - National Science Library

    Bryan, Harry W; Pezzano, Anthony; Burke, Peter; Davis, Jerry; Vanleer, Keisha; Howe, Keith B; Rippere, Richard B; Ward, Daniel; McGrath, Elizabeth A

    2004-01-01

    .... As the flagship publication of the Defense Acquisition University, Defense AT AND L also disseminates information on training and education, continuous learning, and e-Learning to those acquisition...

  14. 32 CFR 37.110 - What type of instruments are technology investment agreements (TIAs)?

    Science.gov (United States)

    2010-07-01

    ... investment agreements (TIAs)? 37.110 Section 37.110 National Defense Department of Defense OFFICE OF THE... What type of instruments are technology investment agreements (TIAs)? TIAs are assistance instruments used to stimulate or support research. As discussed in appendix B to this part, a TIA may be either a...

  15. Managing Daily Life

    Science.gov (United States)

    ... Duchenne / Managing Daily Life Print Email Managing Daily Life Environmental accessibility As the person with Duchenne starts ... such as wider doorways and ramps, can make life easier once the person with Duchenne cannot climb ...

  16. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  17. Applications of Artificial Intelligence to the Strategic Defense Initiative’s Battle Management/Command and Control Objective.

    Science.gov (United States)

    1985-09-01

    technology issue is expected to take years of research (20:11). According to Lt Gen James A. Abrahamson, director of the SDI organization heading up...from occurring (14:79). A Wqhite House Panel known as the (Dr. James ) Fletcher Defensive Technologies Study Group has pointed out that, in the past...Handbook of Artificial Intelligence. Volume I. Los Altos CA: WilliamKaufmann Inc., 1981. 5. Basden , Andrew. "On the Application of Expert Systems,N

  18. Process technology for vitrification of defense high-level waste at the Savannah River Plant

    International Nuclear Information System (INIS)

    Boersma, M.D.

    1984-01-01

    Vitrification in borosilicate glass is now the leading worldwide process for immobilizing high-level radioactive waste. Each vitrification project, however, has its unique mission and technical challenges. The Defense Waste Vitrification Facility (DWPF) now under construction at the Savannah River Plant will concentrate and vitrify a large amount of relatively low-power alkaline waste. Process research and development for the DWPF have produced significant advances in remote chemical operations, glass melting, off-gas treatment, slurry handling, decontamination, and welding. 6 references, 1 figure, 5 tables

  19. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  20. Self-critical perfectionism, daily stress, and disclosure of daily emotional events.

    Science.gov (United States)

    Richardson, Clarissa M E; Rice, Kenneth G

    2015-10-01

    Although disclosure of stressful events can alleviate distress, self-critical perfectionism may pose an especially strong impediment to disclosure during stress, likely contributing to poorer psychological well-being. In the current study, after completing a measure of self-critical perfectionism (the Discrepancy subscale of the Almost Perfect Scale--Revised; Slaney, Rice, Mobley, Trippi, & Ashby, 2001), 396 undergraduates completed measures of stress and disclosure at the end of each day for 1 week. Consistent with hypotheses and previous research, multilevel modeling results indicated significant intraindividual coupling of daily stress and daily disclosure where disclosure was more likely when experiencing high stress than low stress. As hypothesized, Discrepancy moderated the relationship between daily stress and daily disclosure. Individuals higher in self-critical perfectionism (Discrepancy) were less likely to engage in disclosure under high stress, when disclosure is often most beneficial, than those with lower Discrepancy scores. These results have implications for understanding the role of stress and coping in the daily lives of self-critical perfectionists. (c) 2015 APA, all rights reserved).

  1. A Review on Internet of Things for Defense and Public Safety

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-01-01

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS. PMID:27782052

  2. 78 FR 32637 - Science and Technology Reinvention Laboratory Personnel Management Demonstration Project...

    Science.gov (United States)

    2013-05-31

    ..., Science and Technology Reinvention Laboratory Personnel Management Demonstration Project, Department of... DEPARTMENT OF DEFENSE Office of the Secretary Science and Technology Reinvention Laboratory Personnel Management Demonstration Project, Department of the Army, Army Research, Development and...

  3. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  4. Defense Transuranic Waste Program Strategy Document

    International Nuclear Information System (INIS)

    1984-01-01

    The Defense Transuranic Waste Program (DTWP) Strategy Document presents the general strategy for managing transuranic (TRU) waste materials generated during defense and research activities regulated by the US Department of Energy. The Strategy Document includes discussion of objectives and activities relating to the entire Defense Transuranic Waste Program. However, the primary focus is on the specific management responsibilities of the Transuranic Waste Lead Organization (TLO). The document also includes an updated summary of progress on TLO-managed activities over the past year

  5. Trade Costs, Conflicts, and Defense Spending

    OpenAIRE

    Seitz, Michael; Tarasov, Alexander; Zakharenko, Roman

    2013-01-01

    This paper develops a quantitative model of trade, military conflicts, and defense spending. Trade liberalization between two countries reduces probability of an armed conflict between them, causing both to cut defense spending. This in turn causes a domino effect on defense spending by other countries. As a result, both countries and the rest of the world are better off. We estimate the model using data on trade, conflicts, and military spending. We find that, after reduction of costs of tra...

  6. Educational Technology--The White Elephant.

    Science.gov (United States)

    Molnar, Andrew R.

    A ten year experiment in educational technology sponsored under Title VII of the National Defense Education Act (NDEA) demonstrated the feasibility of large-scale educational systems which can extend education to all while permitting the individualization of instruction without significant increase in cost (through television, computer systems,…

  7. Defensive behaviours in innovation teams: how project teams discuss defensiveness and its relationship with innovation resilience behaviour and project success

    NARCIS (Netherlands)

    Oeij, P.R.A.; Dhondt, S.; Gaspersz, J.B.R.; Vuuren, T. van

    2016-01-01

    Project team members and project leaders of innovation projects were interviewed about the possible presence of defensive behaviours within the team. While investigating defensive behaviour can be done validly by observation techniques, to talk about defensiveness within a team often leads to

  8. 12 CFR 411.500 - Secretary of Defense.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Secretary of Defense. 411.500 Section 411.500 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES NEW RESTRICTIONS ON LOBBYING Exemptions § 411.500 Secretary of Defense. (a) The Secretary of Defense may exempt, on a case-by-case basis, a covered...

  9. Evaluation of technology transferring: The experiences of the first Navy Domestic Technology Transfair. Final report

    Energy Technology Data Exchange (ETDEWEB)

    1989-12-31

    In August 1989 the Office of the Chief of Naval Research and the American Defense Preparedness Association conducted the first Navy Domestic Technology Transfair. The objective of the Transfair was to expose the US Navy`s years of solid experience across a broad span of technology to organizations outside of the Navy. It was an opportunity for private industry to capitalize on the Navy developed technology and this opening for industry was the primary focus of the Transfair. The event provided a unique forum to meet leading Navy scientific and engineering innovators face-to-face. Information was available concerning licensing of naval technology that was for sale to the private sector. Further, discussions covered opportunities for new cooperative research and development agreements with Navy laboratories and R&D activities. These agreements were authorized under the Federal Technology Transfer Act of 1986. The Transfair program was conducted in such a manner as to allow each Navy inventor, either scientist or engineer, to present a system, piece of hardware, or licensable concept in a formal paper presentation. Then, the Navy inventors were available in two, two-hour periods in which individual discussions were conducted, with attendees pursuing specific venues of cooperative agreements as desired. This report provides specifics concerning the technologies that were made available for transfer to the private sector during the Transfair. The Transfair concept sought to add special emphasis to the opening that the 1988 Technology Transfer Act brought to the marketplace. The experience was a step in the education of the possibilities for cooperation between the government and the private sector to share technology. Of additional significance is the economic enhancement for business expansion with the application of the technology to markets beyond defense.

  10. Human-machine analytics for closed-loop sense-making in time-dominant cyber defense problems

    Science.gov (United States)

    Henry, Matthew H.

    2017-05-01

    Many defense problems are time-dominant: attacks progress at speeds that outpace human-centric systems designed for monitoring and response. Despite this shortcoming, these well-honed and ostensibly reliable systems pervade most domains, including cyberspace. The argument that often prevails when considering the automation of defense is that while technological systems are suitable for simple, well-defined tasks, only humans possess sufficiently nuanced understanding of problems to act appropriately under complicated circumstances. While this perspective is founded in verifiable truths, it does not account for a middle ground in which human-managed technological capabilities extend well into the territory of complex reasoning, thereby automating more nuanced sense-making and dramatically increasing the speed at which it can be applied. Snort1 and platforms like it enable humans to build, refine, and deploy sense-making tools for network defense. Shortcomings of these platforms include a reliance on rule-based logic, which confounds analyst knowledge of how bad actors behave with the means by which bad behaviors can be detected, and a lack of feedback-informed automation of sensor deployment. We propose an approach in which human-specified computational models hypothesize bad behaviors independent of indicators and then allocate sensors to estimate and forecast the state of an intrusion. State estimates and forecasts inform the proactive deployment of additional sensors and detection logic, thereby closing the sense-making loop. All the while, humans are on the loop, rather than in it, permitting nuanced management of fast-acting automated measurement, detection, and inference engines. This paper motivates and conceptualizes analytics to facilitate this human-machine partnership.

  11. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    H -3 E Responsibilities of Defense Reutilization and Marketing Regions (D R M s...at Defense electronic products which produce radiation Reutilization and Marketing Offices, para- when energized. Among the principal radi- graph F... Sporting Equipment 7820 Games , Toys, and Wheeled Goods 7830 Recreational and Gymnastic Equipment 7910 Floor Polishers and Vacuum Cleaning Equipment

  12. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges; Rapport annuel 2004. Defense, securite, energie, information, sante. Le CEA au coeur des grands defis europeens

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-07-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  13. Point of Injury Sampling Technology for Battlefield Molecular Diagnostics

    Science.gov (United States)

    2011-11-14

    Injury" Sampling Technology for Battlefield Molecular Diagnostics November 14, 2011 Sponsored by Defense Advanced Research Projects Agency (DOD...Date of Contract: April 25, 2011 Short Title of Work: "Point of Injury" Sampling Technology for Battlefield Molecular Diagnostics " Contract...PHASE I FINAL REPORT: Point of Injury, Sampling Technology for Battlefield Molecular Diagnostics . W31P4Q-11-C-0222 (UNCLASSIFIED) P.I: Bernardo

  14. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  15. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Department of Defense Mentor...

    Science.gov (United States)

    2012-02-24

    ... Defense Mentor-Prot[eacute]g[eacute] Pilot Program (DFARS Case 2012-D024) AGENCY: Defense Acquisition... applications under the DoD Mentor-Prot[eacute]g[eacute] Pilot Program for new mentor-prot[eacute]g[eacute] agreements and the date mentors may incur costs and/or receive credit towards fulfilling their small business...

  16. Relationships Among Nightly Sleep Quality, Daily Stress, and Daily Affect.

    Science.gov (United States)

    Blaxton, Jessica M; Bergeman, Cindy S; Whitehead, Brenda R; Braun, Marcia E; Payne, Jessic D

    2017-05-01

    We explored the prospective, microlevel relationship between nightly sleep quality (SQ) and the subsequent day's stress on positive (PA) and negative affect (NA) as well as the moderating relationships between nightly SQ, subsequent stress, and subsequent PA on NA. We investigated whether age moderated these relationships. We collected 56 days of sleep, stress, and affect data using daily diary questionnaires (N = 552). We used multilevel modeling to assess relationships at the between- and within-person levels. Daily increases in SQ and decreases in stress interacted to predict higher daily PA and lower daily NA. Better SQ in older adults enhanced the benefits of PA on the stress-NA relationship more during times of low stress, whereas better sleep in younger adults enhanced the benefits of PA more during times of high stress. Between-person effects were stronger predictors of well-being outcomes than within-person variability. The combination of good SQ and higher PA buffered the impact of stress on NA. The moderating impact of age suggests that sleep and stress play different roles across adulthood. Targeting intervention and prevention strategies to improve SQ and enhance PA could disrupt the detrimental relationship between daily stress and NA. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  17. The Plant Ribosome-Inactivating Proteins Play Important Roles in Defense against Pathogens and Insect Pest Attacks

    Directory of Open Access Journals (Sweden)

    Feng Zhu

    2018-02-01

    Full Text Available Ribosome-inactivating proteins (RIPs are toxic N-glycosidases that depurinate eukaryotic and prokaryotic rRNAs, thereby arresting protein synthesis during translation. RIPs are widely found in various plant species and within different tissues. It is demonstrated in vitro and in transgenic plants that RIPs have been connected to defense by antifungal, antibacterial, antiviral, and insecticidal activities. However, the mechanism of these effects is still not completely clear. There are a number of reviews of RIPs. However, there are no reviews on the biological functions of RIPs in defense against pathogens and insect pests. Therefore, in this report, we focused on the effect of RIPs from plants in defense against pathogens and insect pest attacks. First, we summarize the three different types of RIPs based on their physical properties. RIPs are generally distributed in plants. Then, we discuss the distribution of RIPs that are found in various plant species and in fungi, bacteria, algae, and animals. Various RIPs have shown unique bioactive properties including antibacterial, antifungal, antiviral, and insecticidal activity. Finally, we divided the discussion into the biological roles of RIPs in defense against bacteria, fungi, viruses, and insects. This review is focused on the role of plant RIPs in defense against bacteria, fungi, viruses, and insect attacks. The role of plant RIPs in defense against pathogens and insects is being comprehended currently. Future study utilizing transgenic technology approaches to study the mechanisms of RIPs will undoubtedly generate a better comprehending of the role of plant RIPs in defense against pathogens and insects. Discovering additional crosstalk mechanisms between RIPs and phytohormones or reactive oxygen species (ROS against pathogen and insect infections will be a significant subject in the field of biotic stress study. These studies are helpful in revealing significance of genetic control that can

  18. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2014-12-01

    Full Text Available Here we report on the issue of Advanced Persistent Threats (APT, which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

  19. Daily medication routine of adolescents with HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Cristiane Cardoso de Paula

    2013-12-01

    Full Text Available The objective of this study was to describe the sociodemographic, clinical, and behavioral characteristics of the daily medication routine of adolescents with HIV/AIDS of ages 13 to 19 years, followed at a reference service. This descriptive cross-sectional study was performed with 23 adolescents, using a quantitative approach. Data were collected using a form during appointments at the outpatient clinic. Univariate analysis revealed: females, in the initial phase of adolescence, and vertical transmission. The highlights were: lack of assiduity to appointments; unprotected sex; and consumption of alcohol. Regarding the daily medication routine, subjects depend on their parents or guardians, use strategies to remember to take the medications, and are unaware about the laboratory test for disease management and treatment. There is a need for educative intervention using information and communication technology, such as the Internet, to promote health and autonomy among adolescents. Descriptors: Acquired Immunodeficiency Syndrome; Adolescent Health; Antiretroviral Therapy, Highly Active; Nursing.

  20. Polyphenol Oxidase as a Biochemical Seed Defense Mechanism

    Directory of Open Access Journals (Sweden)

    E. Patrick Fuerst

    2014-12-01

    Full Text Available Seed dormancy and resistance to decay are fundamental survival strategies, which allow a population of seeds to germinate over long periods of time. Seeds have physical, chemical, and biological defense mechanisms that protect their food reserves from decay-inducing organisms and herbivores. Here, we hypothesize that seeds also possess enzyme-based biochemical defenses, based on induction of the plant defense enzyme, polyphenol oxidase (PPO, when wild oat (Avena fatua L. caryopses and seeds were challenged with seed-decaying Fusarium fungi. These studies suggest that dormant seeds are capable of mounting a defense response to pathogens. The pathogen-induced PPO activity from wild oat was attributed to a soluble isoform of the enzyme that appeared to result, at least in part, from proteolytic activation of a latent PPO isoform. PPO activity was also induced in wild oat hulls (lemma and palea, non-living tissues that cover and protect the caryopsis. These results are consistent with the hypothesis that seeds possess inducible enzyme-based biochemical defenses arrayed on the exterior of seeds and these defenses represent a fundamental mechanism of seed survival and longevity in the soil. Enzyme-based biochemical defenses may have broader implications since they may apply to other defense enzymes as well as to a diversity of plant species and ecosystems.

  1. Technological Implications for Assessment Ecosystems: Opportunities for Digital Technology to Advance Assessment

    Science.gov (United States)

    Behrens, John T.; DiCerbo, Kristen E.

    2014-01-01

    Background: It would be easy to think the technological shifts in the digital revolution are simple incremental progressions in societal advancement. However, the nature of digital technology is resulting in qualitative differences in nearly all parts of daily life. Purpose: This paper investigates how the new possibilities for understanding,…

  2. Travel Daily China Travel Innovation Summit to Be Held in Beijing

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    Guangzhou,China,April 7th- TravelDaily (www.traveldaily.cn), China’s leading online publisher and event organizer with emphasis on trends in the distribution,marketing and technology of the travel and tourism industries,today announced it will partner with PhoCusWright to host the 2009 China Travel Innovation Summit in Beijing from May 12 to 13,2009.

  3. 75 FR 43156 - Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-07-23

    ... DEPARTMENT OF DEFENSE Office of the Secretary Federal Advisory Committee; Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the... Defense announces that the Missile Defense Advisory Committee will meet on August 4 and 5, 2010, in...

  4. Defense Agencies Cash Management in the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Lane, F

    1997-01-01

    The primary audit objective was to determine whether the Fund Balance With Treasury Account on the Consolidated Financial Statements of the Defense Business Operations Fund for FY 1996 was presented...

  5. Development of a Proxy-Free Objective Assessment Tool of Instrumental Activities of Daily Living in Mild Cognitive Impairment Using Smart Home Technologies.

    Science.gov (United States)

    Jekel, Katrin; Damian, Marinella; Storf, Holger; Hausner, Lucrezia; Frölich, Lutz

    2016-01-01

    The assessment of activities of daily living (ADL) is essential for dementia diagnostics. Even in mild cognitive impairment (MCI), subtle deficits in instrumental ADL (IADL) may occur and signal a higher risk of conversion to dementia. Thus, sensitive and reliable ADL assessment tools are important. Smart homes equipped with sensor technology and video cameras may provide a proxy-free assessment tool for the detection of IADL deficits. The aim of this paper is to investigate the potential of a smart home environment for the assessment of IADL in MCI. The smart home consisted of a two-room flat equipped with activity sensors and video cameras. Participants with either MCI or healthy controls (HC) had to solve a standardized set of six tasks, e.g., meal preparation, telephone use, and finding objects in the flat. MCI participants needed more time (1384 versus 938 seconds, p smart home technologies offer the chance for an objective and ecologically valid assessment of IADL. It can be analyzed not only whether a task is successfully completed but also how it is completed. Future studies should concentrate on the development of automated detection of IADL deficits.

  6. Technology applications bulletins

    International Nuclear Information System (INIS)

    Koncinski, W. Jr.

    1989-02-01

    Martin Marietta Energy Systems, Inc. (Energy Systems), operates five facilities for the US Department of Energy (DOE): the Oak Ridge National Laboratory (ORNL), which is a large, multidisciplinary research and development (R and D) center whose primary mission is energy research; the Oak Ridge Y-12 Plant, which engages in defense research, development, and production; and the uranium-enrichment plants at Oak Ridge; Paducah, Kentucky; and Portsmouth, Ohio. Much of the research carried out at these facilities is of interest to industry and to state or local governments. To make information about this research available, the Energy Systems Office of Technology Applications publishes brief descriptions of selected technologies and reports. These technology applications bulletins describe the new technology and inform the reader about how to obtain further information, gain access to technical resources, and initiate direct contact with Energy Systems researchers

  7. Soviet civil defense is inadequate and meaningless

    International Nuclear Information System (INIS)

    Kaplan, F.M.

    1985-01-01

    In this paper, the author argues that Soviet civil defense plans exist primarily on paper and are used to pacify the Soviet people, not as plans to survive and prevail in a nuclear confrontation with the U.S. The author describes how the Soviet people have little faith in the civil defense programs. They don't believe they can survive an attack. Furthermore, he says the Soviets have never staged an evacuation exercise in any major city nor, even in smaller towns, has an entire community been evacuated. The author says there are numerous problems with the shelter programs as well. Very few existing shelters have any food stocks, only a few more have any water. There is little evidence that Soviet leaders have planned their economy with civil defense in mind. Nor - given the blatant inadequacies of Soviet civil defense programs, the marked vulnerabilities of the Soviet economy, and the intrinsic limitation and uncertainties about civil defense generally - is there much basis for claiming that Soviet leaders, even in desperate straits, would risk war with the United States while counting on civil defense measures to limit the damage wreaked on the Soviet Union

  8. 2017 Air Force Global Strike Command Innovation and Technology Symposium

    Science.gov (United States)

    2017-11-15

    and technological changes that may have occurred within American society and therefore may have different expectations, motivations and values...Participate in a discussion on hypersonic technology as a national imperative and what are government, industry and academia doing to accelerate this...USAF Deputy Chief, Weapons Requirements Division HAF/A5RW Mr. Robert B. Addis Defense Technologies Engineering Division, Lawrence Livermore National

  9. Management Data Used to Manage the Defense Logistics Agency Supply Management Division of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    1994-01-01

    The Defense Logistics Agency Supply Management Division (the Division) of the Defense Business Operations Fund provides supplies and logistics services to DoD Components and other (Government agencies...

  10. Planetary Defense is More Than Science and Technology: Policy, People, and Disaster Management

    Science.gov (United States)

    Harrison, A. A.

    2009-12-01

    Physical scientists and engineers who work to identify and then deflect or destroy threatening Near Earth Objects deserve the support of colleagues who have a thorough understanding of human psychology, society and culture. Behavioral and social scientists can help build governmental and public support for vigorous and comprehensive programs of planetary defense as well as apply their work to minimize the human cost of NEO threats and impacts. Tasks include preparing the public for a succession of possible threats of differing levels; developing effective warning and evacuation strategies; and supporting residents of affected areas during the impact and recovery phases. Although much can be learned from the pre-existing disaster literature, it is important to remain mindful of differences between asteroid or comet impacts and other natural disasters such as hurricanes and earthquakes. After identifying widespread but erroneous stereotypes that exaggerate human weakness and interfere with effective disaster planning, we turn to models whereby international, national, and regional organizations help local communities and citizens develop the skills, attitudes and resources that they need to help protect their own welfare. These models view residents of disaster areas as part of the solution as well as part of the problem, acknowledge dangers and disruptions outside of the immediate impact area, and demand high sensitivity to political and cultural issues. We conclude with a brief discussion of strategies for preserving the human legacy under worst-case scenarios including the construction and administration of survival communities and sending time capsules into space. Anthropology, political science, psychology and sociology are already contributing to astrobiology and SETI, and it is time for researchers and practitioners in these areas to become conspicuous partners in the pursuit of planetary defense.

  11. Status of defense radioactive waste disposal activities

    International Nuclear Information System (INIS)

    Wade, T.W.

    1988-01-01

    The Office of Defense Programs, U.S. Department of Energy, is responsible for the production of nuclear weapons and materials for national defense. As a byproduct to their activities, nuclear production facilities have generated, and will continue to generate, certain radioactive, hazardous, or mixed wastes that must be managed and disposed of in a safe and cost-effective manner. Compliance with all applicable Federal and State regulations is required. This paper describes the principal elements that comprise Defense Programs' approach to waste management and disposal. The status of high-level, transuranic, and low-level radioactive waste disposal is set forth. Defense Programs' activities in connection with the environmental restoration of inactive facilities and with the safe transport of waste materials are summarized. Finally, the principal challenges to realizing the goals set for the defense waste program are discussed in terms of regulatory, public acceptance, technical, and budget issues

  12. Plant antiherbivore defenses in Fabaceae species of the Chaco.

    Science.gov (United States)

    Lima, T E; Sartori, A L B; Rodrigues, M L M

    2017-01-01

    The establishment and maintenance of plant species in the Chaco, one of the widest continuous areas of forests in the South American with sharp climatic variations, are possibly related to biological features favoring plants with particular defenses. This study assesses the physical and chemical defenses mechanisms against herbivores of vegetative and reproductive organs. Its analyses of 12 species of Fabaceae (Leguminosae) collected in remnants of Brazilian Chaco shows that 75% present structural defense characters and 50% have chemical defense - defense proteins in their seeds, like protease inhibitors and lectins. Physical defenses occur mainly on branches (78% of the species), leaves (67%), and reproductive organs (56%). The most common physical characters are trichomes and thorns, whose color represents a cryptic character since it does not contrast with the other plant structures. Defense proteins occur in different concentrations and molecular weight classes in the seeds of most species. Protease inhibitors are reported for the first time in seeds of: Albizia niopoides, Anadenanthera colubrina, Mimosa glutinosa, Prosopis rubriflora, and Poincianella pluviosa. The occurrence of physical and chemical defenses in members of Fabaceae indicate no associations between defense characters in these plant species of the Chaco.

  13. Terrorism drives Bush R&D money to defense and NIH; other science funding flat in Fiscal 2003

    CERN Multimedia

    Dawson, J

    2002-01-01

    The 2003 budget proposal includes nearly 112 billion dollars for science and technology, the highest R&D budget ever proposed. However it is so heavily weighted towards the National Institutes of Health and the Dept. of Defense, that funding of many including physics, is essentially left flat (7 pages).

  14. Combining Radar and Daily Precipitation Data to Estimate Meaningful Sub-daily Precipitation Extremes

    Science.gov (United States)

    Pegram, G. G. S.; Bardossy, A.

    2016-12-01

    Short duration extreme rainfalls are important for design. The purpose of this presentation is not to improve the day by day estimation of precipitation, but to obtain reasonable statistics for the subdaily extremes at gauge locations. We are interested specifically in daily and sub-daily extreme values of precipitation at gauge locations. We do not employ the common procedure of using time series of control station to determine the missing data values in a target. We are interested in individual rare events, not sequences. The idea is to use radar to disaggregate daily totals to sub-daily amounts. In South Arica, an S-band radar operated relatively continuously at Bethlehem from 1998 to 2003, whose scan at 1.5 km above ground [CAPPI] overlapped a dense (10 km spacing) set of 45 pluviometers recording in the same 6-year period. Using this valuable set of data, we are only interested in rare extremes, therefore small to medium values of rainfall depth were neglected, leaving 12 days of ranked daily maxima in each set per year, whose sum typically comprised about 50% of each annual rainfall total. The method presented here uses radar for disaggregating daily gauge totals in subdaily intervals down to 15 minutes in order to extract the maxima of sub-hourly through to daily rainfall at each of 37 selected radar pixels [1 km square in plan] which contained one of the 45 pluviometers not masked out by the radar foot-print. The pluviometer data were aggregated to daily totals, to act as if they were daily read gauges; their only other task was to help in the cross-validation exercise. The extrema were obtained as quantiles by ordering the 12 daily maxima of each interval per year. The unusual and novel goal was not to obtain the reproduction of the precipitation matching in space and time, but to obtain frequency distributions of the gauge and radar extremes, by matching their ranks, which we found to be stable and meaningful in cross-validation tests. We provide and

  15. Priming Arabidopsis for defense : Molecular and ecological aspects

    NARCIS (Netherlands)

    van Hulten, M.H.A.

    2009-01-01

    Plants are capable to enhance basal defense strategies against harmful organisms upon the perception of certain stimuli. This enhanced resistance is not necessarily accompanied by direct activation of defenses, but often depends on a sensitization of the plant tissue to express defenses faster

  16. Status of DOE defense waste management policy

    International Nuclear Information System (INIS)

    Oertel, K.G.; Scott, R.S.

    1983-01-01

    This paper very briefly traces the statutory basis for DOE management of atomic energy defense activity wastes, touches on the authority of the Federal agencies involved in the regulation of defense nuclear waste management, and addresses the applicable regulations and their status. This background sets the stage for a fairly detailed discussion of management and disposal strategies of the Defense Waste and Byproducts Management Program

  17. Information Technology Management: Reporting of DoD Capital Investments for Information Technology in Support of the FY 2006 Budget Submission

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Shaffer, Robert L; Leighton, George A; Johnson, Robert R; Brunetti, Tina N; Courtade, Rebecca S; Woodruff, Courtney E; Buscaigio, James J; Gavura, Cindy L

    2005-01-01

    Who Should Read This Report and Why? DoD managers preparing and certifying capital investment justifications for information technology should read this report to improve the quality of data being submitted by the Department of Defense...

  18. Defense styles explain psychiatric symptoms: an empirical study.

    Science.gov (United States)

    Holi, M M; Sammallahti, P R; Aalberg, V A

    1999-11-01

    To examine the relation between psychiatric symptoms and defense mechanisms, we administered two questionnaires, the Symptom Check-list 90 (SCL-90) and the Defense Style Questionnaire (DSQ) to 122 psychiatric out-patients and to a community sample of 337 subjects. Using regression analysis, we found that 51.8% of the variation in subject's Global Severity Index value could be explained by his defense style. Of the three defense styles, the immature style explained most of the variation in the symptoms. We found little overall evidence for specific connections between particular defenses and symptoms. Projection and dissociation were central in most of the symptom dimensions. We compared patients and controls with the same level of general symptom severity and found that patients used significantly more devaluation and splitting, and controls used significantly more altruism and idealization. Whether defenses predispose to certain symptomatology or are one of its aspects is discussed.

  19. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    DR Decision Review DRMO Defense Reutilization Marketing Office DRPM Direct Reporting Program Manager DSAA Defense Security Assistance Agency...STE Special Test Equipment STEP Simulation, Test, and Evaluation Process STLDD Software Top Level Design Document STP Software Test Plan STPR...established catalog or market prices for specific tasks under standard commercial terms and conditions; this does not include services sold based

  20. 75 FR 77849 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  1. 75 FR 77848 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2010-12-14

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice. SUMMARY: Under the... Defense announces that the following Federal advisory committee meeting of the Missile Defense Advisory...

  2. Technology transfer of Cornell university

    International Nuclear Information System (INIS)

    Yoo, Wan Sik

    2010-01-01

    This book introduces technology transfer of Cornell university which deals with introduction of Cornell university, composition of organization and practice of technology transfer : a research contract, research perform, invention report, evaluation and succession of invention, a patent application and management, marketing, negotiation and writing contract, management of contract, compensation, result of technology transfer, cases of success on technical commercialization and daily life of technology transfer center.

  3. Defense program pushes microchip frontiers

    Science.gov (United States)

    Julian, K.

    1985-05-01

    The very-high-speed integrated circuit (VHSIC) program of the Department of Defense will have a significant effect on the expansion of integrated circuit technology. This program, which is to cost several hundred million dollars, is accelerating the trend toward higher-speed, denser circuitry for microchips through innovative design and fabrication techniques. Teams in six different American companies are to design and fabricate a military useful 'brassboard' system which would employ chips developed in the first phase of the VHSIC program. Military objectives envisaged include automatic monitoring of displays in tactical aircraft by means of an artificial intelligence system, a brassboard used in airborne electronic warfare system, and antisubmarine warfare applications. After a fivefold improvement in performance achieved in the first phase, the second phase is concerned with a further 20-fold increase. The entire VHSIC program is, therefore, to produce a 100-fold gain over the state of the art found when the program started.

  4. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  5. Channeling the Innovation Stream: A Decision Framework for Selecting Emerging Technologies

    Science.gov (United States)

    Sauer, Philip S.

    2010-01-01

    The proliferation of emerging technologies offers opportunity but also presents challenges to defense acquisition decision makers seeking to incorporate those technologies as part of the acquisition process. Assessment frameworks and methodologies found in the literature typically address the primary focus of a sponsoring organization's interest…

  6. Advanced Optical Technologies for Defense Trauma and Critical Care

    National Research Council Canada - National Science Library

    Berns, Michael W

    2008-01-01

    ...: High Resolution F-OCT and MPM/SHG Imaging of the Oral-Nasal Cavity Diffuse Optical Spectroscopy in Critical Patient Medicine, Optical Therapeutics in Cartilage for the Treatment of Traumatic Injuries and Degenerative Disease, Advanced Optical Technologies for Orthopedic Applications.

  7. Photovoltaics in the Department of Defense

    International Nuclear Information System (INIS)

    Chapman, R.N.

    1997-01-01

    This paper documents the history of photovoltaic use within the Department of Defense leading up to the installation of 2.1 MW of photovoltaics underway today. This history describes the evolution of the Department of Defense's Tri-Service Photovoltaic Review Committee and the committee's strategic plan to realize photovoltaic's full potential through outreach, conditioning of the federal procurement system, and specific project development. The Photovoltaic Review Committee estimates photovoltaic's potential at nearly 4,000 MW, of which about 700 MW are considered to be cost-effective at today's prices. The paper describes photovoltaic's potential within the Department of Defense, the status and features of the 2.1-MW worth of photovoltaic systems under installation, and how these systems are selected and implemented. The paper also documents support provided to the Department of Defense by the Department of Energy dating back to the late 70s. copyright 1997 American Institute of Physics

  8. Mobile technology aids law enforcement in identifying forgeries in record management systems

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Arizona Law Enforcement Mobile Identification Technology for Law Enforcement” As the technology program manager with the Arizona Criminal Justice Commission, Bill Kalaf is using his time at...

  9. NVLAP activities at Department of Defense calibration laboratories

    Energy Technology Data Exchange (ETDEWEB)

    Schaeffer, D.M. [Defense Nuclear Agency, Alexandria, VA (United States)

    1993-12-31

    There are 367 active radiological instrument calibration laboratories within the U.S. Department of Defense (DoD). Each of the four services in DoD manages, operates, and certifies the technical proficiency and competency of those laboratories under their cognizance. Each service has designated secondary calibration laboratories to trace all calibration source standards to the National Institute of Standards and Technology. Individual service radiological calibration programs and capabilities, present and future, are described, as well as the measurement quality assurance (MQA) processes for their traceability. National Voluntary Laboratory Accreditation Program (NVLAP) programs for dosimetry systems are briefly summarized. Planned NVLAP accreditation of secondary laboratories is discussed in the context of current technical challenges and future efforts.

  10. NVLAP activities at Department of Defense calibration laboratories

    International Nuclear Information System (INIS)

    Schaeffer, D.M.

    1993-01-01

    There are 367 active radiological instrument calibration laboratories within the U.S. Department of Defense (DoD). Each of the four services in DoD manages, operates, and certifies the technical proficiency and competency of those laboratories under their cognizance. Each service has designated secondary calibration laboratories to trace all calibration source standards to the National Institute of Standards and Technology. Individual service radiological calibration programs and capabilities, present and future, are described, as well as the measurement quality assurance (MQA) processes for their traceability. National Voluntary Laboratory Accreditation Program (NVLAP) programs for dosimetry systems are briefly summarized. Planned NVLAP accreditation of secondary laboratories is discussed in the context of current technical challenges and future efforts

  11. Energy and technology review

    International Nuclear Information System (INIS)

    Brown, P.S.

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base

  12. Nuclear industry technology boomerang

    International Nuclear Information System (INIS)

    Scholler, R.W.

    1987-01-01

    The benefits to the medical, pharmaceutical, semiconductor, computer, video, bioscience, laser, defense, and numerous high-tech industries from nuclear technology development fallout are indeed numerous and increase every day. Now those industries have made further progress and improvements that, in return, benefit the nuclear industry. The clean-air and particle-free devices and enclosures needed for protection and decontamination are excellent examples

  13. Defense mechanisms in schizotypal, borderline, antisocial, and narcissistic personality disorders.

    Science.gov (United States)

    Perry, J Christopher; Presniak, Michelle D; Olson, Trevor R

    2013-01-01

    Numerous authors have theorized that defense mechanisms play a role in personality disorders. We reviewed theoretical writings and empirical studies about defenses in schizotypal, borderline, antisocial, and narcissistic personality disorders, developing hypotheses about these differential relationships. We then examined these hypotheses using dynamic interview data rated for defenses in a study of participants (n = 107) diagnosed with these four personality disorder types. Overall, the prevalence of immature defenses was substantial, and all four disorders fit within the broad borderline personality organization construct. Defenses predicted the most variance in borderline and the least variance in schizotypal personality disorder, suggesting that dynamic factors played the largest role in borderline and the least in schizotypal personality. Central to borderline personality were strong associations with major image-distorting defenses, primarily splitting of self and other's images, and the hysterical level defenses, dissociation and repression. Narcissistic and antisocial personality disorders shared minor image-distorting defenses, such as omnipotence or devaluation, while narcissistic also used splitting of self-images and antisocial used disavowal defenses like denial. Overall, differential relationships between specific defenses and personality disorder types were largely consistent with the literature, and consistent with the importance that the treatment literature ascribes to working with defenses.

  14. Coordination of environmental restoration and waste management and foreign country technologies and needs

    International Nuclear Information System (INIS)

    Colburn, S.J.; Wilkenson, W.J.; Stitt, D.H.; Snipes, R.L.

    1993-01-01

    Oak Ridge National Laboratory (ORNL) investigated foreign technologies for the International Technology Exchange Division (ITED) that could be matched with possible hosts for demonstrations. At least one international technology demonstration at a Department of Defense (DoD) site in European country was planned. Efforts were made to coordinate cooperative technology demonstrations between the Department of Energy (DOE) and Taiwan

  15. Energy technology review, July--August 1991

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, K.C. (ed.)

    1991-01-01

    This issue of Energy Technology Review'' gives the annual review of the programs at Lawrence Livermore National Laboratory. This State of the Laboratory issue includes discussions of all major programs: Defense Systems; Laser Research; Magnetic Fusion Energy; Energy and Earth Sciences; Environmental Technology Program; Biomedical and Environmental Science; Engineering; Physics; Chemistry and Materials Science; Computations; and Administrative and Institutional Services. An index is also given of the 1991 achievements with contact names and telephone number.

  16. User modeling and adaptation for daily routines providing assistance to people with special needs

    CERN Document Server

    Martín, Estefanía; Carro, Rosa M

    2013-01-01

    User Modeling and Adaptation for Daily Routines is motivated by the need to bring attention to how people with special needs can benefit from adaptive methods and techniques in their everyday lives. Assistive technologies, adaptive systems and context-aware applications are three well-established research fields. There is, in fact, a vast amount of literature that covers HCI-related issues in each area separately. However, the contributions in the intersection of these areas have been less visible, despite the fact that such synergies may have a great impact on improving daily living.Presentin

  17. Should the Department of Defense Transfer the Defense Logistics Agency's Map Functions to the Defense Working Capital Fund

    National Research Council Canada - National Science Library

    Zimmerman, Donald

    2000-01-01

    .... The functions cost about $25 million annually and are funded by operations and maintenance (O&M) dollars. This study analyzed if the functions should be transferred to the Defense Working Capital Fund...

  18. Associations among daily stressors and salivary cortisol: findings from the National Study of Daily Experiences.

    Science.gov (United States)

    Stawski, Robert S; Cichy, Kelly E; Piazza, Jennifer R; Almeida, David M

    2013-11-01

    While much research has focused on linking stressful experiences to emotional and biological reactions in laboratory settings, there is an emerging interest in extending these examinations to field studies of daily life. The current study examined day-to-day associations among naturally occurring daily stressors and salivary cortisol in a national sample of adults from the second wave of the National Study of Daily Experiences (NSDE). A sample of 1694 adults (age=57, range=33-84; 44% male) completed telephone interviews detailing their stressors and emotions on eight consecutive evenings. Participants also provided saliva samples upon waking, 30min post-waking, before lunch and before bed, on four consecutive interview days resulting in 5995 days of interview/cortisol data. Analyses revealed three main findings. First, cortisol AUC was significantly higher on stressor days compared to stressor-free days, particularly for arguments and overloads at home, suggesting that daily stressors are associated with increased cortisol output, but that not all daily stressors have such an influence. Second, individuals reporting a greater frequency of stressor days also exhibited a steeper diurnal cortisol slope. Finally, daily stressor-cortisol associations were unaltered after adjustment for daily negative affect and physical symptoms. Our discussion focuses on the influence of naturally occurring daily stressors on daily cortisol and the role of daily diary approaches for studying healthy cortisol responses to psychosocial stressors outside of traditional laboratory settings. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Associations among Daily Stressors and Salivary Cortisol: Findings from the National Study of Daily Experiences

    Science.gov (United States)

    Stawski, Robert S.; Cichy, Kelly E.; Piazza, Jennifer R.; Almeida, David M.

    2013-01-01

    While much research has focused on linking stressful experiences to emotional and biological reactions in laboratory settings, there is an emerging interest in extending these examinations to field studies of daily life. The current study examined day-to-day associations among naturally-occurring daily stressors and salivary cortisol in a national sample of adults from the second wave of the National Study of Daily Experiences (NSDE). A sample of 1,694 adults (Age=57, Range=33–84; 44% male) completed telephone interviews detailing their stressors and emotions on eight consecutive evenings. Participants also provided saliva samples upon waking, 30 minutes post-waking, before lunch and before bed, on four consecutive interview days resulting in 5,995 days of interview/cortisol data. Analyses revealed three main findings. First, cortisol AUC was significantly higher on stressor days compared to stressor-free days, particularly for arguments and overloads at home, suggesting that daily stressors are associated with increased cortisol output, but that not all daily stressors have such an influence. Second, individuals reporting a greater frequency of stressor days also exhibited a steeper diurnal cortisol slope. Finally, daily stressor-cortisol associations were unaltered after adjustment for daily negative affect and physical symptoms. Our discussion focuses on the influence of naturally-occurring daily stressors on daily cortisol and the role of daily diary approaches for studying healthy cortisol responses to psychosocial stressors outside of traditional laboratory settings. PMID:23856186

  20. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  1. Treatment of streptococcal pharyngitis with once-daily compared with twice-daily amoxicillin: a noninferiority trial.

    Science.gov (United States)

    Clegg, Herbert W; Ryan, Amy G; Dallas, Steven D; Kaplan, Edward L; Johnson, Dwight R; Norton, H James; Roddey, Oliver F; Martin, Edward S; Swetenburg, Raymond L; Koonce, Elizabeth W; Felkner, Mary M; Giftos, P Michael

    2006-09-01

    Two relatively small previous studies comparing once-daily amoxicillin with conventional therapy for group A streptococcal (GAS) pharyngitis reported similar rates of bacteriologic success for each treatment group. The purpose of this study was to further evaluate once-daily amoxicillin for GAS pharyngitis in a larger study. In a single pediatric practice, from October through May for 2 consecutive years (2001-2003), we recruited children 3 to 18 years of age who had symptoms and signs suggestive of GAS pharyngitis. Patients with a positive rapid test for GAS were stratified by weight (or=40 kg) and then randomly assigned to receive once-daily (750 mg or 1000 mg) or twice-daily (2 doses of 375 mg or 500 mg) amoxicillin for 10 days. We determined bacteriologic failure rates for GAS in the pharynx from subsequent swabs taken at 14 to 21 (visit 2) and 28 to 35 (visit 3) days after treatment initiation. We conducted a randomized, controlled, investigator-blinded, noninferiority trial to evaluate whether amoxicillin given once daily would have a bacteriologic failure rate no worse than that of amoxicillin given twice daily within a prespecified margin of 10%. GAS isolates were characterized to distinguish bacteriologic failures from new acquisitions. Adverse events were described and adherence was evaluated by review of returned daily logs and dosage bottles. Of 2139 potential study patients during the 2-year period, we enrolled 652 patients, 326 into each treatment group. Children in the 2 groups were comparable with respect to all demographic and clinical characteristics except that children <40 kg more often presented with rash in each treatment group. At visit 2, failure rates were 20.1% (59 of 294) for the once-daily group and 15.5% (46 of 296) for the twice-daily group (difference, 4.53%; 90% confidence interval [CI], -0.6 to 9.7). At visit 3, failure rates were 2.8% (6 of 216) for the once-daily group and 7.1% (16 of 225) for the twice-daily group (difference, -4

  2. Disproportionality in Daily Metal Detector Student Searches in U.S. Public Schools

    Science.gov (United States)

    Gastic, Billie; Johnson, Dominique

    2015-01-01

    While the effectiveness of metal detectors to improve school safety remains debated, many public schools continue to rely on this technology to control school violence. Among them is the 1% of public schools where students are searched on a daily basis by metal detector. This study examines the school-level risk factors associated with daily…

  3. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  4. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  5. The use of assistive technology for cognition to support the performance of daily activities for individuals with cognitive disabilities due to traumatic brain injury: The current state of the research.

    Science.gov (United States)

    Leopold, Anne; Lourie, Anna; Petras, Hanno; Elias, Eileen

    2015-01-01

    Many individuals with traumatic brain injury (TBI) are young and could have many years of productivity ahead of them. However, cognitive impairments may hinder individuals' ability to perform daily tasks. Assistive technology for cognition (ATC) can be effective in helping compensate for cognitive impairments. This study examined the current state of the research on using ATCs to support daily activities for individuals with cognitive disabilities that are due to TBI. A comprehensive systematic literature search was performed to identify peer-reviewed articles published between 2000 and 2015. To evaluate the nature of the research, qualitative data were extracted pertaining to recruitment, participant characteristics, intervention design, type of ATCs and their functions, matching individuals with ATCs, training for using the ATC, and outcomes. Research examining the effectiveness of ATCs as everyday compensatory tools for cognitive impairments that are due to TBI is limited. The majority of studies were case studies or quasi-experimental studies with small sample sizes. Studies showed positive associations between use of ATCs and individuals' abilities to perform tasks regardless of age, TBI severity, and time since injury. Future research should assess the match between the individual and the technology, study the impact of training on using ATCs, and analyze the usability of ATCs.

  6. Transitions in the wrong direction? Digital technologies and daily life

    DEFF Research Database (Denmark)

    Røpke, Inge; Christensen, Toke Haunstrup

    2013-01-01

    The environmental implications of information and communication technology (ICT) have been the subject of study since the early 1990s. Although previous research covers energy issues quite extensively, the treatment of the energy impacts of ICT integration in everyday life is still inadequate. Th...

  7. 76 FR 65186 - Request for Public Comments on How the Department of Defense Can Improve the Way It Procures...

    Science.gov (United States)

    2011-10-20

    ... Under Secretary of Defense for Acquisition, Technology and Logistics (OUSD(AT&L)) to seek information.... However, the application of the pricing principles in Federal Acquisition Regulation (FAR) parts 15 and 31... item. Direct costs associated with meeting a foreign customer's additional or unique requirements are...

  8. Nanomaterials and future aerospace technologies: opportunities and challenges

    Science.gov (United States)

    Vaia, Richard A.

    2012-06-01

    Two decades of extensive investment in nanomaterials, nanofabrication and nanometrology have provided the global engineering community a vast array of new technologies. These technologies not only promise radical change to traditional industries, such as transportation, information and aerospace, but may create whole new industries, such as personalized medicine and personalized energy harvesting and storage. The challenge today for the defense aerospace community is determining how to accelerate the conversion of these technical opportunities into concrete benefits with quantifiable impact, in conjunction with identifying the most important outstanding scientific questions that are limiting their utilization. For example, nanomaterial fabrication delivers substantial tailorablity beyond a traditional material data sheet. How can we integrate this tailorability into agile manufacturing and design methods to further optimize the performance, cost and durability of future resilient aerospace systems? The intersection of nano-based metamaterials and nanostructured devices with biotechnology epitomizes the technological promise of autonomous systems and enhanced human-machine interfaces. What then are the key materials and processes challenges that are inhibiting current lab-scale innovation from being integrated into functioning systems to increase effectiveness and productivity of our human resources? Where innovation is global, accelerating the use of breakthroughs, both for commercial and defense, is essential. Exploitation of these opportunities and finding solutions to the associated challenges for defense aerospace will rely on highly effective partnerships between commercial development, scientific innovation, systems engineering, design and manufacturing.

  9. Plutonium stabilization and storage research in the DNFSB 94-1 core technology program

    International Nuclear Information System (INIS)

    Eller, P.G.; Avens, L.R.; Roberson, G.D.

    1998-04-01

    Recommendation 94-1 of the Defense Nuclear Facility Safety Board (DNFSB) addresses legacy actinide materials left in the US nuclear defense program pipeline when the production mission ended in 1989. The Department of Energy (DOE) Implementation Plan responding to this recommendation instituted a Core Technology program to augment the knowledge base about general chemical and physical processing and storage behavior and to assure safe interim nuclear material storage, until disposition policies are formulated. The Core Technology program focuses on plutonium, in concert with a complex-wide applied R/D program administered by Los Alamos National Laboratory. This paper will summarize the Core Technology program's first two years, describe the research program for FY98, and project the overall direction of the program in the future

  10. Technological Literacy for Teachers

    Science.gov (United States)

    Hasse, Cathrine

    2017-01-01

    Ongoing developments in educational technologies place increasing demands on teachers who have to make decisions on a daily basis concerning how, when, and where to make use of technologies in classrooms. Building on results from the Danish project Technucation, this paper argues that there is a marked need for a teacher-specific version of the…

  11. Energy and technology review

    International Nuclear Information System (INIS)

    Stowers, I.F.; Crawford, R.B.; Esser, M.A.; Lien, P.L.; O'Neal, E.; Van Dyke, P.

    1982-07-01

    The state of the laboratory address by LLNL Director Roger Batzel is summarized, and a breakdown of the laboratory funding is given. The Livermore defense-related committment is described, including the design and development of advanced nuclear weapons as well as research in inertial confinement fusion, nonnuclear ordnance, and particle beam technology. LLNL is also applying its scientific and engineering resources to the dual challenge of meeting future energy needs without degrading the quality of the biosphere. Some representative examples are given of the supporting groups vital for providing the specialized expertise and new technologies required by the laboratory's major research programs

  12. Analysis of UREX+1a and Pyroprocessing Technologies from Safeguards Aspects

    International Nuclear Information System (INIS)

    Musembi, Mutava Victor; Jeong, Seung Young; Kwon, Eun Ha

    2013-01-01

    Various advanced and more easily safeguard-able reprocessing technologies have been proposed and are currently at different stages of development. This paper briefly analyses two proposed next generation reprocessing technologies, i. e. UREX+1a and pyroprocessing. It goes on to suggest various measures that can be taken to safeguard these technologies against nuclear proliferation. Due to the significant proliferation risks associated with PUREX, more proliferation resistant technologies are required in spent fuel reprocessing. UREX+1a and pyroprocessing can be suitable replacements since Pu is not separated from other TRUs after reprocessing. Implementations of technology specific safeguard measures can help enhance the proliferation resistance of these technologies. Since there is no technology which is foolproof, a MUF uncertainty estimation/quantification technology needs to be developed. These uncertainty estimates can then be used in a safeguards probabilistic risk assessment (PRA) system to quantify the risks associated with a particular reprocessing technology. To further safeguard these technologies, additional safeguard measures are needed for defense in depth. This may include implementation of multiple, independent, and redundant layers of defense such that no single layer, no matter how robust, is solely relied upon. Quantification of safeguard uncertainties related to UREX+1a and pyroprocessing can be used to benchmark these technologies against PUREX and between themselves for policy making

  13. Analysis of UREX+1a and Pyroprocessing Technologies from Safeguards Aspects

    Energy Technology Data Exchange (ETDEWEB)

    Musembi, Mutava Victor [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of); Jeong, Seung Young [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kwon, Eun Ha [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-10-15

    Various advanced and more easily safeguard-able reprocessing technologies have been proposed and are currently at different stages of development. This paper briefly analyses two proposed next generation reprocessing technologies, i. e. UREX+1a and pyroprocessing. It goes on to suggest various measures that can be taken to safeguard these technologies against nuclear proliferation. Due to the significant proliferation risks associated with PUREX, more proliferation resistant technologies are required in spent fuel reprocessing. UREX+1a and pyroprocessing can be suitable replacements since Pu is not separated from other TRUs after reprocessing. Implementations of technology specific safeguard measures can help enhance the proliferation resistance of these technologies. Since there is no technology which is foolproof, a MUF uncertainty estimation/quantification technology needs to be developed. These uncertainty estimates can then be used in a safeguards probabilistic risk assessment (PRA) system to quantify the risks associated with a particular reprocessing technology. To further safeguard these technologies, additional safeguard measures are needed for defense in depth. This may include implementation of multiple, independent, and redundant layers of defense such that no single layer, no matter how robust, is solely relied upon. Quantification of safeguard uncertainties related to UREX+1a and pyroprocessing can be used to benchmark these technologies against PUREX and between themselves for policy making.

  14. Emotional exhaustion and defense mechanisms in intensive therapy unit nurses.

    Science.gov (United States)

    Regan, Anna; Howard, Ruth A; Oyebode, Jan R

    2009-05-01

    Contrary to its original conceptualization, research has found that emotional demands do not lead to burnout in nurses. According to psychoanalytic theory, unconscious defense mechanisms may protect nurses from conscious awareness of work-related anxiety. This prevents self-report and may explain research findings. The maturity of defense style influences how anxiety is managed. Immature defenses prevent the conscious processing necessary for resolution of anxiety. Therefore, it is hypothesized that the use of immature defenses will lead to emotional exhaustion. This cross-sectional study used questionnaires to explore the defense mechanisms of 87 Intensive Therapy Unit nurses. Although the sample endorsed a predominantly mature defense style, the use of immature defenses predicted emotional exhaustion. Also, lower levels of reported stress associated with emotional demands predicted emotional exhaustion. Although this strongly implies the mediating role of immature defense mechanisms, the results were not statistically significant.

  15. Process arrangement options for Defense waste immobilization

    International Nuclear Information System (INIS)

    1980-02-01

    Current plans are to immobilize the SRP high-level liquid wastes in a high integrity form. Borosilicate glass was selected in 1977 as the reference waste form and a mjaor effort is currently underway to develop the required technology. A large new facility, referred to as the Defense Waste Processing Facility (DWPF) is being designed to carry out this mission, with project authorization targeted for 1982 and plant startup in 1989. However, a number of other process arrangements or manufacturing strategies, including staging the major elements of the project or using existing SRP facilities for some functions, have been suggested in lieu of building the reference DWPF. This study assesses these various options and compares them on a technical and cost basis with the DWPF. Eleven different manufacturing options for SRP defense waste solidification were examined in detail. These cases are: (1) vitrification of acid waste at current generation rate; (2) vitrification of current rate acid waste and caustic sludge; (3 and 4) vitrification of the sludge portion of neutralized waste; (5) decontamination of salt cake and storage of concentrated cesium and strontium for later immobilization; (6) processing waste in a facility with lower capacity than the DWPF; (7) processing waste in a combination of existing and new facilities; (8) waste immobilization in H Canyon; (9) vitrification of both sludge and salt; (10) DWPF with onsite storage; (11) deferred authorization of DWPF

  16. A Review on Internet of Things for Defense and Public Safety

    Directory of Open Access Journals (Sweden)

    Paula Fraga-Lamas

    2016-10-01

    Full Text Available The Internet of Things (IoT is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  17. A Review on Internet of Things for Defense and Public Safety.

    Science.gov (United States)

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Suárez-Albela, Manuel; Castedo, Luis; González-López, Miguel

    2016-10-05

    The Internet of Things (IoT) is undeniably transforming the way that organizations communicate and organize everyday businesses and industrial procedures. Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes. This survey analyzes the great potential for applying IoT technologies (i.e., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry. It identifies scenarios where Defense and Public Safety (PS) could leverage better commercial IoT capabilities to deliver greater survivability to the warfighter or first responders, while reducing costs and increasing operation efficiency and effectiveness. This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios. The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.

  18. 77 FR 34357 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2012-06-11

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, June 12, 2012 through Wednesday, June...

  19. 76 FR 71556 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-11-18

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Missile Defense Agency (MDA), Department of Defense. ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, December 13, 2011 through Wednesday...

  20. 76 FR 45783 - Missile Defense Advisory Committee; Notice of Closed Meeting

    Science.gov (United States)

    2011-08-01

    ... DEPARTMENT OF DEFENSE Office of the Secretary Missile Defense Advisory Committee; Notice of Closed Meeting AGENCY: Department of Defense; Missile Defense Agency (MDA). ACTION: Notice of closed meeting... Missile Defense Advisory Committee will take place. DATES: Tuesday, August 16, 2011 through Thursday...

  1. Recreating Daily life in Pompeii

    Directory of Open Access Journals (Sweden)

    Nadia Magnenat-Thalmann

    2010-05-01

    Full Text Available We propose an integrated Mixed Reality methodology for recreating ancient daily life that features realistic simulations of animated virtual human actors (clothes, body, skin, face who augment real environments and re-enact staged storytelling dramas. We aim to go further from traditional concepts of static cultural artifacts or rigid geometrical and 2D textual augmentations and allow for 3D, interactive, augmented historical character-based event representations in a mobile and wearable setup. This is the main contribution of the described work as well as the proposed extensions to AR Enabling technologies: a VR/AR character simulation kernel framework with real-time, clothed virtual humans that are dynamically superimposed on live camera input, animated and acting based on a predefined, historically correct scenario. We demonstrate such a real-time case study on the actual site of ancient Pompeii.

  2. Energy and technology review

    International Nuclear Information System (INIS)

    Quirk, W.J.; Bookless, W.A.

    1994-05-01

    The Lawrence Livermore National Laboratory, operated by the University of California for the United States Department of Energy, was established in 1952 to do research on nuclear weapons and magnetic fusion energy. Since then, in response to new national needs, we have added other major programs, including technology transfer, laser science (fusion, isotope separation, materials processing), biology and biotechnology, environmental research and remediation, arms control and nonproliferation, advanced defense technology, and applied energy technology. These programs, in turn, require research in basic scientific disciplines, including chemistry and materials science, computing science and technology, engineering, and physics. The Laboratory also carries out a variety of projects for other federal agencies. Energy and Technology Review is published monthly to report on unclassified work in all our programs. This issue reviews work performed in the areas of modified retoring for waste treatment and underground stripping to remove contamination

  3. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  4. 32 CFR 13.3 - Office of the Chief Defense Counsel.

    Science.gov (United States)

    2010-07-01

    ... COMMISSIONS RESPONSIBILITIES OF THE CHIEF DEFENSE COUNSEL, DETAILED DEFENSE COUNSEL, AND CIVILIAN DEFENSE... II of the Affidavit And Agreement By Civilian Defense Counsel at Appendix B to 32 CFR part 14. (5... incur confidentiality obligations in the context of fulfilling their supervisory responsibilities with...

  5. 75 FR 9588 - Defense Intelligence Agency Advisory Board; Closed Meeting

    Science.gov (United States)

    2010-03-03

    ... DEPARTMENT OF DEFENSE Office of the Secretary Defense Intelligence Agency Advisory Board; Closed Meeting AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice of closed meeting. SUMMARY: Pursuant to... Law 94-409, notice is hereby given that the Defense Intelligence Agency Advisory Board, will meet on...

  6. Department of Defense Agency Financial Report for FY 2011

    Science.gov (United States)

    2011-11-01

    able to distribute resources across hospitals and clinics within a market to meet the needs of the entire population of eligible beneficiaries. In...WRAMC), Washington, DC. This entailed construction of a new community hospital and a dental clinic at Fort Belvoir and an expansion of the National...Department of Defense DSB Defense Science Board DSS Defense Security Service DTM Directive-type Memorandum DTS Defense Travel System EBF Education

  7. 76 FR 13991 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-03-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... meetings of the Department of Defense Wage Committee. DATES: Tuesday, April 5, 2011, and Tuesday, April 19... FURTHER INFORMATION CONTACT: Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  8. Changes in defensive functioning in a case of avoidant personality disorder.

    Science.gov (United States)

    Presniak, Michelle D; Olson, Trevor R; Porcerelli, John H; Dauphin, V Barry

    2010-03-01

    This case study is based upon data from a male patient with Avoidant Personality Disorder who was in psychoanalytic treatment for 5 years. Defense mechanism use was assessed by 3 coders using the Defense Mechanisms Rating Scales. Session transcripts from intake, each year of therapy, and 1-year follow-up were used for the ratings. Over the course of psychoanalysis and follow-up, the patient's Overall Defensive Functioning and High-Adaptive defense level use increased and his use of the Disavowal defense level and Fantasy decreased. The pattern of change throughout treatment was also assessed. The patient's Overall Defensive Functioning decreased initially, followed by an increase through year 4. Overall Defensive Functioning decreased again prior to termination before increasing to its highest level at follow-up. The results demonstrated changes consistent with hypotheses and theory, including overall improvement in defensive functioning, an initial regression of defensive functioning, decline in functioning immediately prior to termination, and continued improvement posttermination. This pattern of defense change highlights the importance of assessing defenses in treatment research. PsycINFO Database Record (c) 2010 APA, all rights reserved

  9. Immune defense and host life history.

    Science.gov (United States)

    Zuk, Marlene; Stoehr, Andrew M

    2002-10-01

    Recent interest has focused on immune response in an evolutionary context, with particular attention to disease resistance as a life-history trait, subject to trade-offs against other traits such as reproductive effort. Immune defense has several characteristics that complicate this approach, however; for example, because of the risk of autoimmunity, optimal immune defense is not necessarily maximum immune defense. Two important types of cost associated with immunity in the context of life history are resource costs, those related to the allocation of essential but limited resources, such as energy or nutrients, and option costs, those paid not in the currency of resources but in functional or structural components of the organism. Resource and option costs are likely to apply to different aspects of resistance. Recent investigations into possible trade-offs between reproductive effort, particularly sexual displays, and immunity have suggested interesting functional links between the two. Although all organisms balance the costs of immune defense against the requirements of reproduction, this balance works out differently for males than it does for females, creating sex differences in immune response that in turn are related to ecological factors such as the mating system. We conclude that immune response is indeed costly and that future work would do well to include invertebrates, which have sometimes been neglected in studies of the ecology of immune defense.

  10. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  11. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Brown, P.S. (ed.)

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base. (GHT)

  12. Landscape Variation in Plant Defense Syndromes across a Tropical Rainforest

    Science.gov (United States)

    McManus, K. M.; Asner, G. P.; Martin, R.; Field, C. B.

    2014-12-01

    Plant defenses against herbivores shape tropical rainforest biodiversity, yet community- and landscape-scale patterns of plant defense and the phylogenetic and environmental factors that may shape them are poorly known. We measured foliar defense, growth, and longevity traits for 345 canopy trees across 84 species in a tropical rainforest and examined whether patterns of trait co-variation indicated the existence of plant defense syndromes. Using a DNA-barcode phylogeny and remote sensing and land-use data, we investigated how phylogeny and topo-edaphic properties influenced the distribution of syndromes. We found evidence for three distinct defense syndromes, characterized by rapid growth, growth compensated by defense, or limited palatability/low nutrition. Phylogenetic signal was generally lower for defense traits than traits related to growth or longevity. Individual defense syndromes were organized at different taxonomic levels and responded to different spatial-environmental gradients. The results suggest that a diverse set of tropical canopy trees converge on a limited number of strategies to secure resources and mitigate fitness losses due to herbivory, with patterns of distribution mediated by evolutionary histories and local habitat associations. Plant defense syndromes are multidimensional plant strategies, and thus are a useful means of discerning ecologically-relevant variation in highly diverse tropical rainforest communities. Scaling this approach to the landscape level, if plant defense syndromes can be distinguished in remotely-sensed data, they may yield new insights into the role of plant defense in structuring diverse tropical rainforest communities.

  13. Defense Science Board 2005 Summer Study on Transformation: A Progress Assessment. Volume 2. Supporting Reports

    Science.gov (United States)

    2006-04-01

    Banking Mr. Robert Luby, IBM Dr. Robert Lucky, Telcordia Technologies Mr. William Lynn, Raytheon Mr. Dave Oliver, EADS North America GOVERNMENT...MAY 2005 Central Command (CENTCOM) COL Peter Zielinski CENTCOM Office of Force Transformation (OFT) Review of COCOM Experimentation COL Richard...for Defense Analyses Mr. Patrick McCarthy, U.S. Joint Forces Command Mr. Stephen Moore, U.S. Joint Forces Command MAY 10, 2005 COL Peter Zielinski

  14. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ... DEPARTMENT OF DEFENSE Office of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 [Docket ID: DOD-2012-OS-0019] Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule. SUMMARY: The Defense Logistics...

  15. TSA's Mulligan clarified line between technology, First Amendment

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Technology for Homeland Security Course Paper” In the summer of 2007, Indiana State University student Christopher Soghoian posted an item on his internet website, Chris’ Northwest Airlines...

  16. Quadrennial Defense Review, National Defense Authorizatin Act for Fiscal Year 2000

    National Research Council Canada - National Science Library

    2002-01-01

    Objectives of Overall JS QDR Effort Develop a QDR process that will shape defense policies Ensure the process is strategy-based, not budget-based Define a force structure responsive to the national...

  17. Applying Rapid Acquisition Policy Lessons for Defense Innovation

    Science.gov (United States)

    2017-12-21

    import- ing Silicon Valley- style innovation practices to its acquisition process, it is im- portant to assess an organization’s ability to...these efforts. Keywords: defense acquisition, defense procurement, rapid acquisition, de- fense innovation, program management , organizational culture...Device De- feat Organization, JIEDDO, Rapid Equipping Force, REF Silicon Valley- style innovation is a hot topic in the Department of De-fense (DOD). For

  18. Managing Quadrennial Defense Review Integration: An Overview

    National Research Council Canada - National Science Library

    Schrader, John

    2001-01-01

    ...). The lessons learned from the 1997 Quadrennial Defense Review (QDR 1997) included the need for leadership guidance and integration of analytic activities to sort through the myriad issues that are always confronting the Department of Defense...

  19. COMPETITIVENESS OF DEFENSE INDUSTRY IN TURKEY

    Directory of Open Access Journals (Sweden)

    Hakki BILGEN

    2010-01-01

    Full Text Available Turkey has created some opportunities for the organisations in the defense industry to generate a suitable business and to ensure its sustainability. The domestic coverage ratio of defense system need in 2010 is aimed as 50%. To achieve this target depends on the defense industry competitiveness. In this study, the development plans, strategies and foreign trade are examined. Its contribution which has an important place in the research and development investment, is not at the level expected in Turkey’s economy. Turkey occupies 47th position in World Competitiveness Scoreboard, and 61st position in Global Competitiveness Index in 2009. The index factors are investigated to understand the competitiveness according to the Porter’s diamond model, applied in Turkey for the first time. As a result, the competitiveness analysis of Turkish defense industry is carried out and its global place and competitive advantage are exposed. Therefore, a framework is made to introduce a guide for decision-making by using a widely-accepted model, and to contribute to the plans and strategies

  20. Antiviral Defense Mechanisms in Honey Bees

    Science.gov (United States)

    Brutscher, Laura M.; Daughenbaugh, Katie F.; Flenniken, Michelle L.

    2015-01-01

    Honey bees are significant pollinators of agricultural crops and other important plant species. High annual losses of honey bee colonies in North America and in some parts of Europe have profound ecological and economic implications. Colony losses have been attributed to multiple factors including RNA viruses, thus understanding bee antiviral defense mechanisms may result in the development of strategies that mitigate colony losses. Honey bee antiviral defense mechanisms include RNA-interference, pathogen-associated molecular pattern (PAMP) triggered signal transduction cascades, and reactive oxygen species generation. However, the relative importance of these and other pathways is largely uncharacterized. Herein we review the current understanding of honey bee antiviral defense mechanisms and suggest important avenues for future investigation. PMID:26273564

  1. Air defense planning for an area with the use of very short range air defense sets

    Directory of Open Access Journals (Sweden)

    Tadeusz Pietkiewicz

    2017-12-01

    Full Text Available This paper presents a heuristic method of planning the deployment of very short-range anti-air missile and artillery sets (VSHORAD around an area (‘protected area’ in order to protect it. A function dependent on the distance between the earliest feasible points of destroying targets and the centre of the protected area was taken as an objective function. This is a different indicator from those commonly used in the literature, and based on the likelihood of a defense zone penetration by means of an air attack (MAA: the kill probability of the MAA and the probability of area losses. The model constraints resulted directly from the restrictions imposed by real air defense systems and the nature of the area being defended. This paper assumes that the VSHORAD system operates as a part of a general, superordinate air defense command and control system based on the idea of network-centric warfare, which provides the VSHORAD system with a recognized air picture, air defense plans, and combat mission specifications. The presented method has been implemented. The final part of the paper presents the computational results. Keywords: optimal planning, air defense system, area installation protection, deployment of very short range anti-air missile and artillery sets (VSHORAD

  2. Implementation of the Gamma Monitor Calibration Laboratory (LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (IDQBRN) of the Technology Center of the Brazilian Army (CTEx)

    Energy Technology Data Exchange (ETDEWEB)

    Balthar, Mario Cesar V.; Amorim, Aneuri de; Santos, Avelino dos and others, E-mail: mariobalthar@gmail.com [Centro Tecnológico do Exército (IDQBRN/CTEx), Rio de Janeiro, RJ (Brazil). Instituto de Defesa Química, Biológica, Radiológica e Nuclear

    2017-07-01

    The objective of this work is to describe the implementation and adaptation stages of the Gamma Monitor Calibration Laboratory (Laboratório de Calibração de Monitores Gama - LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (Instituto de Defesa Química, Biológica, Radiológica e Nuclear - IDQBRN) of the Technology Center of the Brazilian Army (Centro Tecnológico do Exército - CTEx). Calibration of the radiation monitors used by the Brazilian Army will be performed by quantitatively measuring the ambient dose equivalent, in compliance with national legislation. LABCAL still seeks licensing from CNEN and INMETRO. The laboratory in intended to supply the total demand for calibration of ionizing radiation devices from the Brazilian Army. (author)

  3. Implementation of the Gamma Monitor Calibration Laboratory (LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (IDQBRN) of the Technology Center of the Brazilian Army (CTEx)

    International Nuclear Information System (INIS)

    Balthar, Mario Cesar V.; Amorim, Aneuri de; Santos, Avelino dos and others

    2017-01-01

    The objective of this work is to describe the implementation and adaptation stages of the Gamma Monitor Calibration Laboratory (Laboratório de Calibração de Monitores Gama - LABCAL) of the Institute of Chemical, Biological, Radiological and Nuclear Defense (Instituto de Defesa Química, Biológica, Radiológica e Nuclear - IDQBRN) of the Technology Center of the Brazilian Army (Centro Tecnológico do Exército - CTEx). Calibration of the radiation monitors used by the Brazilian Army will be performed by quantitatively measuring the ambient dose equivalent, in compliance with national legislation. LABCAL still seeks licensing from CNEN and INMETRO. The laboratory in intended to supply the total demand for calibration of ionizing radiation devices from the Brazilian Army. (author)

  4. Low-level waste management program and interim waste operations technologies

    International Nuclear Information System (INIS)

    Mezga, L.J.

    1983-01-01

    The Department of Energy currently supports an integrated technology development and transfer program aimed at ensuring that the technology necessary for the safe management and disposal of LLW by the commercial and defense sectors is available. The program focuses on five technical areas: (1) corrective measures technology, (2) improved shallow land burial technology, (3) greater confinement disposal technology, (4) model development and validation, and (5) treatment methods for problem wastes. The results of activities in these areas are reported in the open literature and the Proceedings of the LLWMP Annual Participants Information Meeting

  5. Cognitive defenses and compliance with radiation treatment in cancer patients

    International Nuclear Information System (INIS)

    Karassik, B.M.

    1989-01-01

    The present study was undertaken to investigate the relationships between four cognitive defenses and compliance with radiation therapy in cancer patients. The role of accurate self-report of usage of each of the defenses was examined as well. A distinction between direct-action and emotion-focused coping was utilized to conceptualize the possible relationships between compliance and the defenses. Based on the proposals of Heilbrun and Renert (1986) regarding the relative evasiveness of the defenses and available evidence from the compliance literature, it was predicted that noncompliant patients would show more repression, projection, and denial and less rationalization than compliant patients. In addition, based upon the findings of Heilbrun and Pepe (1985) that related self-deception to effectiveness of the defenses in dealing with stress, predictions were also made regarding differences in accuracy of reported defense usage by compliant and noncompliant patients. Noncompliant repressors and projectors and compliant rationalizers were predicted to be less aware of their respective use of these defenses than their compliant counterparts; noncompliant deniers were predicted to be more aware of the use of this defense than compliant deniers

  6. Waste-to-Energy: Hawaii and Guam Energy Improvement Technology Demonstration Project

    Energy Technology Data Exchange (ETDEWEB)

    Davis, J. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Gelman, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Tomberlin, G. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bain, R. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2014-03-01

    The National Renewable Energy Laboratory (NREL) and the U.S. Navy have worked together to demonstrate new or leading-edge commercial energy technologies whose deployment will support the U.S. Department of Defense (DOD) in meeting its energy efficiency and renewable energy goals while enhancing installation energy security. This is consistent with the 2010 Quadrennial Defense Review report1 that encourages the use of 'military installations as a test bed to demonstrate and create a market for innovative energy efficiency and renewable energy technologies coming out of the private sector and DOD and Department of Energy laboratories,' as well as the July 2010 memorandum of understanding between DOD and the U.S. Department of Energy (DOE) that documents the intent to 'maximize DOD access to DOE technical expertise and assistance through cooperation in the deployment and pilot testing of emerging energy technologies.' As part of this joint initiative, a promising waste-to-energy (WTE) technology was selected for demonstration at the Hickam Commissary aboard the Joint Base Pearl Harbor-Hickam (JBPHH), Hawaii. The WTE technology chosen is called high-energy densification waste-to-energy conversion (HEDWEC). HEDWEC technology is the result of significant U.S. Army investment in the development of WTE technology for forward operating bases.

  7. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  8. Nuclear Technology applications

    International Nuclear Information System (INIS)

    Cibils Machado, W. E- mail: wrcibils@adinet.com.uy

    2002-01-01

    The present work tries on the applications of the nuclear technology in the life daily, such as agriculture and feeding, human health, industry, non destructive essays, isotopic hydrology, and the nuclear power stations for electricity production and radioisotopes production

  9. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  10. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    Energy Technology Data Exchange (ETDEWEB)

    Bos, Nathan; Paul, Celeste; Gersh, John; Greenberg, Ariel; Piatko, Christine; Sperling, Scott; Spitaletta, Jason; Arendt, Dustin L.; Burtner, Edwin R.

    2016-10-24

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one of two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.

  11. PTSD as a criminal defense: a review of case law.

    Science.gov (United States)

    Berger, Omri; McNiel, Dale E; Binder, Renée L

    2012-01-01

    Posttraumatic stress disorder (PTSD) has been offered as a basis for criminal defenses, including insanity, unconsciousness, self-defense, diminished capacity, and sentencing mitigation. Examination of case law (e.g., appellate decisions) involving PTSD reveals that when offered as a criminal defense, PTSD has received mixed treatment in the judicial system. Courts have often recognized testimony about PTSD as scientifically reliable. In addition, PTSD has been recognized by appellate courts in U.S. jurisdictions as a valid basis for insanity, unconsciousness, and self-defense. However, the courts have not always found the presentation of PTSD testimony to be relevant, admissible, or compelling in such cases, particularly when expert testimony failed to show how PTSD met the standard for the given defense. In cases that did not meet the standard for one of the complete defenses, PTSD has been presented as a partial defense or mitigating circumstance, again with mixed success.

  12. On Three Defenses of Sentimentalism

    OpenAIRE

    Iwasa, Noriaki

    2013-01-01

    This essay shows that a moral sense or moral sentiments alone cannot identify appropriate morals. To this end, the essay analyzes three defenses of Francis Hutcheson’s, David Hume’s, and Adam Smith’s moral sense theories against the relativism charge that a moral sense or moral sentiments vary across people, societies, cultures, or times. The first defense is the claim that there is a universal moral sense or universal moral sentiments. However, even if they exist, a moral sense or moral sent...

  13. Overview - Defense Waste Processing Facility Operating Experience

    International Nuclear Information System (INIS)

    Norton, M.R.

    2002-01-01

    The Savannah River Site's Defense Waste Processing Facility (DWPF) near Aiken, SC is the world's largest radioactive waste vitrification facility. Radioactive operations began in March 1996 and over 1,000 canisters have been produced. This paper presents an overview of the DWPF process and a summary of recent facility operations and process improvements. These process improvements include efforts to extend the life of the DWPF melter, projects to increase facility throughput, initiatives to reduce the quantity of wastewater generated, improved remote decontamination capabilities, and improvements to remote canyon equipment to extend equipment life span. This paper also includes a review of a melt rate improvement program conducted by Savannah River Technology Center personnel. This program involved identifying the factors that impacted melt rate, conducting small scale testing of proposed process changes and developing a cost effective implementation plan

  14. Protease inhibitor (PI) mediated defense in leaves and flowers of pigeonpea (protease inhibitor mediated defense in pigeonpea).

    Science.gov (United States)

    Padul, Manohar V; Tak, Rajesh D; Kachole, Manvendra S

    2012-03-01

    More than 200 insect pests are found growing on pigeonpea. Insects lay eggs, attack and feed on leaves, flowers and developing pods. Plants have developed elaborate defenses against these insect pests. The present work evaluates protease inhibitor (PI) based defense of pigeonpea in leaves and flowers. PIs in the extracts of these tender tissues were detected by using gel X-ray film contact print method. Up to three PIs (PI-3, PI-4 and PI-5) were detected in these tissues as against nine (PI-1-PI-9) in mature seeds. PI-3 is the major component of these tissues. Mechanical wounding, insect chewing, fungal pathogenesis and application of salicylic acid induced PIs in pigeonpea in these tissues. Induction was found to be local as well as systemic but local response was stronger than systemic response. During both local and systemic induction, PI-3 appeared first. In spite of the presence and induction of PIs in these tender tissues and seeds farmers continue to suffer yield loses. This is due to the weak expression of PIs. However the ability of the plant to respond to external stimuli by producing defense proteins does not seem to be compromised. This study therefore indicates that PIs are components of both constitutive and inducible defense and provide a ground for designing stronger inducible defense (PIs or other insect toxin based) in pigeonpea. Copyright © 2011 Elsevier Masson SAS. All rights reserved.

  15. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  16. Technology readiness levels for advanced nuclear fuels and materials development

    Energy Technology Data Exchange (ETDEWEB)

    Carmack, W.J., E-mail: jon.carmack@inl.gov [Idaho National Laboratory, Idaho Falls, ID (United States); Braase, L.A.; Wigeland, R.A. [Idaho National Laboratory, Idaho Falls, ID (United States); Todosow, M. [Brookhaven National Laboratory, Upton, NY (United States)

    2017-03-15

    Highlights: • Definition of nuclear fuels system technology readiness level. • Identification of evaluation criteria for nuclear fuel system TRLs. • Application of TRLs to fuel systems. - Abstract: The Technology Readiness process quantitatively assesses the maturity of a given technology. The National Aeronautics and Space Administration (NASA) pioneered the process in the 1980s to inform the development and deployment of new systems for space applications. The process was subsequently adopted by the Department of Defense (DoD) to develop and deploy new technology and systems for defense applications. It was also adopted by the Department of Energy (DOE) to evaluate the maturity of new technologies in major construction projects. Advanced nuclear fuels and materials development is needed to improve the performance and safety of current and advanced reactors, and ultimately close the nuclear fuel cycle. Because deployment of new nuclear fuel forms requires a lengthy and expensive research, development, and demonstration program, applying the assessment process to advanced fuel development is useful as a management, communication, and tracking tool. This article provides definition of technology readiness levels (TRLs) for nuclear fuel technology as well as selected examples regarding the methods by which TRLs are currently used to assess the maturity of nuclear fuels and materials under development in the DOE Fuel Cycle Research and Development (FCRD) Program within the Advanced Fuels Campaign (AFC).

  17. VOCATIONAL AND PATRIOTIC EDUCATION OF STUDENTS OF DEFENSE SPECIALTIES AT A TECHNICAL UNIVERSITY

    Directory of Open Access Journals (Sweden)

    N. P. Ustinova

    2016-01-01

    of students of defense specialties at Izhevsk State Technical University named after M. T. Kalashnikov (Izhevsk, Tula State University (Tula, Kovrov State Technological Academy named after V. A. Degtjarjov (Kovrov, Ryazan Higher Airborne Command School named after V. F. Margelov (Ryazan.

  18. 2004 annual report. Defense, safety, energy, information, health. CEA in the center of big European challenges

    International Nuclear Information System (INIS)

    2005-01-01

    This document is the 2004 annual report of the French atomic energy commission (CEA). It presents the R and D activities of the CEA in three main domains: 1 - defense and safety, maintaining perenniality of nuclear dissuasion and nuclear safety: supplying nuclear weapons to armies, maintaining dissuasion capability with the simulation program, sharing R and D means with the scientific community and the industrial world, designing and maintaining naval nuclear propulsion reactors, cleansing Marcoule and Pierrelatte facilities, monitoring treaties and fighting against proliferation and terrorism; 2 - energy, developing more competitive and cleaner energy sources: nuclear waste management, optimization of industrial nuclear activities, future nuclear systems and new energy technologies, basic research on energy, radiobiology and toxicology; 3 - information and health, valorizing industry thanks to technological research and supplying new tools for health and medical research: micro- and nano-technologies, software technologies, basic research for industrial innovation, nuclear technologies for health and bio-technologies. (J.S.)

  19. Toward the Printed World: Additive Manufacturing and Implications for National Security (Defense Horizons, Number 73)

    Science.gov (United States)

    2012-09-01

    allowing it to dry or baking it in a kiln . A modern factory would take a block of raw material and then use machinery to pare away un- necessary...implication that has not yet been discussed with- in AM technology circles is personalized body enhance- ment. Inorganic hybrid materials ( electrical , optical...equipment eadS aircraft and defense company envisiontec dental equipment manufacturer fisher-Price toy company ford Car manufacturer general electric

  20. Defense.gov Special Report: Hagel Bids Farewell

    Science.gov (United States)

    Africa. Story Major Components of Hagel's Leadership During his tenure, Defense Secretary Chuck Hagel prudence, careful leadership and personal compassion. "What our budget proposal and defense strategy Relationship With India Understanding the importance of a rising and democratic India to the future security

  1. Early Childhood Technology Education: A Sociocultural Perspective

    Science.gov (United States)

    Siu, Kin Wai Michael; Lam, Mei Seung

    2005-01-01

    We are living in a fast-changing, technology-driven world, where technology affects the daily lives of every person, directly or indirectly. While the importance of providing young children with technological knowledge and experience has been well-recognized, how the curriculum should be developed deserves greater study. Using early childhood…

  2. Optics and photonics: essential technologies for our nation (technology & engineering)

    CERN Document Server

    Research, Committee on Harnessing Light: Capitalizing on Optical Science Trends and Challenges for Future; Sciences, Division on Engineering and Physical; Council, National Research

    2013-01-01

    Optics and photonics technologies are ubiquitous: they are responsible for the displays on smart phones and computing devices, optical fiber that carries the information in the internet, advanced precision manufacturing, enhanced defense capabilities, and a plethora of medical diagnostics tools. The opportunities arising from optics and photonics offer the potential for even greater societal impact in the next few decades, including solar power generation and new efficient lighting that could transform the nation's energy landscape and new optical capabilities that will be essential to support the continued exponential growth of the Internet. As described in the National Research Council report Optics and Photonics: Essential Technologies for our Nation, it is critical for the United States to take advantage of these emerging optical technologies for creating new industries and generating job growth. The report assesses the current state of optical science and engineering in the United States and abroad--incl...

  3. From assigning to designing technological agency.

    NARCIS (Netherlands)

    Waelbers, K.

    2009-01-01

    In What Things Do, Verbeek (What things do: philosophical reflections on technology, agency and design. Penn State University Press, University Park, 2005a) develops a vocabulary for understanding the social role of technological artifacts in our culture and in our daily lives. He understands this

  4. Analysis of For-Profit Commercial Firm Participation in Technology Investment Agreements

    National Research Council Canada - National Science Library

    Tucker, Barbara

    2002-01-01

    .... These changes impacted the military's ability to maintain technological superiority over its adversaries, which was the foundation of a successful U,S, national defense, Commercial research and development (R&D...

  5. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  6. Fusion connection: contributions to industry, defense, and basic science resulting from scientific advances made in the Magnetic Fusion Energy Program

    International Nuclear Information System (INIS)

    Finn, T.; Woo, J.; Temkin, R.

    1985-10-01

    Fusion research has led to significant contributions in many different areas of industry, defense, and basic science. This diversity is represented visually in the introductory figure which shows both a radio galaxy, and a microchip produced by plasma etching. Some of these spin-off technologies are discussed

  7. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Stowers, I.F.; Crawford, R.B.; Esser, M.A.; Lien, P.L.; O' Neal, E.; Van Dyke, P. (eds.)

    1982-07-01

    The state of the laboratory address by LLNL Director Roger Batzel is summarized, and a breakdown of the laboratory funding is given. The Livermore defense-related committment is described, including the design and development of advanced nuclear weapons as well as research in inertial confinement fusion, nonnuclear ordnance, and particle beam technology. LLNL is also applying its scientific and engineering resources to the dual challenge of meeting future energy needs without degrading the quality of the biosphere. Some representative examples are given of the supporting groups vital for providing the specialized expertise and new technologies required by the laboratory's major research programs. (GHT)

  8. Concept of a nuclear defense and disarmament; Concept d'une defense nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    Grandperrier, Catherine

    2011-02-09

    Today, disarmament and proliferation control stakes have to deal with the economical and political interests of the development of the civil and military nuclear industry. This book addresses the question of the future of the nuclear defense in France and in the rest of the world at a time when two trends, the abolitionist one and the traditional one, are in opposition. Between disarmament and nuclear exaggeration, tomorrow's defense strategy will have to find its way. (J.S.)

  9. Chemical defense of early life stages of benthic marine invertebrates.

    Science.gov (United States)

    Lindquist, Niels

    2002-10-01

    Accurate knowledge of factors affecting the survival of early life stages of marine invertebrates is critically important for understanding their population dynamics and the evolution of their diverse reproductive and life-history characteristics. Chemical defense is an important determinant of survival for adult stages of many sessile benthic invertebrates, yet relatively little consideration has been given to chemical defenses at the early life stages. This review examines the taxonomic breadth of early life-stage chemical defense in relation to various life-history and reproductive characteristics, as well as possible constraints on the expression of chemical defense at certain life stages. Data on the localization of defensive secondary metabolites in larvae and the fitness-related consequences of consuming even a small amount of toxic secondary metabolites underpin proposals regarding the potential for Müllerian and Batesian mimicry to occur among marine larvae. The involvement of microbial symbionts in the chemical defense of early life stages illustrates its complexity for some species. As our knowledge of chemical defenses in early life stages grows, we will be able to more rigorously examine connections among phylogeny, chemical defenses, and the evolution of reproductive and life-history characteristics among marine invertebrates.

  10. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  11. Defense.gov Special Report: 2013 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search 2013 Fiscal Budget Published Feb. 13, 2012 Top Stories Budget Proposal Slows Cost Growth, Pentagon Leaders Say The Defense Department's proposed fiscal 2013 budget request Department officials told a Senate panel. Story Officials Seek Construction Funds, More BRAC in Budget

  12. Defense: FY2017 Budget Request, Authorization, and Appropriations

    Science.gov (United States)

    2016-04-12

    adjusted the limits on defense and non-defense spending —each time adjusting only the limits for the two succeeding years. 13 Nevertheless, each of... employee hour worked . The Bureau of Labor Statistics reports the ECI which is computed from compensation cost data collected from a sample of jobs...with $9.6 billion in mandatory spending , brought the Administration’s total FY2017 National Defense budget request to $619.5 billion. In shaping the

  13. Intranet Technology: Considerations for Implementation within the Department of Defense

    National Research Council Canada - National Science Library

    Rich, Oliver

    1997-01-01

    Intranets, internal networks based on the same technology and protocol as the World Wide Web, have emerged in the past two years as a very popular medium for communication and information exchange within organizations...

  14. Perspective on methods to calculate a fee for disposal of defense high-level waste in combined (civilian/defense) repositories

    International Nuclear Information System (INIS)

    1986-12-01

    The Department of Energy intends to send the high-level waste from defense operations to combined civilian/defense repositories for disposal. The federal government must pay a fee to cover its fair share of the cost for the disposal system. This report provides an overview perspective on the defense high-level waste (DHLW) quantities and characteristics and on potential alternatives for calculation and payment of the disposal fee. Information on the DHLW expected from government sites includes the number of waste canisters, radioactivity, thermal decay power, mass of defense reactor fuel, and total electrical energy-equivalents. Ranges in quantities are shown where different operating scenarios are being considered. Several different fee determination methods are described and fees for different quantities of waste are estimated. Information is also included on possible payment alternatives, production and shipping schedules, and credits which could be applied to the fee

  15. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  16. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    deploying advanced air defense systems18, such as the Russian S-300 and S-500, and concealing them in hardened, camouflaged sites, such as extensive... Russian objections to the European Phased Adaptive Approach (EPAA) and fund homeland defense priorities.39 Furthermore, the PTSS system was also... Theatre Ballistic Missile Defence Capability Becomes Operational,” Jane’s Missiles & Rockets, 1 February 2011. 55 Joseph W. Kirschbaum, REGIONAL MISSILE

  17. Special Technology Area Review on Spintronics. Report of Department of Defense Advisory Group on Electron Devices Working Group B (Microelectronics)

    National Research Council Canada - National Science Library

    Dunbridge, Barry; Palkuti, Les; Wolf, Stuart

    2004-01-01

    ...) as it applies to nonvolatile memories and quantum-based logic and computing. In addition, the information provided at the STAR is expected to be of use to the Services and Department of Defense (DoD...

  18. 75 FR 71080 - Closed Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2010-11-22

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Department of Defense Wage... closed meetings of the Department of Defense Wage Committee. DATES: Tuesday, December 14, 2010; at 10 a.m... obtained by writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon...

  19. A Daily Diary Approach to the Examination of Chronic Stress, Daily Hassles and Safety Perceptions in Hospital Nursing.

    Science.gov (United States)

    Louch, Gemma; O'Hara, Jane; Gardner, Peter; O'Connor, Daryl B

    2017-12-01

    Stress is a significant concern for individuals and organisations. Few studies have explored stress, burnout and patient safety in hospital nursing on a daily basis at the individual level. This study aimed to examine the effects of chronic stress and daily hassles on safety perceptions, the effect of chronic stress on daily hassles experienced and chronic stress as a potential moderator. Utilising a daily diary design, 83 UK hospital nurses completed three end-of-shift diaries, yielding 324 person days. Hassles, safety perceptions and workplace cognitive failure were measured daily, and a baseline questionnaire included a measure of chronic stress. Hierarchical multivariate linear modelling was used to analyse the data. Higher chronic stress was associated with more daily hassles, poorer perceptions of safety and being less able to practise safely, but not more workplace cognitive failure. Reporting more daily hassles was associated with poorer perceptions of safety, being less able to practise safely and more workplace cognitive failure. Chronic stress did not moderate daily associations. The hassles reported illustrate the wide-ranging hassles nurses experienced. The findings demonstrate, in addition to chronic stress, the importance of daily hassles for nurses' perceptions of safety and the hassles experienced by hospital nurses on a daily basis. Nurses perceive chronic stress and daily hassles to contribute to their perceptions of safety. Measuring the number of daily hassles experienced could proactively highlight when patient safety threats may arise, and as a result, interventions could usefully focus on the management of daily hassles.

  20. Extracellular Alkalinization as a Defense Response in Potato Cells.

    Science.gov (United States)

    Moroz, Natalia; Fritch, Karen R; Marcec, Matthew J; Tripathi, Diwaker; Smertenko, Andrei; Tanaka, Kiwamu

    2017-01-01

    A quantitative and robust bioassay to assess plant defense response is important for studies of disease resistance and also for the early identification of disease during pre- or non-symptomatic phases. An increase in extracellular pH is known to be an early defense response in plants. In this study, we demonstrate extracellular alkalinization as a defense response in potatoes. Using potato suspension cell cultures, we observed an alkalinization response against various pathogen- and plant-derived elicitors in a dose- and time-dependent manner. We also assessed the defense response against a variety of potato pathogens, such as protists ( Phytophthora infestans and Spongospora subterranea ) and fungi ( Verticillium dahliae and Colletotrichum coccodes ). Our results show that extracellular pH increases within 30 min in proportion to the number of pathogen spores added. Consistently with the alkalinization effect, the higher transcription level of several defense-related genes and production of reactive oxygen species was observed. Our results demonstrate that the alkalinization response is an effective marker to study early stages of defense response in potatoes.

  1. Cash Management in the Defense Working Capital Funds

    National Research Council Canada - National Science Library

    1997-01-01

    ... (formerly the Defense Business Operations Fund) was identified during our audit of the Fund Balance With Treasury Account of the FY 1996 Consolidated Financial Statements of the Defense Business Operations Fund...

  2. 75 FR 33587 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-06-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that the Department of Defense Wage Committee will meet on July 13, 2010, in Rosslyn... writing to the Chairman, Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301...

  3. 75 FR 44231 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-28

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 24..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  4. 75 FR 28786 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-05-24

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on June 15..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  5. 75 FR 40796 - Federal Advisory Committee; Department of Defense Wage Committee

    Science.gov (United States)

    2010-07-14

    ... Wage Committee AGENCY: Department of Defense (DoD). ACTION: Notice of closed meeting. SUMMARY: Pursuant... hereby given that a closed meeting of the Department of Defense Wage Committee will be held on August 10..., Department of Defense Wage Committee, 4000 Defense Pentagon, Washington, DC 20301- 4000. SUPPLEMENTARY...

  6. 76 FR 72245 - Implementation of Defense Trade Cooperation Treaties

    Science.gov (United States)

    2011-11-22

    ... equipment sold under a contract in the amount of $25,000,000 or more (currently required for amounts of $14... equipment sold under a contract in the amount in the amount of $25,000,000 or more, or for defense articles... the Defense Trade Cooperation Treaty between the United States and Australia and the Defense Trade...

  7. TECHNOLOGY & NEUROPSYCHOLOGY: TOWARDS A CYBER – NEUROPSYCHOLOGY

    Directory of Open Access Journals (Sweden)

    Felipe Soto-Pérez

    2010-12-01

    Full Text Available Technologies have penetrated all walks of human beings. Numerous technological advances have been developed in the field of neuropsychology, but they are not usually used in daily care. In this regard, it are developed some reflections on the difficulties and of the process of implementing technology solutions in the field of neuropsychology.

  8. Technological Fundamentalism? The Use of Unmanned Aerial Vehicles in the Conduct of War

    OpenAIRE

    Futrell, Doris J.

    2004-01-01

    There is an on-going battle in the Department of Defense between reason and the faith in technology. Those ascribing to technological fundamentalism are blind to the empirical evidence that their faith in technology is obscuring the technological limitations that are evident. The desire for information dominance to reach the state of total transparency of the opponent in order to win the war is untenable. The reasoning voiced by skeptics should be heeded but the technological fundamentalis...

  9. Federal Aviation Administration's behavioral research program for defense against hijackings.

    Science.gov (United States)

    Dailey, J T; Pickrel, E W

    1975-04-01

    Behavioral research has been significant contributions to the government's successful program for defense against hijackers. Today's boarding gate defenses have a leading role in that program, but they were rejected until creation of the behavioral profile made selective search feasible. Metal detectors now make search of all travelers practical but with increasing involvement of boarding gate employees, so a behavioral program is used to monitor their performance. Experience shows that some persons have penetrated boarding gate defenses, so another requirement was in-flight defenses. Flightpersonnel had defeated some past hijackers, so a behavioral analysis of past hijackings was used to identify tactics for in-flight defense. These were incorporated into training programs and distributed to all U.S. airlines, many government organizations, and foreign carriers. Research continues for updating these and developing new courses for special needs, such as defense against gangs.

  10. Limited response of ponderosa pine bole defenses to wounding and fungi.

    Science.gov (United States)

    Gaylord, Monica L; Hofstetter, Richard W; Kolb, Thomas E; Wagner, Michael R

    2011-04-01

    Tree defense against bark beetles (Curculionidae: Scolytinae) and their associated fungi generally comprises some combination of constitutive (primary) and induced (secondary) defenses. In pines, the primary constitutive defense against bark beetles consists of preformed resin stored in resin ducts. Induced defenses at the wound site (point of beetle entry) in pines may consist of an increase in resin flow and necrotic lesion formation. The quantity and quality of both induced and constitutive defenses can vary by species and season. The inducible defense response in ponderosa pine is not well understood. Our study examined the inducible defense response in ponderosa pine using traumatic mechanical wounding, and wounding with and without fungal inoculations with two different bark beetle-associated fungi (Ophiostoma minus and Grosmannia clavigera). Resin flow did not significantly increase in response to any treatment. In addition, necrotic lesion formation on the bole after fungal inoculation was minimal. Stand thinning, which has been shown to increase water availability, had no, or inconsistent, effects on inducible tree defense. Our results suggest that ponderosa pine bole defense against bark beetles and their associated fungi is primarily constitutive and not induced.

  11. Tricking the guard: exploiting plant defense for disease susceptibility.

    Science.gov (United States)

    Lorang, J; Kidarsa, T; Bradford, C S; Gilbert, B; Curtis, M; Tzeng, S-C; Maier, C S; Wolpert, T J

    2012-11-02

    Typically, pathogens deploy virulence effectors to disable defense. Plants defeat effectors with resistance proteins that guard effector targets. We found that a pathogen exploits a resistance protein by activating it to confer susceptibility in Arabidopsis. The guard mechanism of plant defense is recapitulated by interactions among victorin (an effector produced by the necrotrophic fungus Cochliobolus victoriae), TRX-h5 (a defense-associated thioredoxin), and LOV1 (an Arabidopsis susceptibility protein). In LOV1's absence, victorin inhibits TRX-h5, resulting in compromised defense but not disease by C. victoriae. In LOV1's presence, victorin binding to TRX-h5 activates LOV1 and elicits a resistance-like response that confers disease susceptibility. We propose that victorin is, or mimics, a conventional pathogen virulence effector that was defeated by LOV1 and confers virulence to C. victoriae solely because it incites defense.

  12. Why even good defenses may be bad

    International Nuclear Information System (INIS)

    Glaser, C.L.

    1984-01-01

    The current debate over whether an effective ballistic missile defense (BMD) is technically feasible and whether it could be developed and deployed has left most of the advocacy up to those supporting a BMD program. The author emphasizes the issues beyond technical feasibility in his conclusion that assured destruction may still be preferable to perfect defense in terms of reducing the probability of nuclear war. After examining a number of possible scenarios involving the US and Soviet Union, the positions of allies, and the possibility of clandestine bombs, he sees no reason to expect that a defense system would be less vulnerable or have fewer uncertainties. 29 references

  13. Depression Among Non-Daily Smokers Compared to Daily Smokers and Never-Smokers in the United States: An Emerging Problem.

    Science.gov (United States)

    Weinberger, Andrea H; Gbedemah, Misato; Wall, Melanie M; Hasin, Deborah S; Zvolensky, Michael J; Chaiton, Michael; Goodwin, Renee D

    2017-09-01

    Depression is strongly associated with daily smoking. Yet, little is known about the association between depression and non-daily smoking. The aim of this study was to investigate the prevalence of past-year depression and changes in past-year depression over time among non-daily smokers, compared to daily smokers and never-smokers, overall and stratified by age, gender, income, nicotine dependence, and cigarettes per day. Data were drawn from the National Household Survey on Drug Use (NSDUH), an annual cross-sectional study of persons aged 12 and over (total study population N = 496 805). The prevalence of past-year depression was examined annually among non-daily smokers, daily smokers, and never-smokers from 2005 to 2013 using linear trend analyses. Past-year depression was common among 10.10% of non-daily smokers, common among 10.78% of daily smokers, and 5.51% of never-smokers in 2013. The prevalence of depression increased from 2005 to 2013 among non-daily smokers (9.06% vs. 10.10%; p = .034) while there was no significant change in depression over time among daily smokers. Increases in depression among non-daily smokers occurred for both men and women and appear most pronounced youth, those smoking fewer cigarettes, and those without nicotine dependence. The prevalence of depression among non-daily smokers was equivalent to daily smokers and nearly twice that among nonsmokers. Depression appears to be increasing over time in non-daily smokers especially among youth, those who smoke less, and those without nicotine dependence. More work on the mental health of non-daily smokers is needed as this is an increasing and understudied group. This is the first study to investigate changes in the prevalence of depression among non-daily smokers compared to daily smokers and never-smokers over the past decade in a nationally representative sample of the United States. The results suggest an increase in depression among non-daily smokers over time that did not

  14. DailyMed

    Data.gov (United States)

    U.S. Department of Health & Human Services — DailyMed provides high quality information about marketed drugs. This information includes FDA labels (package inserts). This Web site provides health information...

  15. 76 FR 28001 - Meeting of the Department of Defense Wage Committee

    Science.gov (United States)

    2011-05-13

    ... DEPARTMENT OF DEFENSE Office of the Secretary Meeting of the Department of Defense Wage Committee... Department of Defense Wage Committee will be held on Tuesday, June 14, 2011, and Tuesday, June 28, 2011, at... and practices of the Department of Defense and the detailed wage data to be considered were obtained...

  16. 76 FR 16736 - Closed Meeting of the Missile Defense Advisory Committee

    Science.gov (United States)

    2011-03-25

    ... DEPARTMENT OF DEFENSE Office of the Secretary Closed Meeting of the Missile Defense Advisory Committee AGENCY: Missile Defense Agency (MDA), DoD. ACTION: Notice of closed meeting. SUMMARY: Under the...: Missile Defense Advisory Committee. Dates of Meeting: Thursday, March 24, 2011. Times: 8 a.m. to 5:30 p.m...

  17. Hybrid planar lightwave circuits for defense and aerospace applications

    Science.gov (United States)

    Zhang, Hua; Bidnyk, Serge; Yang, Shiquan; Balakrishnan, Ashok; Pearson, Matt; O'Keefe, Sean

    2010-04-01

    We present innovations in Planar Lightwave Circuits (PLCs) that make them ideally suited for use in advanced defense and aerospace applications. We discuss PLCs that contain no micro-optic components, no moving parts, pose no spark or fire hazard, are extremely small and lightweight, and are capable of transporting and processing a range of optical signals with exceptionally high performance. This PLC platform is designed for on-chip integration of active components such as lasers and detectors, along with transimpedance amplifiers and other electronics. These active components are hybridly integrated with our silica-on-silicon PLCs using fully-automated robotics and image recognition technology. This PLC approach has been successfully applied to the design and fabrication of multi-channel transceivers for aerospace applications. The chips contain hybrid DFB lasers and high-efficiency detectors, each capable of running over 10 Gb/s, with mixed digital and analog traffic multiplexed to a single optical fiber. This highlyintegrated functionality is combined onto a silicon chip smaller than 4 x 10 mm, weighing failures after extreme temperature cycling through a range of > 125 degC, and more than 2,000 hours operating at 95 degC ambient air temperature. We believe that these recent advancements in planar lightwave circuits are poised to revolutionize optical communications and interconnects in the aerospace and defense industries.

  18. Defense.gov Special Report: 2016 Fiscal Budget

    Science.gov (United States)

    Department of Defense Submit Search DEPARTMENT OF DEFENSE: FY 2016 Budget Proposal Army Reserve Chief Calls for Budget Flexibility The chief of the Army Reserve understands that the U.S. deficit is a threat to effectively. Story Obama Says He Won't Accept Budget That Shortchanges Readiness President Barack Obama

  19. A New Department of Defense Framework for Efficient Defense Support of Civil Authorities

    National Research Council Canada - National Science Library

    Liberato, Rodney

    2007-01-01

    ...) capabilities support to civilian authorities during emergencies. Hurricane Katrina added to this national attention on the role the Department of Defense should play in responding to emergencies...

  20. 76 FR 13297 - Defense Federal Acquisition Regulation Supplement; Technical Amendments

    Science.gov (United States)

    2011-03-11

    ... 215 Government procurement. Ynette R. Shelkin, Editor, Defense Acquisition Regulations System... Director, Defense Procurement and Acquisition Policy. DATES: Effective Date: March 11, 2011. Applicability... adding a section at 215.300 with a reference to Director, Defense Procurement and Acquisition Policy...