WorldWideScience

Sample records for technology defense daily

  1. Defense Technology Plan

    Science.gov (United States)

    1994-09-01

    through the insertion of advanced jamming techniques. Progress in Digital RF Memory ( DRFM ) technology ( DRFM on a chip) is the basis for advanced, low cost...DoD Department of Defense DoE Department of Energy A-2 DoT Department of Transportation DRFM Digital RF Memory DSPO Defense Support Project Office E

  2. New technology favors defense

    Energy Technology Data Exchange (ETDEWEB)

    Herolf, G. (Univ. of Stockholm (Sweden))

    1988-09-01

    Many new technological developments thus serve offensive plans. But in most cases the new technology can serve both offensive and defensive purposes. In fact, the technological trends actually favor the defense overall, partly because of some inherent weaknesses in an offensive military posture. Not only is the technology itself versatile, but some components and even some weapons now under development or in operation are suitable for strictly defensive activities. Moreover, some technologies would work much better in a defensive context than they would in the offensive missions for which they were designed. Not all proponents of nonoffensive defense would agree that defensive plans should take advantage of new technologies. The Study Group on Alternative Security Policy, for one, has warned against technical fetishism and recommends extreme caution in accepting the products of modern technology. Some analysts also prefer simple, sturdy systems to complicated, high-tech ones which tend to be fragile. Some of the technologies now under development are considered expensive, vulnerable, and easy to counteract.

  3. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  4. National Defense Industrial Association Disruptive Technologies Conference

    Science.gov (United States)

    2009-10-14

    Algorithms, MEMS • Nano ; Meta; & New Materials • Cognitive Computing • Bio-Revolution NDIA Disruptive Technologies 10/16/2009 Page-8 Forces of Change...DISTRIBUTE 2 1 st Cen t u r y St r a t eg ic Tec h n o l o g y Vec t o r s Defense Science Board 2006 Summer Study August 18, 2006 (Final) NDIA

  5. High Endoatmospheric Defense Interceptor (HEDI) technology testing program environmental assessment

    Science.gov (United States)

    Barrineau, Dru

    1989-05-01

    The High Endoatmospheric Defense Interceptor (HEDI) is one of the many technologies being considered in the strategic defense initiative (SDI) technology research program and has the potential to support the requirements for the strategic defense system. The purpose of this environmental assessment (EA) is to analyze the environmental consequences of testing activities for the HEDI technology test program in compliance with the National Environmental Policy Act. The HEDI is a technology that would employ ground-based missiles to intercept and destroy hostile submarine-launched ballistic missiles and intercontinental ballistic missiles during that portion of flight that puts the target in the high endoatmosphere (the terminal portion of an attacking missile trajectory). The HEDI vehicle would consist of a two-stage launch vehicle (booster) and kill vehicle with a conventional warhead. The basic thrust of the efforts already accomplished has been to assess the operational utility of HEDI in the context of a complete strategic defense system.

  6. Semantic Web and Inferencing Technologies for Department of Defense Systems

    Science.gov (United States)

    2014-10-01

    situation through the incorporation of Semantic Web technologies into Department of Defense (DOD) systems. This report provides a didactic ...the incorporation of Semantic Web technologies into Department of Defense (DOD) systems. This report provides a didactic overview of Description...number of changes required to “transform” one string into the other), n-gram testing (common sequences of n characters in both strings

  7. Capturing daily urban rhythms: the use of location aware technologies

    CSIR Research Space (South Africa)

    Krygsman, S

    2007-07-01

    Full Text Available on Computers in Urban Planning and Urban Management 11-13 July, 2007 Capturing daily urban rhythms: The use of location aware technologies Dr. Stephan Krygsman, Department of Logistics, University of Stellenbosch, South Africa, skrygsman...

  8. Science and Technology for Bioterrorism Defense

    Energy Technology Data Exchange (ETDEWEB)

    Fitch, J P

    2004-05-04

    The Lawrence Livermore National Laboratory (LLNL) Chemical & Biological National Security Program (CBNP) provides science, technology, and integrated systems for chemical and biological security. Our approach is to develop and field systems that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons.

  9. Terahertz Technology for Defense and Security-Related Applications

    DEFF Research Database (Denmark)

    Iwaszczuk, Krzysztof

    This thesis deals with chosen aspects of terahertz (THz) technology that have potential in defense and security-related applications. A novel method for simultaneous data acquisition in time-resolved THz spectroscopy experiments is developed. This technique is demonstrated by extracting the sheet...

  10. Defense Acquisitions: Factors Affecting Outcomes of Advanced Concept Technology Demonstrations

    Science.gov (United States)

    2002-12-01

    Since the ACTD (Advanced Concept Technology Demonstrations) program was started in 1994, a wide range of products have been tested by technology experts and military operators in realistic settings-from unmanned aerial vehicles, to friend-or-foe detection systems, to biological agent detection systems, to advanced simulation technology designed to enhance joint training. Many of these have successfully delivered new technologies to users. Though the majority of the projects that were examined, transitioned technologies to users, there are factors that hamper the ACTD process. For example: Technology has been too immature to be tested in a realistic setting, leading to cancellation of the demonstration. Military services and defense agencies have been reluctant to fund acquisition of ACTD-proven technologies, especially those focusing on joint requirements, because of competing priorities. ACTD's military utility may not have been assessed consistently. Some of the barriers identified can be addressed through efforts DOD (Department of Defense) now has underway, including an evaluation of how the ACTD process can be improved; adoption of criteria to be used to ensure technology is sufficiently mature; and placing of more attention on the end phase of the ACTD process. Other barriers, however, will be much more difficult to address in view of cultural resistance to joint initiatives and the requirements of DOD's planning and funding process.

  11. FACTORS EFFECTING TECHNOLOGY ACQUISITION DECISIONS IN NATIONAL DEFENSE PROJECTS

    OpenAIRE

    Gökhan ASTAN

    2015-01-01

    Defense Industry” (DI) not only strengthens the military power of a country, but also effects other fields of technology and economy positively and enables countries to be much more powerful in terms of their competitiveness in technology and knowledge instead of merely being a follower and a continuous customer. If a state seeks to have high-tech and capable DI the only foundation is to create a national environment which is managed based on a systematic ”Technology Management” philosophy a...

  12. Defense Manufacturing Technology Program: More Joint Projects and Tracking of Results Could Benefit Program

    National Research Council Canada - National Science Library

    2001-01-01

    The Secretary of Defense established the Defense Manufacturing Technology (ManTech) Program to develop and apply advanced manufacturing technologies to reduce the total cost and improve the manufacturing quality of weapon systems...

  13. Active, Non-Intrusive Inspection Technologies for Homeland Defense

    Energy Technology Data Exchange (ETDEWEB)

    James L. Jones

    2003-06-01

    Active, non-intrusive inspection or interrogation technologies have been used for 100 years - with the primary focus being radiographic imaging. During the last 50 years, various active interrogation systems have been investigated and most have revealed many unique and interesting capabilities and advantages that have already benefited the general public. Unfortunately, except for medical and specific industrial applications, these unique capabilities have not been widely adopted, largely due to the complexity of the technology, the overconfident reliance on passive detection systems to handle most challenges, and the unrealistic public concerns regarding radiation safety issues for a given active inspection deployment. The unique homeland security challenges facing the United States today are inviting more "out-of-the-box" solutions and are demanding the effective technological solutions that only active interrogation systems can provide. While revolutionary new solutions are always desired, these technology advancements are rare, and when found, usually take a long time to fully understand and implement for a given application. What's becoming more evident is that focusing on under-developed, but well-understood, active inspection technologies can provide many of the needed "out-of-the-box" solutions. This paper presents a brief historical overview of active interrogation. It identifies some of the major homeland defense challenges being confronted and the commercial and research technologies presently available and being pursued. Finally, the paper addresses the role of the Idaho National Engineering and Environmental Laboratory and its partner, the Idaho Accelerator Center at Idaho State University, in promoting and developing active inspection technologies for homeland defense.

  14. Information Technology Management: Defense Civilian Personnel Data System Functionality and User Satisfaction (D-2003-110)

    Science.gov (United States)

    2003-06-27

    Information Technology Management Department of Defense Office of the Inspector General June 27, 2003 AccountabilityIntegrityQuality Defense...SUBTITLE Information Technology Management : Defense Civilian Personnel Data System Functionality and User Satisfaction (D-2003-110) 5a. CONTRACT NUMBER

  15. 5th International Conference OTEH 2012 - defense technology (Proceedings review

    Directory of Open Access Journals (Sweden)

    Vlado Petar Đurković

    2013-02-01

    Full Text Available This article gives an overview of all papers and events at the Fifth International ScientificConference on Defense Technologies OTEH 2012 held in Belgrade, in the Military Technical Institute (VTI, from 18th to 19th September 2012.The paper review presents the Conference Sections by subjects and guest-lectureres as well as the institutions of all authors who actively participated at the Conference.About the ConferenceThe Fifth International Scientific Conference on Defense Technologies OTEH 2012  was held in Belgrade in the Military Technical Institute in Žarkovo, from 18th to 19thSeptember 2012..The Conference program was organized in two plenary sessions and a working part which took place in four halls.In the plenary session, two key lectures were held by eminent experts from abroad. The first lecture entitled „An adaptive remeshing technique for 3D crack growth simulations”, was given by Dr Vincent Chiaruttini (ONERA Institute, Paris, France. The second one, „New Technologies for Advanced Defence Systems”, was held by Dr Filippo Neri (Virtualabs Company, Rome, Italy.Fifteen sessions were organised at the Conference. The authors presented their works in open discussions answering questions from the audience. The average number of attendees at each session was about 40.The papers were sorted by topic areas:Aerodynamics and flight dynamics: 12 papersAircraft: 23 papersWeapon systems, ammunition, energy materials, combat vehicles: 29 papersIntegrated sensor systems and robotic systems: 16 papersTelecommunication and information systems: 18 papersMaterials and technologies: 34 papersQuality, standardization, metrology, maintenance and exploitation: 11 papersOut of 163 submitted papers for this Conference, 145 papers were accepted and distributed in an electronic form on CDs to the present authors, co-authors, guests and invitees to the Conference. The number of participants with authors and co-authors was impressive - 243. The

  16. Information Technology Management: Transition From the Automatic Digital Network to the Defense Message System

    Science.gov (United States)

    2003-04-08

    Information Technology Management Department of Defense Office of the Inspector General April 8, 2003 AccountabilityIntegrityQuality Transition From...Dates Covered (from... to) - Title and Subtitle Information Technology Management : Transition From the Automatic Digital Network to the Defense Message

  17. Accomplishing the mission of National Missile Defense with current technology

    OpenAIRE

    Criss, Michael.

    2000-01-01

    The Purpose of this thesis is to evaluate the Ballistic Missile Defense Organization's proposals for a National Missile Defense (NMD). This thesis compares the costs of missile systems that will provide a NMD, such as Patriot Advanced Capability - 3 (PAC-3), Navy Area (SM-2 Block WA), Theater High Altitude Area Defense (THAAD), Navy Theater-Wide (SM-3), and the Ground-Based Interceptor (GBI). The data gathered for this thesis included unclassified performance data and the gross cost data rele...

  18. The technology - activities of daily living questionnaire: a version with a technology-related subscale.

    Science.gov (United States)

    Muñoz-Neira, Carlos; López, Oscar L; Riveros, Rodrigo; Núñez-Huasaf, Javier; Flores, Patricia; Slachevsky, Andrea

    2012-01-01

    Information and communication technology (ICT) has become an increasingly important part of daily life. The ability to use technology is becoming essential for autonomous functioning in society. Current functional scales for patients with cognitive impairment do not evaluate the use of technology. The objective of this study was to develop and validate a new version of the Activities of Daily Living Questionnaire (ADLQ) that incorporates an ICT subscale. A new technology-based subscale was incorporated into the Spanish version of the ADLQ (SV-ADLQ), entitled the Technology version of the ADLQ (T-ADLQ). The T-ADLQ was administered to 63 caregivers of dementia patients, 21 proxies of mild cognitive impairment patients and 44 proxies of normal elderly subjects (mean age of the sample ± SD: 73.5 ± 8.30 years). We analysed the convergent validity, internal consistency, reliability cut-off point, sensitivity and specificity of the T-ADLQ. The results of the T-ADLQ were compared to the SV-ADLQ. The T-ADLQ showed significant correlations with the Mini-Mental State Examination (MMSE), the Frontal Assessment Battery (FAB) as well as other measures of functional impairment and dementia severity (MMSE: r = -0.70; FAB: r = -0.65; Functional Assessment Questionnaire: r = 0.77; Instrumental Activities of Daily Living Scale: r = -0.75; Clinical Dementia Rating Scale: r = 0.72; p questions to the ADLQ, our experience suggested that this has to be done cautiously, since the sensitivity of these additional items could vary in different populations. The T-ADLQ needs to be validated in a different population of dementia subjects. Copyright © 2012 S. Karger AG, Basel.

  19. Developing defensive aids suite technology on a virtual battlefield

    Science.gov (United States)

    Rapanotti, John L.; DeMontigny-Leboeuf, Annie; Palmarini, Marc; Cantin, Andre

    2002-07-01

    Modern anti-tank missiles and the requirement of rapid deployment are limiting the use of passive armour in protecting land vehicles. Vehicle survivability is becoming more dependent on sensors, computers and countermeasures to detect and avoid threats. The integration of various technologies into a Defensive Aids Suite (DAS) can be designed and analyzed by combining field trials and laboratory data with modeling and simulation. MATLAB is used as a quick prototyping tool to model DAS systems and facilitate transfer to other researchers. The DAS model can be transferred from MATLAB or programmed directly in ModSAF (Modular Semi-Automated Forces), which is used to construct the virtual battlefield. Through scripted input files, a fixed battle approach ensures implementation and analysis meeting the requirements of three different interests. These three communities include the scientists and engineers, military and operations research. This approach ensures the modelling of processes known to be important regardless of the level of information available about the system. A system can be modelled phenomenologically until more information is available. Further processing of the simulation can be used to optimize the vehicle for a specific mission. ModSAF will be used to analyze and plan trials and develop DAS technology for future vehicles. Survivability of a DAS-equipped vehicle can be assessed relative to a basic vehicle without a DAS. In later stages, more complete DAS systems will be analyzed to determine the optimum configuration of the DAS components and the effectiveness of a DAS-equipped vehicle for specific missions. These concepts and approach will be discussed in the paper.

  20. Defense Contractors SBIR/STTR Partnering Manual: A Primer on Technology Risk Management and Partnering Strategies

    National Research Council Canada - National Science Library

    Williams, John R

    2008-01-01

    As the world looks increasingly to technology innovation to meet the challenges of defense, security, disaster relief and increased health, many in industry have come to identify this nation's SBIR...

  1. The science, technology, and politics of ballistic missile defense

    Science.gov (United States)

    Coyle, Philip E.

    2014-05-01

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about 10 billion per year, and proposes to add about 5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  2. The science, technology, and politics of ballistic missile defense

    Energy Technology Data Exchange (ETDEWEB)

    Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

    2014-05-09

    America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

  3. Transitions in the wrong direction? Digital technologies and daily life

    DEFF Research Database (Denmark)

    Røpke, Inge; Christensen, Toke Haunstrup

    2013-01-01

    The environmental implications of information and communication technology (ICT) have been the subject of study since the early 1990s. Although previous research covers energy issues quite extensively, the treatment of the energy impacts of ICT integration in everyday life is still inadequate...

  4. An Analysis of Technology Transition Within the Department of Defense

    Science.gov (United States)

    2010-06-01

    for Savings Program TPM Technical Performance Measure TRA Technology Readiness Assessment TRL Technology Readiness Level TTI Technology...Rapid Technology Transition Program (RTT) Navy Has a charter to rapidly transition technology from any source, including those not traditionally...Metrics such as MOEs, Technical Performance Measures ( TPMs ), and Design-dependent Parameters (DDPs) should be established and monitored to ensure

  5. An Analysis of Second-Tier Arms Producing Countries’ Offset Policies: Technology Transfer and Defense Industrial Base Establishment

    Science.gov (United States)

    2008-03-01

    defense industrial base. Furthermore, countries th establish an autarkic defense industry capable of independent production rarely succeed r v...In fact, the arrival of a technologically sophisticated European defense industry came at a time when , autarkic defense U.S. to achieve its r U.S...corporations comparable in size and capabilities to U.S. companies, th competitiveness (Hartley, 2007). indigenous, autarkic defense industries cannot

  6. Exemplar Practices for Department of Defense Technology Transfer

    Science.gov (United States)

    2013-01-01

    research and development may not be commercially relevant or may be classified ( Papadakis 1995; Ham and Mowery 1998). • Defense inventions may be...211829. Rockville, MD: NLECTC. https://www.ncjrs.gov/App/publications/Abstract.aspx?id=233291. Papadakis , M. 1995. “Federal Laboratory Missions

  7. Automatic speech recognition technology development at ITT Defense Communications Division

    Science.gov (United States)

    White, George M.

    1977-01-01

    An assessment of the applications of automatic speech recognition to defense communication systems is presented. Future research efforts include investigations into the following areas: (1) dynamic programming; (2) recognition of speech degraded by noise; (3) speaker independent recognition; (4) large vocabulary recognition; (5) word spotting and continuous speech recognition; and (6) isolated word recognition.

  8. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  9. The Critical Role of Science and Technology for National Defense

    Science.gov (United States)

    2009-11-01

    capabilities. Unlike Vannevar Bush’s era, our current landscape includes a set of technologically savvy and well-resourced international peers ...this space. This environment has renewed the focus of our nation’s Science, Technology, Engineering and Math foundations.5 It is also the driver...approaches offer the promise of new machine tutors that adapt to the learning styles of students, are proactive in redirecting their misconceptions about

  10. Holding the Edge: Maintaining the Defense Technology Base

    Science.gov (United States)

    1989-04-01

    competitive position, particularly in market. high technology industries. These include the eco - nomic integration of the EC in 1992, and the fundingThe first...costly to operate than other generally have rather low priority. At some DoD 2On the amet captalization progran. see US. General Accounting Office...for each of the technologies. There is, however, significant FINDINGS divergence between the military and civilian eco - nomic sectors for each industry

  11. Using Science Driven Technologies for the Defense and Security Applications

    Science.gov (United States)

    Habib, Shahid; Zukor, Dorthy; Ambrose, Stephen D.

    2004-01-01

    For the past three decades, Earth science remote sensing technologies have been providing enormous amounts of useful data and information in broadening our understanding of our home planet as a system. This research, as it has expanded our learning process, has also generated additional questions. This has further resulted in establishing new science requirements, which have culminated in defining and pushing the state-of-the-art technology needs. NASA s Earth science program has deployed 18 highly complex satellites, with a total of 80 sensors, so far and is in a process of defining and launching multiple observing systems in the next decade. Due to the heightened security alert of the nation, researchers and technologists are paying serious attention to the use of these science driven technologies for dual use. In other words, how such sophisticated observing and measuring systems can be used in detecting multiple types of security concerns with a substantial lead time so that the appropriate law enforcement agencies can take adequate steps to defuse any potential risky scenarios. This paper examines numerous NASA technologies such as laser/lidar systems, microwave and millimeter wave technologies, optical observing systems, high performance computational techniques for rapid analyses, and imaging products that can have a tremendous pay off for security applications.

  12. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2017-03-12

    and characterizing full upper airway of obstructive sleep apnea patients supported by NIH grants. Student Theses: None Project 5: Fiberoptic...center grant consisted of 7 projects directed toward the development and translation of biomedical photonics technologies to address Joint Force Health ...metabolic, chemical and microstructural level. Imaging performance was evaluated in a hamster model for oral inflammation, cancer and wound healing

  13. DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management

    Science.gov (United States)

    2017-06-01

    DEFENSE SCIENCE AND TECHNOLOGY Adopting Best Practices Can Improve Innovation Investments and Management Report...Can Improve Innovation Investments and Management What GAO Found The eight leading companies whose practices GAO assessed take a disciplined...the figure. Incremental development improves product lines whereas disruptive development is for riskier innovative and potentially market-shifting

  14. The Department of Defense Statement on the Science and Technology Program,

    Science.gov (United States)

    1980-03-05

    transportation and disposal operations. Binary facility design as veill as maintenance and surveillance of the existing stockpile is continuing. E...the Defense Science Board, chaired by Dr. John S. Foster, examined the High Energy Laser Program. While im- pressed with technological progress to

  15. Disruptive and Sustaining Technology Development Approaches in Defense Acquisition

    Science.gov (United States)

    2014-04-30

    from the market in developing technology solutions is a viable strategy in a competitive market (Lampel & Shamsie, 2003; Mintzberg , 1979; Mintzberg ...and process. Academy of Management Review, 3(3), 546-562. Mintzberg , H. (1979). Patterns in strategy formation. International Studies of...Management & Organization, 9(3), 67-86. Mintzberg , H., & McHugh, A. (1985). Strategy formation in an adhocracy. Administrative Science Quarterly, 30(2

  16. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    Science.gov (United States)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  17. Introduction to Technologies in the Daily Lives of Individuals with Autism.

    Science.gov (United States)

    Shic, Frederick; Goodwin, Matthew

    2015-12-01

    In this introduction to the Special Issue on Technology we explore the continued evolution of technologies designed to help individuals with autism. Through review articles, empirical reports, and perspectives, we examine how far the field has come and how much further we still can go. Notably, even as we highlight the continuing need for larger empirical studies of autism-focused technology, we note how improvements in the portability, sophistication, ubiquity, and reach of daily technologies are providing new opportunities for research, education, enhancement, knowledge, and inspiration. We conclude by discussing how the next generation of technologies may leverage the increasing promise of big-data approaches to move us towards a future where technology is more personal, more relevant, and pervasively transformative.

  18. The Relationship Between Digital Technology Experience, Daily Media Exposure and Working Memory Capacity

    Directory of Open Access Journals (Sweden)

    Muhterem DİNDAR

    2016-06-01

    Full Text Available Today’s youngsters interact with digital technologies to a great extent which leads scholars to question the influence of this exposure on human cognitive structure. Through resorting to digital nativity assumptions, it is presumed that cognitive architecture of the youth may change in accordance with digital technology use. In this regard, the current study investigated the relationship between digital technology experience, daily media exposure and working memory capacity of so-called digital native participants. A total of 572 undergraduate students responded to self-report measures, which addressed years of experience for 7 different digital devices and the daily time spent for 14 different digital activities. Participants’ working memory capacity was measured through the Computation Span and the Dot Matrix Test. While the former was used to measure the phonological loop capacity, the latter was used to address the visuo-spatial sketchpad capacity. Correlational analyses revealed that neither the phonological loop capacity nor the visuo-spatial sketchpad capacity was related to digital technology experience and daily media exposure. Thus, the transformative contribution of digital technology experience to human cognitive architecture could not be observed through the current measures

  19. The Department of Defense’s Second Chasm in RFID-UID Technology Adoption

    Science.gov (United States)

    2007-12-01

    when Crest promises you whiter teeth , that is a continuous innovation. You are still brushing the same teeth in the same way with the same...of Defense. (DoDSIG, 2007) Additionally, DoD considers the cost of compliance a normal cost of doing business, and requires suppliers negotiate the... toothbrush . (Moore, 2002) pRFID and UID technologies are two types of discontinuous innovations DoD is attempting to implement within its supply chain

  20. Information Technology Management: Defense Information Systems Agency Controls of the Center for Computing Services Placed in Operation and Tests of Operating Effectiveness for the Period December 1, 2005, through July 31, 2006

    Science.gov (United States)

    2006-11-15

    F Information Technology Management Department of Defense Office of Inspector General November 15, 2006 AccountabilityIntegrityQuality Defense...Information Technology Management : Defense Information Systems Agency Controls of the Center for Computing Services Placed in Operation and Tests of

  1. Improvements of task performance in daily life after acquired brain injury using commonly available everyday technology.

    Science.gov (United States)

    Lindén, Anita; Lexell, Jan; Larsson Lund, Maria

    2011-01-01

    To investigate how individualised occupation-based interventions with commonly available everyday technology (ET) can compensate for perceived difficulties with daily life tasks after an aquired brain injury (ABI) and improve satisfaction with occupational performance. This intervention study was designed as a multiple case study according to Yin. Ten men and women with an ABI (traumatic or non-traumatic) participated. Data were collected through interviews, observations and field notes before and after the intervention and at follow-up (on average 11 weeks afterwards). The interventions focused on enabling each participant's prioritised goals related to task performance in daily life. All participants achieved all their goals by learning to use both new functions in their own familiar ET and new ET. The participant's perceived difficulties in occupational performance decreased and their satisfaction with occupational performance increased with the use of ET. An individualised intervention process, involving the use of own familiar ET or ET off-the-shelf, has the potential to compensate for perceived difficulties following an ABI and improve satisfaction with occupational performance in daily life.

  2. Impact of Hearing Aid Technology on Outcomes in Daily Life I: the Patients’ Perspective

    Science.gov (United States)

    Cox, Robyn M; Johnson, Jani A; Xu, Jingjing

    2016-01-01

    Objectives One of the challenges facing hearing care providers when recommending hearing aids is the choice of device technology level. Major manufacturers market families of hearing aids that are described as spanning the range from basic technology to premium technology. Premium technology hearing aids include acoustical processing capabilities (features) that are not found in basic technology instruments. These premium features are intended to yield improved hearing in daily life compared to basic-feature devices. However, independent research that establishes the incremental effectiveness of premium-feature devices compared to basic-feature devices is lacking. This research was designed to explore reported differences in hearing abilities for adults using premium-feature and basic-feature hearing aids in their daily lives. Design This was a single-blinded, repeated, crossover trial in which the participants were blinded. All procedures were carefully controlled to limit researcher bias. Forty-five participants used carefully fitted bilateral hearing aids for one month and then provided data to describe the hearing improvements or deficiencies noted in daily life. Typical participants were 70 years old with mild to moderate adult-onset hearing loss bilaterally. Each participant used 4 pairs of hearing aids: premium- and basic-feature devices from brands marketed by each of two major manufacturers. Participants were blinded about the devices they used and about the research questions. Results All of the outcomes were designed to capture the participant’s point of view about the benefits of the hearing aids. Three types of data were collected: change in hearing-related quality of life, extent of agreement with six positively worded statements about everyday hearing with the hearing aids, and reported preferences between the premium- and basic-feature devices from each brand as well as across all four research hearing aids combined. None of these measures yielded

  3. Impact of Hearing Aid Technology on Outcomes in Daily Life I: The Patients' Perspective.

    Science.gov (United States)

    Cox, Robyn M; Johnson, Jani A; Xu, Jingjing

    2016-01-01

    One of the challenges facing hearing care providers when recommending hearing aids is the choice of device technology level. Major manufacturers market families of hearing aids that are described as spanning the range from basic technology to premium technology. Premium technology hearing aids include acoustical processing capabilities (features) that are not found in basic technology instruments. These premium features are intended to yield improved hearing in daily life compared with basic-feature devices. However, independent research that establishes the incremental effectiveness of premium-feature devices compared with basic-feature devices is lacking. This research was designed to explore reported differences in hearing abilities for adults using premium- and basic-feature hearing aids in their daily lives. This was a single-blinded, repeated, crossover trial in which the participants were blinded. All procedures were carefully controlled to limit researcher bias. Forty-five participants used carefully fitted bilateral hearing aids for 1 month and then provided data to describe the hearing improvements or deficiencies noted in daily life. Typical participants were 70 years old with mild to moderate adult-onset hearing loss bilaterally. Each participant used four pairs of hearing aids: premium- and basic-feature devices from brands marketed by each of two major manufacturers. Participants were blinded about the devices they used and about the research questions. All of the outcomes were designed to capture the participant's point of view about the benefits of the hearing aids. Three types of data were collected: change in hearing-related quality of life, extent of agreement with six positively worded statements about everyday hearing with the hearing aids, and reported preferences between the premium- and basic-feature devices from each brand as well as across all four research hearing aids combined. None of these measures yielded a statistically significant

  4. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    Science.gov (United States)

    2006-02-24

    Information Technology Management Department of Defense Office of Inspector General February 24, 2006 AccountabilityIntegrityQuality Select Controls...00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management : Select Controls for the Information Security of the Ground-Based

  5. Vision based assistive technology for people with dementia performing activities of daily living (ADLs): an overview

    Science.gov (United States)

    As'ari, M. A.; Sheikh, U. U.

    2012-04-01

    The rapid development of intelligent assistive technology for replacing a human caregiver in assisting people with dementia performing activities of daily living (ADLs) promises in the reduction of care cost especially in training and hiring human caregiver. The main problem however, is the various kinds of sensing agents used in such system and is dependent on the intent (types of ADLs) and environment where the activity is performed. In this paper on overview of the potential of computer vision based sensing agent in assistive system and how it can be generalized and be invariant to various kind of ADLs and environment. We find that there exists a gap from the existing vision based human action recognition method in designing such system due to cognitive and physical impairment of people with dementia.

  6. THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

    2004-01-30

    The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

  7. Evaluation of the Transfer of International Traffic in Arms Regulations-Controlled Missile Defense Technology to the National Aeronautics and Space Administration (NASA)

    Science.gov (United States)

    2015-07-13

    Evaluation of the Transfer of International Traffic in Arms Regulations-Controlled Missile Defense Technology to the National Aeronautics and Space... Aeronautics and Space Administration (NASA) Visit us at www.dodig.mil Objective In response to House Report 113-446, “Howard P. ‘Buck’ McKeon...Regulations (ITAR)-controlled missile defense technology from the Missile Defense Agency (MDA) to the National Aeronautics and Space Administration (NASA

  8. Persons with moderate Alzheimer's disease use simple technology aids to manage daily activities and leisure occupation.

    Science.gov (United States)

    Lancioni, Giulio E; Singh, Nirbhay N; O'Reilly, Mark F; Sigafoos, Jeff; Renna, Caterina; Pinto, Katia; De Vanna, Floriana; Caffò, Alessandro O; Stasolla, Fabrizio

    2014-09-01

    Two studies assessed technology-aided programs to support performance of daily activities and selection/activation of music items with patients with moderate Alzheimer's disease. In Study I, four patients were presented with activity-related pictorial instructions via a computer fitted with inexpensive, commercial software. In Study II, four patients were (a) presented with different music options and (b) allowed to select and activate the preferred option via a microswitch response. Study I showed that each patient learned to perform the two activities available with percentages of correct responses exceeding 85 by the end of the intervention. Study II showed that all patients learned to choose and activate music options. Psychology students, employed in a social validation check, scored the patients' behavior within the program better than their behavior in a control situation. The relevance and usability of simplified pictorial-instruction programs and music choice programs for patients with moderate Alzheimer's disease were discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Information Technology Management: Report on Defense Civilian Pay System Controls Placed in Operation and Tests of Operating Effectiveness for the Period October 1, 2004 Through June 30, 2005

    Science.gov (United States)

    2005-09-15

    September 15, 2005 Information Technology Management Report on Defense Civilian Pay System Controls Placed in Operation and Tests of Operating...DATE 15 SEP 2005 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Information Technology Management : Report on Defense Information

  10. Information Technology Management: Report on Defense Property Accountability System Controls Placed in Operation and Test of Operating Effectiveness for the Period September 1, 2004 Through April 30, 2005

    Science.gov (United States)

    2005-07-07

    Information Technology Management Department of Defense Office of the Inspector General July 7, 2005 Report on Defense Property...number. 1. REPORT DATE 07 JUL 2005 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Information Technology Management : Report

  11. Information Technology Management: Report in Defense Business Management System Controls Placed in Operation and Tests of Operating Effectiveness for the Period October 1, 2004 through May 15, 2005

    Science.gov (United States)

    2005-08-26

    Information Technology Management Department of Defense Office of Inspector General August 26, 2005 AccountabilityIntegrityQuality Report in...REPORT DATE 26 AUG 2005 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Information Technology Management : Report in Defense

  12. Self-defense or undermining the self? Exploring the possibilities and limitations of a novel anti-rape technology.

    Science.gov (United States)

    White, Deborah; Rees, Gethin

    2014-03-01

    Despite decades of feminist-inspired law reforms, rape remains highly prevalent. While many continue to fight for broad cultural and institutional changes, some argue that more immediate interventions are required. Self-defense techniques represent a key strategy of resistance to rape, and empirical evidence suggests that women's active resistance may hold a number of positive benefits. In this essay, we compare the aims and objectives of a novel anti-rape technology, known as the Rape-aXe, with traditional self-defense techniques, focusing upon the potential for both to resist individual acts of sexual aggression and, more broadly, end gendered sexual violence.

  13. Lean Principles and Defense Information Technology Acquisition: An Investigation of the Determinants of Successful Application

    Science.gov (United States)

    Haley, M.

    2013-01-01

    The purpose of this study was to investigate whether or not there have been successful applications of lean manufacturing principles in highly variable defense IT environments. Specifically, the study assessed if implementation of the lean philosophies by a defense organization yielded repeatable, predictable results in software release schedules…

  14. Information and Communication Technologies for the Activities of Daily Living in Older Patients with Dementia: A Systematic Review.

    Science.gov (United States)

    D'Onofrio, Grazia; Sancarlo, Daniele; Ricciardi, Francesco; Panza, Francesco; Seripa, Davide; Cavallo, Filippo; Giuliani, Francesco; Greco, Antonio

    2017-01-01

    Significant innovations have been introduced in recent years in the application of information and communication technologies (ICTs) to support healthcare for patients with dementia. In the present systematic review, our goal is to keep track of ICT concepts and approaches to support the range of activities of daily living for people with dementia and to provide a snapshot of the effect that technology is having on patients' self-reliance. We reviewed the literature and identified systematic reviews of cohort studies and other authoritative reports. Our selection criteria included: (1) activities of daily living, (2) ICT, and (3) dementia. We identified 56 studies published between 2000 and 2015, of which 26 met inclusion criteria. The present systematic review revealed many ICT systems that could purportedly support the range of activities of daily living for patients with dementia. The results showed five research bodies: 1) technologies used by patients with dementia, 2) technologies used by caregivers, 3) monitoring systems, 4) ambient assistive living with ICTs, and 5) tracking and wayfinding. There is a potential for ICTs to support dementia care at home and to improve quality of life for caregivers, reducing healthcare costs and premature institutional care for these patients.

  15. A Study on: Exploring U.S. Missile Defense Requirements in 2010: What Are the Policy and Technology Challenges?

    Science.gov (United States)

    1997-04-01

    military offi- cers, law enforcement personnel, and organized crime groups are willing to engage in illegal activ- ities for a price. This willingness...Interview with Gennady G. Yanpolsky, "A New Era for Russian Defense Export," Military Technology, December 1995, p. 33. Vago Muradian, "Russia Wants...34 that have hindered ballistic missile devel- opment in the past. For example, rocket- society papers on staging problems, discussions on guid- ance

  16. The Impact of New Technologic and Molecular Advances in the Daily Practice of Gastrointestinal and Hepatobiliary Pathology.

    Science.gov (United States)

    Xue, Yue; Farris, Alton Brad; Quigley, Brian; Krasinskas, Alyssa

    2017-04-01

    The practice of anatomic pathology, and of gastrointestinal pathology in particular, has been dramatically transformed in the past decade. In addition to the multitude of diseases, syndromes, and clinical entities encountered in daily clinical practice, the increasing integration of new technologic and molecular advances into the field of gastroenterology is occurring at a fast pace. Application of these advances has challenged pathologists to correlate newer methodologies with existing morphologic criteria, which in many instances still provide the gold standard for diagnosis. This review describes the impact of new technologic and molecular advances on the daily practice of gastrointestinal and hepatobiliary pathology. We discuss new drugs that can affect the gastrointestinal tract and liver, new endoluminal techniques, new molecular tests that are often performed reflexively, new imaging techniques for evaluating hepatocellular carcinoma, and modified approaches to the gross and histologic assessment of tissues that have been exposed to neoadjuvant therapies.

  17. Planetary Defense

    Science.gov (United States)

    2016-05-01

    extraterrestrial objects. Such an organization might be an efficient way to pool capital from the many governments of the world and perhaps even from the...4 Abstract Planetary defense against asteroids should be a major concern for every government in the world. Millions of asteroids and...private sector. A second path would be the development of technology required for planetary defense for other objectives such as asteroid mining

  18. Using in-Home Monitoring Technology to Identify Deviations in Daily Routines Preceding Changes in Health Trajectory of Older Adults

    OpenAIRE

    Yefimova, Maria

    2016-01-01

    The boom of in-home monitoring technology offers unprecedented information about an individual’s interaction with the environment. A variety of low cost sensors can continuously and unobtrusively collect information about activities in the living space. Capturing early changes in the daily routines of vulnerable older adults residing in these “smart homes” may allow clinicians to predict and prevent negative health consequences through timely intervention. However, the current state of scienc...

  19. DNA Sequencing Technologies within the Chemical and Biological Defense Enterprise: How to Position the Department of Defense to Maximize the Use of These Emerging Technologies - JUPITR

    Science.gov (United States)

    2015-07-01

    information regarding virulence and antimicrobial resistance of the pathogen. (2) Assays that capture novel pathogens for advanced investigation could be...biological agent, and it provides insight into the development of novel diagnostics, surveillance methods, vaccines, and antimicrobials . The first DNA...Technologies, such as the Oxford Nanopore (Oxford Nanopore Technologies, Oxford, UK ) take a single-molecule-sequencing approach. A nanopore can

  20. Concurrent and Subsequent Associations Between Daily Digital Technology Use and High-Risk Adolescents' Mental Health Symptoms.

    Science.gov (United States)

    George, Madeleine J; Russell, Michael A; Piontak, Joy R; Odgers, Candice L

    2018-01-01

    Adolescents are spending an unprecedented amount of time using digital technologies (especially mobile technologies), and there are concerns that adolescents' constant connectivity is associated with poor mental health, particularly among at-risk adolescents. Participants included 151 adolescents at risk for mental health problems (Mage  = 13.1) who completed a baseline assessment, 30-day ecological momentary assessment, and 18 month follow-up assessment. Results from multilevel regression models showed that daily reports of both time spent using digital technologies and the number of text messages sent were associated with increased same-day attention deficit hyperactivity disorder (ADHD) and conduct disorder (CD) symptoms. Adolescents' reported digital technology usage and text messaging across the ecological momentary assessment (EMA) period was also associated with poorer self-regulation and increases in conduct problem symptoms between the baseline and follow-up assessments. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  1. ANALYSIS AND CONCEPTION DEVELOPMENT OF INFORMATION DEFENSE CID AND CLOUD PLATFORM ON THE BASE OF INTELLIGENCE TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    V. A. Vishniakov

    2014-01-01

    Full Text Available Two problems the use of intelligence technologies in information defense (ITID – creating specialized knowledge bases with threats simulation and high the security level in corporative nets and cloud computing are presented. The analysis of t wo directions of the second ITID problem: the intelligence decision support systems and the malt y-agent system use are given. As trends and conception development of intelligence technologies are the perfection of methods. models, architectures, and hard-sot ware tools for ITID in corporative systems and cloud computing.

  2. The research and application of the NDP protocol vulnerability attack and the defense technology based on SEND

    Science.gov (United States)

    Xi, Huixing

    2017-05-01

    Neighbor discovery protocol (NDP) is the underlying protocol in the IPv6 protocol, which is mainly used to solve the problem of interconnection between nodes on the same link. But with wide use of IPV6, NDP becomes the main objects of a variety of attacks due to a lack of security mechanism. The paper introduces the working principle of the NDP and methods of how the SEND protocol to enhance NDP security defense. It also analyzes and summarizes the security threats caused by the defects of the protocol itself. On the basis of the SEND protocol, the NDP data packet structure is modified to enhance the security of the SEND. An improved NDP cheating defense technology is put forward to make up the defects of the SEND protocol which can't verify the correctness of the public key and cannot bind the MAC address.

  3. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    Science.gov (United States)

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  4. 78 FR 22841 - Defense Federal Acquisition Regulation Supplement: Encouragement of Science, Technology...

    Science.gov (United States)

    2013-04-17

    ... Regulation Supplement: Encouragement of Science, Technology, Engineering, and Mathematics (STEM) Programs... contractors to develop science, technology, engineering, and mathematics (STEM) programs. FOR FURTHER... 2012, which requires DoD to encourage contractors to develop science, technology, engineering, and...

  5. Microbial Monitoring from the Frontlines to Space: Department of Defense Small Business Innovation Research Technology Aboard the International Space Station

    Science.gov (United States)

    Oubre, Cherie M.; Khodadad, Christina L.; Castro, Victoria A.; Ott, C. Mark; Flint, Stephanie; Pollack, Lawrence P.; Roman, Monserrate C.

    2017-01-01

    The RAZOR (trademark) EX, a quantitative Polymerase Chain Reaction (qPCR) instrument, is a portable, ruggedized unit that was designed for the Department of Defense (DoD) with its reagent chemistries traceable to a Small Business Innovation Research (SBIR) contract beginning in 2002. The PCR instrument's primary function post 9/11 was to enable frontline soldiers and first responders to detect biological threat agents and bioterrorism activities in remote locations to include field environments. With its success for DoD, the instrument has also been employed by other governmental agencies including Department of Homeland Security (DHS). The RAZOR (Trademark) EX underwent stringent testing by the vendor, as well as through the DoD, and was certified in 2005. In addition, the RAZOR (trademark) EX passed DHS security sponsored Stakeholder Panel on Agent Detection Assays (SPADA) rigorous evaluation in 2011. The identification and quantitation of microbial pathogens is necessary both on the ground as well as during spaceflight to maintain the health of astronauts and to prevent biofouling of equipment. Currently, culture-based monitoring technology has been adequate for short-term spaceflight missions but may not be robust enough to meet the requirements for long-duration missions. During a NASA-sponsored workshop in 2011, it was determined that the more traditional culture-based method should be replaced or supplemented with more robust technologies. NASA scientists began investigating innovative molecular technologies for future space exploration and as a result, PCR was recommended. Shortly after, NASA sponsored market research in 2012 to identify and review current, commercial, cutting edge PCR technologies for potential applicability to spaceflight operations. Scientists identified and extensively evaluated three candidate technologies with the potential to function in microgravity. After a thorough voice-of-the-customer trade study and extensive functional and

  6. Food as a Theme in Social Studies Classes: Connecting Daily Life to Technology, Economy, and Culture

    Science.gov (United States)

    Resor, Cynthia Williams

    2010-01-01

    Connecting wider economic, technological, or cultural trends to the everyday life of students can be a challenge. Food can serve as a course-long theme that helps students comprehend the essential connection between personal actions and national or international trends and develop skills of critical analysis. The author describes four activities…

  7. Extended outlook: description, utilization, and daily applications of cloud technology in radiology.

    Science.gov (United States)

    Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi

    2013-12-01

    The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.

  8. Information Technology Management: Review of the Information Security Operational Controls of the Defense Logistics Agency’s Business Systems Modernization-Energy

    Science.gov (United States)

    2006-04-24

    Information Technology Management Department of Defense Office of Inspector General April 24, 2006 AccountabilityIntegrityQuality Review of the...3. DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management : Review of the Information Security

  9. DAILY VIOLENCE LEGITIMIZED AND COMMUNITY SCHOOL IN THE CENTER OF TECHNOLOGICAL BACHELOR CHICONCUAC, MEXICO STATE

    Directory of Open Access Journals (Sweden)

    Lorena Muñoz-Padilla

    2015-01-01

    Full Text Available The following article is a description about the violence generated in the school community School Technology Center Chiconcuac (CBT Chiconcuac and the way how they become everyday through the eyes of teachers and students. A key aspect of this violence is that occur in day to day, it seems that “well” that “nothing happens” and “should be tolerated”, issues for which it is considered that this should undergo reflection the school community. The letter is part of a series of reflections that have been made through peace studies the graduate “Education for peace and coexistence in schools” taught by the Autonomous Indigenous University of Mexico.

  10. Determining core capabilities in chemical and biological defense science and technology

    National Research Council Canada - National Science Library

    Board on Chemical Sciences and Technology; Board on Life Sciences; Division on Earth and Life Studies; National Research Council

    2012-01-01

    .... To accomplish this objective, the CBDP must maintain robust science and technology capabilities to support the research, development, testing, and evaluation required for the creation and validation...

  11. The development of coal-based technologies for Department of Defense facilities: Phase 1 final report. Volume 1: Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Pisupati, S.V. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1997-01-31

    The first phase of a three-phase project investigating the development of coal-based technologies for Department of Defense facilities has been completed. The objectives of the project are to: decrease DOD`s dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase 1 activities were focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. The specific objective in Phase 1 was to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWM or DMC. This was achieved through a project consisting of fundamental, pilot-sale, and demonstration-scale activities investigating coal beneficiation and preparation, and MCWM and DMC combustion performance. In addition, detailed engineering designs and an economic analysis were conducted for a boiler located at the Naval Surface Warfare Center, near Crane, Indiana. Results are reported on MCWM and DMC combustion performance evaluation; engineering design; and cost/economic analysis.

  12. The development of coal-based technologies for Department of Defense Facilities. Interim report, March 27, 1993--July 30, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1993-09-24

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first phase of the program is underway. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phase I are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  13. Which indicators for measuring the daily physical activity? An overview on the challenges and technology limits for Telehealth applications.

    Science.gov (United States)

    Tagliente, Irene; Solvoll, Terje; Trieste, Leopoldo; De Cecco, Carlo N; Murgia, Fabrizio; Bella, Sergio

    2016-09-14

    Obesity is one of the biggest drivers of preventable chronic diseases and healthcare costs in Worldwide. Different prevention activities are suggested. By monitoring daily energy expenditure (EE) could be possible make personalized diets and programming physical activity. In this, physical inactivity is one of the most important public health problems. Some studies refer the effort of the international community in promoting physical activities. Physical activity can be promoted only by increasing citizens' empowerment on taking care of their health, and it passes from the improving of individual information. Technology can offer solutions and metrics for monitoring and measuring daily activity by interacting with individuals, sharing information and feedbacks. In this study we review indicators of total energy expenditure and weaknesses of available devices in assessing these parameters. Literature review and technology testing EuNetHta core model. For the clinical aspects, it is fundamental to take into account all the factor that can influence the personal energy expenditure as: heart rate, blood pressure and thermoregulation (influenced by the body temperature). In this study we focused the attention on the importance of tools to encourage the physical activity. We made an analysis of the factor that can influence the right analysis of energy expenditure and at the same time the energy regime. A punctual monitoring of the exercise regime could be helpful in Telemedicine application as Telemonitorig. More study are needed to value the impact of physical activity tracker in Telemonitorig protocols. On the assessment of the energy expenditure, critical issues are related to the physiological data acquisition. Sensors connected with mobile devices could be important tools for disease prevention and interventions affecting health behaviors. New devices applications are potential useful for telemedicine assistance, but security of data and the related communication

  14. Planetary Defense is More Than Science and Technology: Policy, People, and Disaster Management

    Science.gov (United States)

    Harrison, A. A.

    2009-12-01

    Physical scientists and engineers who work to identify and then deflect or destroy threatening Near Earth Objects deserve the support of colleagues who have a thorough understanding of human psychology, society and culture. Behavioral and social scientists can help build governmental and public support for vigorous and comprehensive programs of planetary defense as well as apply their work to minimize the human cost of NEO threats and impacts. Tasks include preparing the public for a succession of possible threats of differing levels; developing effective warning and evacuation strategies; and supporting residents of affected areas during the impact and recovery phases. Although much can be learned from the pre-existing disaster literature, it is important to remain mindful of differences between asteroid or comet impacts and other natural disasters such as hurricanes and earthquakes. After identifying widespread but erroneous stereotypes that exaggerate human weakness and interfere with effective disaster planning, we turn to models whereby international, national, and regional organizations help local communities and citizens develop the skills, attitudes and resources that they need to help protect their own welfare. These models view residents of disaster areas as part of the solution as well as part of the problem, acknowledge dangers and disruptions outside of the immediate impact area, and demand high sensitivity to political and cultural issues. We conclude with a brief discussion of strategies for preserving the human legacy under worst-case scenarios including the construction and administration of survival communities and sending time capsules into space. Anthropology, political science, psychology and sociology are already contributing to astrobiology and SETI, and it is time for researchers and practitioners in these areas to become conspicuous partners in the pursuit of planetary defense.

  15. Counterproliferation strategy: The influence of technology, budget, and arms control on theater missile defenses. Strategic research project

    Energy Technology Data Exchange (ETDEWEB)

    Parlier, G.H.

    1996-05-20

    This paper describes the historical evolution of the theater missile threat during World War II and the Persian Gulf War, and analyzes current technological challenges, budgetary pressures, and arms control restraints which constrain the development and deployment of effective theater missile defenses. The impact of these trends on strategic concepts as outlined in the National Military Strategy and their implications for attaining national policy objectives is assessed. A systems approach is used to described analyze, and evaluate the effectiveness of emerging counterproliferation strategy within the framework of an ends-ways-means strategy formulation paradigm. I conclude that current trends will lead to a self-deterring strategy: resources are inadequate to support the ways we intend to achieve our national objectives. Recommendations are made to eliminate unacceptable risk and enhance the concept of `extended conventional deterrence` consistent with U.S. national values and security interests for our role in a new world order.

  16. Overview of the Defense Programs Research and Technology Development Program for Fiscal Year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This documents presents a programmatic overview and program element plan summaries for conceptual design and assessment; physics; computation and modeling; system engineering science and technology; electronics, photonics, sensors, and mechanical components; chemistry and materials; special nuclear materials, tritium, and explosives.

  17. Defense Contractors SBIR/STTR Partnering Manual: A Primer on Technology Risk Management and Partnering Strategies

    Science.gov (United States)

    2008-08-01

    Gantt charts to link prospective funding sources with successive technology matura- tion milestones and responsible authorities, also provide succinct...2 Managed Institutionalize a Managed Process Establish org . policy Plan the process Provide resources Assign Responsibility Train

  18. The Department of Defense Critical Technologies Plan for the Committees on Armed Services United States Congress

    Science.gov (United States)

    1991-05-01

    kinetic energy penetrator, is wcll devoped and they could have certain a.1Kantages over US technology in terms of armor penetration. The Soviets have a...at u oeing developed for low signature solid fuel applications. Glycidyl Azide Polymer (GAP)-Hydroxy-terminated long chain polymer in propellant...extensive use of probes coupled with PCR (polymerase chain reaction) technology. The virtual explosion of these techniques is expected to produce new

  19. The development of coal-based technologies for Department of Defense facilities. Technical progress report, September 1995 - March 1996

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Pisupati, S.V.; Scaroni, A.W. [and others

    1996-10-01

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, the Phase I final report was completed. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included completing a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work continued on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filtering device will be used to demonstrate a smaller and more efficient filtering device for retrofit applications. Work related to coal preparation and utilization, and the economic analysis was primarily focused on preparing the final report. Work in Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  20. Defining Moments: Selected Highlights from 25 Years of Missile Defense Technology Development and Transfer. A Technology Applications Report

    Science.gov (United States)

    2006-05-23

    the fibers could be manufactured and effectively used. MATECH’s equipment for making HfC fibers resembles a pasta machine. It uses solid pre-ceramic...40 (Heat) Sinks in Space (Metal Matrix Cast Composites ...72 Flexing Polymer Muscles ( Composite Technology Development, Inc

  1. Detection of activities of daily living impairment in Alzheimer's disease and mild cognitive impairment using information and communication technology

    Directory of Open Access Journals (Sweden)

    Sacco G

    2012-12-01

    Full Text Available Guillaume Sacco,1–3 Véronique Joumier,1,4 Nelly Darmon,1 Arnaud Dechamps,1,5 Alexandre Derreumaux,1,3 Ji-Hyun Lee,2 Julie Piano,2 Nathalie Bordone,2 Alexandra Konig,1,6 Bernard Teboul,3 Renaud David,1,2 Olivier Guerin,1,3 François Bremond,1,4 Philippe Robert1,21EA CoBTeK, Université de Nice Sophia-Antipolis, 2Centre Mémoire de Ressource et de Recherche, CHU de Nice, 3Plateforme Patient du Centre d'Innovation et d'Usage en Santé, CHU de Nice, 4Equipe Stars, Institut National de Recherche en Informatique et en Automatique (INRIA, Sophia-Antipolis, France; 5University of Pancasila, Department of Psychology, Jakarta, Indonesia; 6University of Maastricht, Faculty of Psychology and Neuropsychology, Department of Psychiatry and Neuropsychology, Maastricht, The NetherlandsBackground: One of the key clinical features of Alzheimer's disease (AD is impairment in daily functioning. Patients with mild cognitive impairment (MCI also commonly have mild problems performing complex tasks. Information and communication technology (ICT, particularly techniques involving imaging and video processing, is of interest in order to improve assessment. The overall aim of this study is to demonstrate that it is possible using a video monitoring system to obtain a quantifiable assessment of instrumental activities of daily living (IADLs in AD and in MCI.Methods: The aim of the study is to propose a daily activity scenario (DAS score that detects functional impairment using ICTs in AD and MCI compared with normal control group (NC. Sixty-four participants over 65 years old were included: 16 AD matched with 10 NC for protocol 1 (P1 and 19 MCI matched with 19 NC for protocol 2 (P2. Each participant was asked to undertake a set of daily tasks in the setting of a “smart home” equipped with two video cameras and everyday objects for use in activities of daily living (8 IADLs for P1 and 11 for P2, plus 4 temporal execution constraints. The DAS score was then computed

  2. An Illustrative Case Study for Twentieth Century Defense Planners: The Technology and Politics of United States Coastal Defense, 1880-1898.

    Science.gov (United States)

    1980-04-24

    they could be built when ]lWalter Millis, Arms and Men: A Study in American Military History (New York: Putnam , 1956), pp. 151-152. 12Huntington, The...34United States Coast Defenses." Review of Reviews 14 (September 1896): 327-328. 156 Herbert, Hilary A. "The Fifty Million Appropriation and Its

  3. Defining the Technology Transition Manager within the Acquisition Framework of the Department of Defense

    Science.gov (United States)

    2010-03-01

    aforementioned qualities, the TTM must also be a people person. TTMs cannot be introverts . The job requires them to go out and find the connections...quality for TTMs. Additionally, TTMs cannot be introverts . The job requires them to go out and find connections, establish relationships, and...Technology] [ Extrovert ] [Fast Learner] [Flexibility] [Forward Thinker] [Handle Responsibility] [Honest] [Impartial] [Innovative] [Intelligent] [Leader

  4. Defense-Wide Research and Development Near Term Energy-Efficient Technologies Projects

    Science.gov (United States)

    2011-02-18

    The Mobile Waste to Energy program is assessing technology that converts waste to liquid fuel in a scalable mobile unit that could potentially be...Acquisi tion Po licy to prepare correspondence to thc DLA Contracti ng Workforce remi nding them of their responsibility to post contmct award

  5. Accelerating Technology Transition: Bridging the Valley of Death for Materials and Processes in Defense Systems

    Science.gov (United States)

    2004-01-01

    likely be unsuccessful. Adoption of Best Practices Methods for encouraging movement toward the best practices described above are not obvious... hippie culture. When East Coast corporate leaders traveled to PARC, they noted disapprovingly the beanbag chairs, the endless volleyball games, and the...www.acq.osd.mil/ip/ip_products.html. Accessed July 2004. 32 ACCELERATING TECHNOLOGY TRANSITION likely be unsuccessful. Methods for encouraging movement

  6. Analysis of Expedited Defense Contracting Methods in the Acquisition of Emerging Technology

    Science.gov (United States)

    2016-12-01

    briefs to solve the identified 14 technological shortcomings. After they review solution briefs, DIUx contacts the vendor within 30 days if they are...trying to hire someone smart . You have to pay them more than other organizations to hire them and to retain them. If you tell a company with new...feedback from the acquisition community revealed that we need to view the market strategically, from the lenses of profitability, market size, and market

  7. 75 FR 52732 - Renewal of Department of Defense Federal Advisory Committee; Missile Defense Advisory Committee

    Science.gov (United States)

    2010-08-27

    ... Secretary of Defense for Acquisition, Technology & Logistics and the Director, Missile Defense Agency... System. The Under Secretary of Defense for Acquisition, Technology and Logistics or designee may act upon.... The Under Secretary of Defense for Acquisition, Technology & Logistics or designee, in keeping with...

  8. Prilog kvalitetu u odbrambenim tehnologijama sa aspekta logističkih potreba / Contribution to the quality factor in defense technologies from the standpoint of logistic needs

    Directory of Open Access Journals (Sweden)

    Branko Đedović

    2004-09-01

    Full Text Available Nove krize i izazovi kao oblici reagovanja nametnuli su potrebu da ekonomski i vojno jake, industrijski i tehnološki razvijene zemlje jačaju faktor kvaliteta u odbrambenim tehnologijama u funkciji demonstracije vojne sile i tehnološke moći. Odbrambene tehnologije i savremene strategije su u komplementarnom odnosu i uzročno-posledičnoj vezi. Brze tehnološke promene neizbežno zahtevaju projektovanje i programiranje ključnih parametara kvaliteta, kako bi sinergijski efekat dejstva tehnike i taktike imali optimalno postizanje cilja. Operativni izraz osnovnih činilaca kvaliteta ogleda se u logističkim postavkama podrške borbenim dejstvima i kriterijumima efikasnosti i gotovosti za upotrebu. Sistem menadžmenta kvaliteta u odbrambenim tehnologijama, u kontekstu logističkih potreba, omogućuje kvalitetan opis i pouzdanu predikciju u oblasti realizacije zadataka. / Economically and military strong industrial and technologically developed countries face rising crises and challenges as reactions which impose the need of strengthening the quality factor in defense technologies as a demonstration of military force and technological supremacy. Being in the relation of cause and effect, defense technologies and modern strategies complement each other. Fast technological changes require design and programming of quality key parameters in order to achieve an optimum goal through the synergy of technology and tactics. The operational expression of basic quality parameters reflects in the logistic support prerequisites for combat actions as well as for efficiency and combat readiness criteria. The quality management system in defense technologies enables a high-quality description and a reliable prediction of mission realization.

  9. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  10. 76 FR 6766 - Meeting of the Defense Science Board

    Science.gov (United States)

    2011-02-08

    ... the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on... Secretary of Defense (Acquisition, Technology and Logistics), with the coordination of the DoD Office of...

  11. Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    malaria, development of antiparasitic drugs, identification of antiparasitic drug resistance patterns, identification and control of insect vectors for...Atovoquone proguanil • Artelinic acid • Floxacrine • Countermeasures to drug resistance • Topical antiparasitic drugs MD12J00AN MD12’J00AN DTO...Next gen rotorcraft - Enhanced Apache - Bird Dog DTO 4 Figure I.11. Rotary Wing Vehicles SUB-AREA FY95 FY96 FY97 FY98 FY99 FY00 FY01 FY02 FY03

  12. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

  13. Unfolding Green Defense

    DEFF Research Database (Denmark)

    Larsen, Kristian Knus

    2015-01-01

    to inform and support the further development of green solutions by unfolding how green technologies and green strategies have been developed and used to handle current security challenges. The report, initially, focuses on the security challenges that are being linked to green defense, namely fuel...... consumption in military operations, defense expenditure, energy security, and global climate change. The report then proceeds to introduce the NATO Green Defence Framework before exploring specific current uses of green technologies and green strategies for defense. The report concludes that a number...... of political, military, organizational, and technological challenges and possibilities are related to the development of green solutions for defense. Based on this conclusion the report argues that it is essential to comprehensively describe how a green solution is linked to a security challenge to develop...

  14. Concurrent and Subsequent Associations between Daily Digital Technology Use and High-Risk Adolescents' Mental Health Symptoms

    Science.gov (United States)

    George, Madeleine J.; Russell, Michael A.; Piontak, Joy R.; Odgers, Candice L.

    2018-01-01

    Adolescents are spending an unprecedented amount of time using digital technologies (especially mobile technologies), and there are concerns that adolescents' constant connectivity is associated with poor mental health, particularly among at-risk adolescents. Participants included 151 adolescents at risk for mental health problems (M[subscript…

  15. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  16. Cross-sectional associations between daily rest periods during weekdays and psychological distress, non-restorative sleep, fatigue, and work performance among information technology workers.

    Science.gov (United States)

    Tsuchiya, Masao; Takahashi, Masaya; Miki, Keiichi; Kubo, Tomohide; Izawa, Shuhei

    2017-04-07

    A daily rest period (DRP; rest taken from daily work during a 24 h period), is essential to work recovery. This study examined DRPs' distribution and association with health outcomes among information technology workers recruited from an internet panel (N=1,811). Participants completed a web questionnaire examining psychological distress as a primary outcome, along with non-restorative sleep, fatigue (stress reaction), and work performance. Logistic regression analysis showed elevated psychological distress when DRP was working and commuting hours. After the above adjustment, similar associations were found with non-restorative sleep and fatigue, but not work performance, when DRP was <12 h. These findings constitute the first analysis of a dose-response relationship between DRP and subjective health outcomes among white-collar workers.

  17. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1994--September 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Morrison, J.L. [and others

    1995-04-14

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. Activities this reporting period included performing coal beneficiation/preparation studies, conducting combustion performance evaluations, preparing retrofit engineering designs, determining retrofit economics, and installing a micronized coal-water mixture (MCWM) circuit.

  18. Technology-Aided Pictorial Cues to Support the Performance of Daily Activities by Persons with Moderate Alzheimer's Disease

    Science.gov (United States)

    Lancioni, Giulio E.; Perilli, Viviana; Singh, Nirbhay N.; O'Reilly, Mark F.; Sigafoos, Jeff; Cassano, Germana; Pinto, Katia; Minervini, Mauro G.; Oliva, Doretta

    2012-01-01

    We developed a technology-aided intervention strategy relying on pictorial cues alone or in combination with verbal instructions and assessed these two versions of the strategy with three persons with moderate Alzheimer's disease. In Section I of the study, the strategy version with pictorial cues plus verbal instructions was compared with an…

  19. The Influence of Politics, Technology, and Asia on the Future of US Missile Defense (Walker Paper, Number 7)

    Science.gov (United States)

    2007-08-01

    seminars with Professors Theodore Postol (MIT), Rob Pfaltzgraff (Tufts/Fletcher School), Neta Crawford (Boston University), and Don Babai (Harvard...AGAIN 18 2. Wikipedia, “Starfish Prime,” http://en.wikipedia.org/wiki/Starfish_Prime. 3. Prof. Theodore Postol , MIT, interview by the author, October...advanced capabilities 3 (PAC-3) and terminal high-altitude area defense ( THAAD ) as well as the Navy’s Aegis BMD system. These systems have the most

  20. Cognitive Engineering of Advanced Information Technology for Air Force Systems Design and Deployment: Prototype for Air Defense Intelligence and Operations

    Science.gov (United States)

    1989-10-01

    Wason , P.C. (1960) "On the Failure to Eliminate Hypotheses in a Conceptual Task ," Quarterly Journal of Experimental Psychology, 12: 129-140. Watson...10 SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO NO. NO ACCESSION NO 62202F 1 7184 27 I10 11 TITLE (Include Secqrity Clasficatio...of tasks and sub- tasks are identified and organized. Strategic air defense operations are examined in the r context of decision-making and planning

  1. Defense on the Move: Ant-Based Cyber Defense

    Energy Technology Data Exchange (ETDEWEB)

    Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

    2014-04-15

    Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

  2. Defense Advanced Research Projects Agency: Key Factors Drive Transition of Technologies, but Better Training and Data Dissemination Can Increase Success

    Science.gov (United States)

    2015-11-01

    environments in which Navy ships often operate. Falcon Combined-cycle Engine Technology The program developed advanced hypersonic turbine engine...technologies for use with a separately developed hypersonic cruise vehicle. Nastic Materials The program developed controllable, active materials...program integrated various commercial navigation technologies into a single unit that provided divers and smaller diving propulsion devices with an

  3. The bond as a soft technology in the daily routine of the Family Health Strategy: perception of the user

    Directory of Open Access Journals (Sweden)

    Bianca Pozza dos Santos

    Full Text Available Objective.This study aimed to analyze the production of a bond between users and health care professionals in a Family Health Unit (FHU. Methods. This was a qualitative, descriptive study, with 33 hypertensive and/or diabetic users. Interviews were transcribed, analyzed and data were compared to the literature. Results. The users who have been accessing the FHU for years stated that the bond with professionals has grown weak, it is a fragile bond. When it does exist, it is directed toward some professionals in the team. A disruption in the bond was also mentioned in some situations, owing to individual issues. Establishment of a bond between the user and the health care professionals in the reference FHU consists of a soft technology. Therefore, it impacts quality of health care and the prevention and management of chronic diseases. Conclusion. Establishment of a bond is essential for health care professionals to become references for the users of health care services.

  4. Detection of activities of daily living impairment in Alzheimer’s disease and mild cognitive impairment using information and communication technology

    Science.gov (United States)

    Sacco, Guillaume; Joumier, Véronique; Darmon, Nelly; Dechamps, Arnaud; Derreumaux, Alexandre; Lee, Ji-Hyun; Piano, Julie; Bordone, Nathalie; Konig, Alexandra; Teboul, Bernard; David, Renaud; Guerin, Olivier; Bremond, François; Robert, Philippe

    2012-01-01

    Background One of the key clinical features of Alzheimer’s disease (AD) is impairment in daily functioning. Patients with mild cognitive impairment (MCI) also commonly have mild problems performing complex tasks. Information and communication technology (ICT), particularly techniques involving imaging and video processing, is of interest in order to improve assessment. The overall aim of this study is to demonstrate that it is possible using a video monitoring system to obtain a quantifiable assessment of instrumental activities of daily living (IADLs) in AD and in MCI. Methods The aim of the study is to propose a daily activity scenario (DAS) score that detects functional impairment using ICTs in AD and MCI compared with normal control group (NC). Sixty-four participants over 65 years old were included: 16 AD matched with 10 NC for protocol 1 (P1) and 19 MCI matched with 19 NC for protocol 2 (P2). Each participant was asked to undertake a set of daily tasks in the setting of a “smart home” equipped with two video cameras and everyday objects for use in activities of daily living (8 IADLs for P1 and 11 for P2, plus 4 temporal execution constraints). The DAS score was then computed from quantitative and qualitative parameters collected from video recordings. Results In P1, the DAS score differentiated AD (DASAD,P1 = 0.47, 95% confidence interval [CI] 0.38–0.56) from NC (DASNC,P1 = 0.71, 95% CI 0.68–0.74). In P2, the DAS score differentiated MCI (DASMCI,P2 = 0.11, 95% CI 0.05–0.16) and NC (DASNC,P2 = 0.36, 95% CI 0.26–0.45). Conclusion In conclusion, this study outlines the interest of a novel tool coming from the ICT world for the assessment of functional impairment in AD and MCI. The derived DAS scores provide a pragmatic, ecological, objective measurement which may improve the prediction of future dementia, be used as an outcome measurement in clinical trials and lead to earlier therapeutic intervention. PMID:23271900

  5. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, September 28, 1992--March 27, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Scaroni, A.W.; Hogg, R. [and others

    1993-05-13

    The US Department of Defense (DOD), through an Interagency Agreement with the US Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first phase of the program is underway. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water mixtures (MCWMs) and dry, micronized coal (MC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and pre-combustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash and high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phase I are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil- designed watertube boiler located on a DOD installation to fire either MCWM or MC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; (5) Final Report/Submission of Design Package.

  6. The text telephone as an empowering technology in the daily lives of deaf people-A qualitative study.

    Science.gov (United States)

    Roos, Carin; Wengelin, Åsa

    2016-01-01

    Text-telephone technology (TTY) has been used for communication between deaf people since 1964. There is a gap in the scientific knowledge about the influence this may have had especially in relation to effective participation in society as well as the feeling of capability, confidence and collective meaningfulness. The aim of the present paper is, first, to disentangle the different aspects of TTY as an empowering artifact; and, second, to explore the role of TTY in their lives. To provide a framework for the empirical analysis, the paper draws on Empowerment Theory: personal control, a proactive approach to life, and a critical awareness of one's socio-political environment. Twenty-four people aged 16-64 with Swedish Sign Language (SSL) as their first language were interviewed. The findings indicate that the introduction of the TTY was of great importance for self-esteem, equality and independence. The findings show that feelings of empowerment are closely linked to language use and contextually driven, and it is in interaction between deaf and hearing that such feelings arise (or not). The results indicate the need for further research into Deaf people's use of other means of interacting, using modern technique for example in social digital media and interactive platforms.

  7. Development of a Proxy-Free Objective Assessment Tool of Instrumental Activities of Daily Living in Mild Cognitive Impairment Using Smart Home Technologies.

    Science.gov (United States)

    Jekel, Katrin; Damian, Marinella; Storf, Holger; Hausner, Lucrezia; Frölich, Lutz

    2016-01-01

    The assessment of activities of daily living (ADL) is essential for dementia diagnostics. Even in mild cognitive impairment (MCI), subtle deficits in instrumental ADL (IADL) may occur and signal a higher risk of conversion to dementia. Thus, sensitive and reliable ADL assessment tools are important. Smart homes equipped with sensor technology and video cameras may provide a proxy-free assessment tool for the detection of IADL deficits. The aim of this paper is to investigate the potential of a smart home environment for the assessment of IADL in MCI. The smart home consisted of a two-room flat equipped with activity sensors and video cameras. Participants with either MCI or healthy controls (HC) had to solve a standardized set of six tasks, e.g., meal preparation, telephone use, and finding objects in the flat. MCI participants needed more time (1384 versus 938 seconds, p smart home technologies offer the chance for an objective and ecologically valid assessment of IADL. It can be analyzed not only whether a task is successfully completed but also how it is completed. Future studies should concentrate on the development of automated detection of IADL deficits.

  8. Daily Fecundability

    Directory of Open Access Journals (Sweden)

    2000-09-01

    Full Text Available This multicentre study has produced a database of 7017 menstrual cycles contributed by 881 women. It provides improved knowledge on length and location of the "fertile window" (identified as of up to 12 days duration and the pattern and level of daily conception probability. The day of ovulation was identified in each cycle from records of basal body temperature and mucus symptoms. By referencing days of intercourse to the surrogate ovulation markers, estimates of daily fecundability were computed either directly or by the Schwartz model, both for single and multiple acts of intercourse in the fertile window. The relationship between coital pattern and fecundability has been explored. Univariate analysis underlines the significant link with fecundability only of the woman's reproductive history.

  9. Needed Actions within Defense Acquisitions Based on a Forecast of Future Mobile Information and Communications Technologies Deployed in Austere Environments

    Science.gov (United States)

    2013-03-01

    will be purely qualitative in nature; no statistical analyses will be performed. Summary This chapter introduced the overall purpose of this...Morphology Analysis and Conjoint Analysis of Patent Information. Technological Forecasting and Societal Change, 69(5), 495-506. Zolingen, S., Klaassen, C

  10. Information Technology Management: Report on Defense Information Systems Agency, Center for Computing Services: Controls Placed in Operation and Tests of Operating Effectiveness for the Period October 1, 2004 Through April 30, 2005

    Science.gov (United States)

    2005-09-06

    currently valid OMB control number. 1. REPORT DATE 06 SEP 2005 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Information Technology ... Management : Report on Defense Information Systems Agency, Center for Computing Services Controls Placed in Operation and Tests of Operating

  11. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, March 28, 1995--September 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Hatcher, P.; Knicker, H. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-21

    The U.S. Department of Defense (DOD), through the Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Mixture Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Activities this reporting period are summarized by phase. During this reporting period, preparation of the Phase I final report continued. Work on Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations included initiating a study to identify appropriate SO{sub 2} and NO{sub x} control technologies for coal-fired industrial boilers. In addition, work started on the design of a ceramic filtering device for installation on the demonstration boiler. The ceramic filter device will be used to demonstrate a more compact and efficient filtering device for retrofit applications. Coal preparation and utilization activities, and the economic analysis were completed and work focused on preparing the final report. Work on Phase III focused on coal preparation studies and economic analyses of coal use. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. The economic study focused on selecting incentives for commercialization of coal using technologies, community sensitivity to coal usage, regional economic impacts of new coal utilization technologies, and constructing a national energy portfolio.

  12. The development of coal-based technologies for Department of Defense facilities. Semiannual technical progress report, September 28, 1993--March 27, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R.; Shepard, J.F.; Scaroni, A.W.; Hogg, R.; Chander, S.; Cho, H.; Ityokumbul, M.T.; Klima, M.S. [and others

    1994-11-30

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first two phases of the program are underway. To achieve the objectives of the program, a team of researchers was assembled. Phase I activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFS) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase II research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and precombustion (i.e., slagging combustion and/or gasification) strategies for the utilization of high ash, high sulfur coals. Phase III activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phases I and II are described below. The objective in Phase I is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program consisting of the following five tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package.

  13. Object/Shape Recognition Technology: An Assessment of the Feasibility of Implementation at Defense Logistics Agency Disposition Services

    Science.gov (United States)

    2015-02-25

    LOGISTICS AGENCY DISPOSmON SERVICES 6. AUTHOR(S) Ignacio A. Juarez 7. PERFORMING ORGANIZATION NA:i\\ IIE (S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION...technology readiness assessment. This review provides a background and suggests a method to identify, evaluate and develop a solution to the DLA DS’s...considered and alternatives must be analyzed to showcase which one provides a greater impact and solution to meet user needs. In the United States

  14. Innovative science and technology (IST) in support of SDI (Strategic Defense Initiative) BM/C3 (Battle Management/Command, Control and Communications). Final report, June 1987-March 1988

    Energy Technology Data Exchange (ETDEWEB)

    Balko, B.; Albini, F.A.; Cohen, L.; Penner, S.S.; Sworder, D.D.

    1988-08-01

    Battle Management and Command, Control and Communications (BM/C3) issues in the Strategic Defense Initiative (SDI) context were discussed at a two-day workshop at the Institute for Defense Analyses (IDA). Another workshop-probed civilian systems that require handling of large amounts of data and that have fault-tolerant features that may be useful in resolving the SDI BM/C3 problems. The findings are summarized in this report, with special emphasis on possible research to be supported by the Innovative Science and Technology Office of SDIO.

  15. Development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, September 28, 1996--March 27, 1997

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Miller, S.F.; Pisupati, S.V. [and others

    1997-07-22

    The U.S. Department of Defense (DOD), through an Interagency Agreement with the U.S. Department of Energy (DOE), has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of developing technologies which can potentially decrease DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Work in Phase III focused on coal preparation studies, pilot-scale NO{sub x} reduction studies, economic analyses of coal use, and evaluation of deeply-cleaned coal as boiler fuel. Coal preparation studies were focused on continuing activities on particle size control, physical separations, surface-based separation processes, and dry processing. Preliminary pilot-scale NO{sub x} reduction catalyst tests were conducted when firing natural gas in Penn State`s down-fired combustor. This is the first step in the scale-up of bench-scale results obtained in Phase II to the demonstration boiler scale when firing coal. The economic study focused on community sensitivity to coal usage, regional/national economic impacts of new coal utilization technologies, and constructing a national energy portfolio. The evaluation of deeply-cleaned coal as boiler fuel included installing a ribbon mixer into Penn State`s micronized coal-water mixture circuit for reentraining filter cake. In addition, three cleaned coals were received from CQ Inc. and three cleaned coals were received from Cyprus-Amax.

  16. The Evolving Relationship Between Technology and National Security in China: Innovation, Defense Transformation, and China’s Place in the Global Technology Order

    Science.gov (United States)

    2016-02-12

    13, . : , Zuoyue_Wang. “The Early Republic: The Warlords, Military Technology, the New Culture Movement and the Birth of China’s Scientific Community...Power", in Graeme P. Herd, ed., Great Powers and Strategic Stability in the 21st Century: Competing Visions of World Order, New York: Routledge...Santillanez, Robson, Elizabeth 0.23 Yang, Fan 0.37 1.02 4 ...... ...... Scientific Progress Scientific Progress and Accomplishments Final Report of the

  17. Technology Assessment: Democracy’s Crucible, the Future of Science and Technology, and Implications for Our Defense in the Twenty-first Century

    Science.gov (United States)

    2010-01-01

    security en­ vironment. Then there is yet a third dimension which eludes easy analysis. It entails space, cyber, nano , and micro technologies which...global security apparatus. Combining bionics , robotics, and new synthetic chemical properties could result in new “cy­ borg” outcomes or derivative...or stronger people can be developed through cloning. Robotics, bio­ mechanical hybrids, self-replicating nanobots, and emerging excursions into nano

  18. CMC Participation in the Regional Centre for Strategic Studies (RCSS) Workshop: Defense, Technology and Cooperative Security in South Asia

    Energy Technology Data Exchange (ETDEWEB)

    Biringer, K.L.; Olsen, J.

    1998-11-01

    As an ongoing part of the collaborative efforts between the Cooperative Monitoring Center (CMC) at Sandia National Laboratories, the United States Arms Control and Disarmament Agency (ACDA), and U.S. Department of Energy (DOE), staff from the CMC served as faculty in conducting a workshop in Shanghai, China. Sponsor of the workshop was the Regional Centre for Strategic Studies (RCSS) based in Colombo, Sri Lanka. The workshop included participants from throughout South Asia and China. The CMC presented four sessions related to the role of monitoring technologies in promoting regional security and building confidence among nations. Participation in these workshops supports U.S. efforts to further regional cooperation and promote arms control, nonproliferation and other cooperative securily measures and supplements efforts funded by DOE and ACDA over the past four years. The RCSS Shanghai meeting permitted a continued CMC involvement in regionally conducted training for anew generation of leaders in government, the military, and academia throughout South Asia and China. Nuclear issues are clearly a dominant South Asian concern since the nuclear tests of May 1998. However, there remains a strong interest in identifying opportunities for increased trade and reduced tensions in other areas. The RCSS and other regional organizations are enthusiastic about continued CMC involvement in future regional courses.

  19. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  20. 78 FR 10610 - Waiver for Certain Defense Items Produced in the United Kingdom

    Science.gov (United States)

    2013-02-14

    ... Under Secretary of Defense (Acquisition, Technology, and Logistics) is waiving the statutory limitation... Secretary of Defense (Acquisition, Technology, and Logistics). DoD has had a Reciprocal Defense Procurement... Under Secretary of Defense (Acquisition, Technology, and Logistics) finds that the UK does not...

  1. 77 FR 22296 - Renewal of Department of Defense Federal Advisory Committees

    Science.gov (United States)

    2012-04-13

    ... Under Secretary of Defense for Acquisition, Technology and Logistics, and the President of the Defense... Under Secretary of Defense for Acquisition, Technology and Logistics or a designated representative may... without compensation. The Under Secretary of Defense for Acquisition, Technology and Logistics shall...

  2. 75 FR 22753 - Federal Advisory Committee; Defense Science Board; Charter Renewal

    Science.gov (United States)

    2010-04-30

    ... of Defense; the Under Secretary of Defense for Acquisition, Technology and Logistics; the Chairman of... official. The Under Secretary of Defense for Acquisition, Technology and Logistics shall be authorized to... upon the recommendation of the Under Secretary of Defense for Acquisition, Technology and Logistics...

  3. 77 FR 2278 - Waiver for Certain Defense Items Produced in the United Kingdom

    Science.gov (United States)

    2012-01-17

    ... Under Secretary of Defense (Acquisition, Technology, and Logistics) is waiving the statutory limitation... Secretary of Defense (Acquisition, Technology, and Logistics). DoD has had a Reciprocal Defense Procurement... Under Secretary of Defense (Acquisition, Technology, and Logistics) finds that the UK does not...

  4. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  5. DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations

    Data.gov (United States)

    National Aeronautics and Space Administration — DMSP SSM/I Daily and Monthly Polar Gridded Bootstrap Sea Ice Concentrations in polar stereographic projection currently include Defense Meteorological Satellite...

  6. DMSP SSM/I-SSMIS Daily Polar Gridded Brightness Temperatures

    Data.gov (United States)

    National Aeronautics and Space Administration — NSIDC produces daily gridded brightness temperature data from orbital swath data generated by the Special Sensor Microwave/Imager (SSM/I) aboard the Defense...

  7. Ballistic Missile Defense: A National Priority

    Science.gov (United States)

    2008-01-01

    N. Lewis and Theodore A. Postol , “European Missile Defense: The Technologi­ cal Basis of Russian Concerns,” Arms Control Today 37, no. 8 (October...PAC-3), and the Theater High-Altitude Area Defense ( THAAD ) system. As General Obering recently testified: “None of this capability existed as...East. PAC-3 and THAAD are theater defense systems, providing protection against short- and some medium-range missiles. PAC-3 engages short- range

  8. Toward a defense-dominated world

    Energy Technology Data Exchange (ETDEWEB)

    Wood, L.

    1993-08-01

    Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

  9. Self Defense Module

    OpenAIRE

    Shibi k john

    2014-01-01

    Self Defense module is like a Smart Watch For Women .It has the potential to help women with technologies that are embedded. It is specially designed for women safety. It has a control button that will be used by women to inform nearby police when they are in danger. This watch directly gets connected to the satellite through GPS when activated. Then the location is transferred through the GSM and it is also provided with a system that produces 60 shockwaves in 1 second in emergency situations.

  10. Strategy for Homeland Defense and Defense Support of Civil Authorities

    Science.gov (United States)

    2013-02-01

    SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF...1 As defined by “Sustaining U.S. Global Leadership : Priorities for the 21st Century Defense,” January...and nuclear (CBRN) consequence management response forces in recognition of the proliferation of destructive technologies and the potent ideologies

  11. Activities of Daily Living

    Science.gov (United States)

    ... With Parkinson's › Managing Parkinson's › Activities of Daily Living Activities of Daily Living Sometimes Parkinson’s disease (PD) can complicate the basic daily activities a person with living with Parkinson’s once did ...

  12. Defense Innovation Unit Experimental (DIUX): Innovative or Excessive

    Science.gov (United States)

    2017-04-06

    AIR WAR COLLEGE AIR UNIVERSITY DEFENSE INNOVATION UNIT EXPERIMENTAL (DIUX): INNOVATIVE OR EXCESSIVE? by Roger Kuykendall, COL...technological superiority to near-peer competitors, Secretary of Defense Ashton Carter announced the establishment of the Defense Innovation Unit...or simply another layer of bureaucracy compensating for shortcomings in other areas. When viewed through the lens of innovation , DIUx is

  13. 6 CFR 25.8 - Government contractor Defense.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Government contractor Defense. 25.8 Section 25.8...-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.8 Government contractor Defense. (a) Criteria for... applicability of the government contractor defense. In determining whether to issue such Certification, the...

  14. 76 FR 11410 - Defense Federal Acquisition Regulation Supplement; Increase the Use of Fixed-Price Incentive...

    Science.gov (United States)

    2011-03-02

    ... memorandum from the Under Secretary of Defense for Acquisition, Technology, and Logistics, dated November 3... by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated...

  15. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  16. Pre-Service Teachers' Experiences of ICT in Daily Life and in Educational Contexts and Their Proto-Technological Pedagogical Knowledge

    Science.gov (United States)

    Kontkanen, Sini; Dillon, Patrick; Valtonen, Teemu; Renkola, Sami; Vesisenaho, Mikko; Väisänen, Pertti

    2016-01-01

    Many pre-service teachers are members of the net generation and are expected to be familiar with different ICTs, yet several studies have indicated that they are not necessarily able to use them for teaching and learning. The notion of teachers' technological pedagogical knowledge (TPK) is central to this concern. In this study we use the…

  17. The daily progress system: A proof of concept pilot study of a recovery support technology tool for outpatient substance abuse treatment.

    Science.gov (United States)

    Carswell, S B; Gordon, M S; Gryczynski, J; Tangires, S A

    2017-05-30

    Illicit substance use remains highly prevalent in the US, and epidemiological surveillance surveys estimate that in 2015, over 27 million individuals (10.1% of the US population) 12 years of age or older used illicit drugs in the past 30 days.1 Outpatient treatment delivered in community-based settings is the dominant modality for addiction treatment, typically involving weekly psychosocial counseling sessions in an individual and/or group format.2,3 Unfortunately, relapse and premature treatment discontinuation are quite common in outpatient treatment.3-5 Objectives: This is a pilot proof of concept feasibility study involving clients presenting for outpatient SUD treatment. This study sought to examine the feasibility and acceptability of the Daily Progress System (DPS), a telephone-based software program, using interactive voice response (IVR), designed to enhance quality care and improve client outcomes. Individuals who presented at the participating treatment clinic, who met study eligibility criteria, and who provided written informed consent to participate were included in the study (N = 15; 53.3% females). Incentives were paid to participants for calls completed. Participants completed 65% of scheduled daily call-ins, representing 273 person-days of data on client cravings, mood, substance use, and involvement in recovery support activities. The average call duration was approximately 2 minutes and 42 seconds. There was a high degree of client and counselor acceptance and satisfaction using the system. Conclusions and Clinical Significance: Findings suggest that the DPS appears to be a feasible means of potentially addressing relapse and treatment engagement issues based on client and counselor engagement and satisfaction with the system.

  18. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program. Annex A. Department of the Army Domestic Technology Transfer

    Science.gov (United States)

    1993-11-01

    advaiced materials, and computer security. Space technology research and development in the areas of communicatio , remote sensing, weather and term data...Optoelectronic technologies * Essex - Image optical processing * Electric Power Research Institute and COLSA Corporation-Huntsville - Internet development

  19. 77 FR 26747 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2012-05-07

    ... Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of... the public. Specifically, the Under Secretary of Defense (Acquisition, Technology and Logistics), with...

  20. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Science.gov (United States)

    2010-07-27

    ... Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect the... effectively support COIN operations and what emerging science and technology would have the greatest...

  1. Daily Weather Records

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These daily weather records were compiled from a subset of stations in the Global Historical Climatological Network (GHCN)-Daily dataset. A weather record is...

  2. Managing Daily Life

    Science.gov (United States)

    ... Duchenne / Managing Daily Life Print Email Managing Daily Life Environmental accessibility As the person with Duchenne starts ... such as wider doorways and ramps, can make life easier once the person with Duchenne cannot climb ...

  3. Agile Software Development in the Department of Defense Environment

    Science.gov (United States)

    2017-03-31

    acquisition system for information technology ” (para. 2). The DoD is subject to a changing operational environment , budgetary constraints, the rapid...Agile Software Development in the Department of Defense Environment Lareina Adams March 31, 2017...Defense (DoD) information technology (IT) programs are plagued by immense bureaucracy, seemingly endless documentation, cost overruns, and poorly

  4. 76 FR 21705 - Closed Meeting of the Defense Science Board

    Science.gov (United States)

    2011-04-18

    ... the Under Secretary of Defense for Acquisition, Technology & Logistics on scientific and technical... (Acquisition, Technology and Logistics), with the coordination of the DoD Office of General Counsel, has...

  5. 75 FR 64711 - Federal Advisory Committee; Defense Science Board

    Science.gov (United States)

    2010-10-20

    ... of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect..., Technology and Logistics), with the coordination of the DoD Office of General Counsel, has determined in...

  6. Nonlinear optics in daily life.

    Science.gov (United States)

    Garmire, Elsa

    2013-12-16

    An overview is presented of the impact of NLO on today's daily life. While NLO researchers have promised many applications, only a few have changed our lives so far. This paper categorizes applications of NLO into three areas: improving lasers, interaction with materials, and information technology. NLO provides: coherent light of different wavelengths; multi-photon absorption for plasma-materials interaction; advanced spectroscopy and materials analysis; and applications to communications and sensors. Applications in information processing and storage seem less mature.

  7. Capabilities of technological innovation in companies involved in the defense industry; Capacidades de innovacion tecnologia en empresas relacionadas con la industria de defensa

    Energy Technology Data Exchange (ETDEWEB)

    Briones Penalver, A. J.; Laborda Penalver, F.

    2010-07-01

    This paper studies the capacities related with the innovation types, the technological development, the role of the innovation systems and the institutional aspects. It presents a study of 236 small and medium-sized companies which comprise the defence industry. It examines the innovation strategy and defines the most important factors of technological innovation processes (measures, values and results of innovation). It analyses statistically the causal relationship between strategy and structure, the role of innovation in cooperation and inter company relationships and the dependence relationship in technological innovation capacities of several variables in the innovation processes in these companies. (Author) 65 refs.

  8. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    Science.gov (United States)

    2013-10-01

    University of Oregon where she taught undergraduate and graduate courses in management, business policy and strategy, entrepreneurship , and...experience working for innovative companies including Apple Inc., Patagonia, and International Game Technology. Her research has been published in

  9. Findings of the U.S. Department of Defense Technology Assessment Team on Japanese High-Temperature Composites February 1989 Visit

    Science.gov (United States)

    1993-06-01

    market with little application other than high-technology sporting goods (tennis rackets, golf clubs, racing car bodies, special sailboats , etc.). The...to control a backhoe with one lever, an Offline Robot Programming System to teach robots by computer, an Expert Forecasting System to decrease heat in...Computer Scene Robotics Optica Image Pgaceing.Tsh ~ nsictos Tribology. I.. Damn Technology btweda Owls. lI Metals. Mechanical PropertimCes. auical

  10. 77 FR 60399 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2012-10-03

    .... Specifically, the Under Secretary of Defense (Acquisition, Technology and Logistics), with the coordination of... advise the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of the Department of...

  11. 78 FR 25971 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2013-05-03

    .... Specifically, the Under Secretary of Defense (Acquisition, Technology and Logistics), with the coordination of... advise the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of the Department of...

  12. Battlefield Medical Information System-Tactical (BMIST): the application of mobile computing technologies to support health surveillance in the Department of Defense.

    Science.gov (United States)

    Morris, Tommy J; Pajak, John; Havlik, Frank; Kenyon, Jessica; Calcagni, Dean

    2006-08-01

    This paper discusses the innovation process of the Battlefield Medical Information System- Tactical (BMIST), a point-of-care mobile computing solution for reducing medical errors and improving the quality of care provided to our military personnel in the field. In such remote environments, medical providers have traditionally had limited access to medical information, a situation quite analogous to that in remote areas of underdeveloped or developing countries. BMIST provides an all-in-one suite of mobile applications that empowers providers via access to critical medical information and powerful clinical decision support tools to accurately create an electronic health record (EHR). This record is synchronized with Department of Defense (DOD) joint health surveillance and medical information systems from the earliest echelons of care through chronic care provided by the Veterans Administration. Specific goals met in the initial phase were: integration of the PDA and wireless interface; development of the local application and user interface; development of a communications infrastructure and development of a data storage and retrieval system. The system had been used extensively in the field to create an EHR far forward that supports a longitudinal medical record across time and across all elements of the Military Healthcare System.

  13. MRO SOW Daily Script

    Science.gov (United States)

    Fisher, Forest E.; Khanampornpan, Teerapat; Gladden, Roy E.

    2008-01-01

    The MRO SOW daily script (wherein "MRO" signifies "Mars Reconnaissance Orbiter" and "SOW" signifies "sequence systems engineer of the week") is a computer program that automates portions of the MRO daily SOW procedure, which includes checking file-system sizes and automated sequence processor (ASP) log files. The MRO SOW daily script effects clear reporting of (1) the status of, and requirements imposed on, the file system and (2) the ASP log files.

  14. Defense Science Board Task Force on Military Satellite Communication and Tactical Networking. Executive Summary

    Science.gov (United States)

    2017-03-01

    product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the Secretary of Defense...December 2014, the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)) signed the “Terms of Reference – Defense Science ...Board Task Force on Military Satellite Communication and Tactical Networking.” As a result, the Chairman of the Defense Science Board established a

  15. Special Technology Area Review on Displays. Report of Department of Defense Advisory Group on Electron Devices Working Group C (Electro-Optics)

    Science.gov (United States)

    2004-03-01

    0 Visualization Centers & Simulators too costly today... Design & Manufa .cturingPrga Visuallzation *= Simulation Today -- limited by requirement to...commercial PC technologies as illustrated in Figure 22-02. For example, from 1996-2001 the CPU speed increased 13X, memory increased 32X, hard disk capacity

  16. Defense Science And Technology: Further DOD And DOE Actions Needed to Provide Timely Conference Decisions and Analyze Risks from Changes in Participation

    Science.gov (United States)

    2015-03-01

    Conference Planning and Food and Beverage Costs, Audit Report 11-43 (October 2011). 5White House, Executive Order 13589, Promoting Efficient Spending, 76...and Technology S&T conference attendance trends prior to and following implementation of the agencies’ conference policies. We also interviewed DOD

  17. Defense Acquisition and the Case of the Joint Capabilities Technology Demonstration Office: Ad Hoc Problem Solving as a Mechanism for Adaptive Change

    Science.gov (United States)

    2013-04-01

    The Air Force Institute of Technology Software Acquisition Patterns of Failure and How to Recognize Them Lisa Brownsword, Cecilia Albert, Patrick...analysis. Belmont, CA: Wadsworth/ Thomson Learning. Pettigrew, A. M. (1990). Longitudinal field research on change: Theory and practice. Organization

  18. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

  19. 75 FR 40716 - Defense Federal Acquisition Regulation Supplement; Notification Requirements for Awards of Single...

    Science.gov (United States)

    2010-07-13

    ..., but to the Office of the Under Secretary of Defense (Acquisition, Technology, and Logistics) Defense...-quantity contracts. (c)(1)(ii)(D) Limitation on single-award contracts. * * * * * (2) The head of the...

  20. Dynamic defense workshop :

    Energy Technology Data Exchange (ETDEWEB)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.; Helinski, Ryan; Lamb, Christopher C.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

  1. The development of coal-based technologies for Department of Defense Facilities. Semiannual technical progress report, March 28, 1993--September 27, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Morrison, J.L.; Sharifi, R. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1993-12-17

    The US DOD, through an Interagency Agreement with the US DOE, has initiated a three-phase program with the Consortium for Coal-Water Slurry Fuel Technology, with the aim of decreasing DOD`s reliance on imported oil by increasing its use of coal. The program is being conducted as a cooperative agreement between the Consortium and DOE and the first phase of the program is underway. A team of researchers has been assembled from Penn State, ABB Combustion Engineering Systems (CE), AMAX Research and Development Center (AMAX), and Energy and Environmental Research Corporation (EER). These four organizations are the current members of the Consortium. Phase 1 activities are focused on developing clean, coal-based combustion technologies for the utilization of both micronized coal-water slurry fuels (MCWSFs) and dry, micronized coal (DMC) in fuel oil-designed industrial boilers. Phase 2 research and development activities will continue to focus on industrial boiler retrofit technologies by addressing emissions control and pre-combustion strategies for the utilization of high ash, high sulfur coals. Phase 3 activities will examine coal-based fuel combustion systems that cofire wastes. Each phase includes an engineering cost analysis and technology assessment. The activities and status of Phase 1 are described in this report. The objective of Phase 1 is to deliver fully engineered retrofit options for a fuel oil-designed watertube boiler located on a DOD installation to fire either MCWSF or DMC. This will be achieved through a program of the following tasks: (1) Coal Beneficiation and Preparation; (2) Combustion Performance Evaluation; (3) Engineering Design; (4) Engineering and Economic Analysis; and (5) Final Report/Submission of Design Package. Miscellaneous activities are reported. Activities planned for the next semiannual period are listed. The project schedule, with a description of milestones, is included.

  2. 75 FR 76446 - Waiver of 10 U.S.C. 2534 for Certain Defense Items Produced in the United Kingdom

    Science.gov (United States)

    2010-12-08

    ... Under Secretary of Defense (Acquisition, Technology, and Logistics) is waiving the limitation of 10 U.S....C. 2534(d) to the Under Secretary of Defense (Acquisition, Technology, and Logistics). DoD has had a... renewed on December 16, 2004. The Under Secretary of Defense (Acquisition, Technology, and Logistics...

  3. The Airborne Laser and the Future of Theater Missile Defense

    Science.gov (United States)

    1997-03-01

    target. — Theodore A. Postol , Professor of Science, Technology, and National Security Policy at MIT During the period of defense, the number of...Patriot PAC-3 Analysis Underway.” Air Defense Artillery, January-February 1993: 29. Postol , Theodore A. “Lessons of the Gulf War Experience with Patriot...theater defense systems; that is, systems which have a range of hundreds of kilometers such as the Navy?s Aegis and the Army?s THAAD systems

  4. The development of coal-based technologies for Department of Defense facilities. Volume 1, Technical report. Semiannual technical progress report, September 28, 1994--March 27, 1995

    Energy Technology Data Exchange (ETDEWEB)

    Miller, B.G.; Bartley, D.A.; Hatcher, P. [Pennsylvania State Univ., University Park, PA (United States). Energy and Fuels Research Center] [and others

    1996-10-15

    This program is being conducted as a cooperative agreement between the Consortium for Coal Water Mixture Technology and the U.S. Department of Energy. Activities this reporting period are summarized by phase. Phase I is nearly completed. During this reporting period, coal beneficiation/preparation studies, engineering designs and economics for retrofitting the Crane, Indiana boiler to fire coal-based fuels, and a 1,000-hour demonstration of dry, micronized coal were completed. In addition, a demonstration-scale micronized-coal water mixture (MCWM) preparation circuit was constructed and a 1,000-hour demonstration firing MCWM began. Work in Phase II focused on emissions reductions, coal beneficiation/preparation studies, and economic analyses of coal use. Emissions reductions investigations involved literature surveys of NO{sub x}, SO{sub 2}, trace metals, volatile organic compounds, and fine particulate matter capture. In addition, vendors and engineering firms were contacted to identify the appropriate emissions technologies for the installation of commercial NO{sub x} and SO{sub 2} removal systems on the demonstration boiler. Information from the literature surveys and engineering firms will be used to identify, design, and install a control system(s). Work continued on the refinement and optimization of coal grinding and MCWM preparation procedures, and on the development of advanced processes for beneficiating high ash, high sulfur coals. Work also continued on determining the basic cost estimation of boiler retrofits, and evaluating environmental, regulatory, and regional economic impacts. In addition, the feasibility of technology adoption, and the public`s perception of the benefits and costs of coal usage was studied. A coal market analysis was completed. Work in Phase III focused on coal preparation studies, emissions reductions and economic analyses of coal use.

  5. 78 FR 65300 - Notice of Availability (NOA) for General Purpose Warehouse and Information Technology Center...

    Science.gov (United States)

    2013-10-31

    ... Technology Center Construction (GPW/IT)--Tracy Site-- Environmental Assessment AGENCY: Defense Logistics.... SUMMARY: The Defense Logistics Agency (DLA) announces the availability of an environmental assessment (EA... Purpose Warehouse and Information Technology Center at Defense Distribution Depot San Joaquin, California...

  6. MEaSUREs Global Record of Daily Landscape Freeze/Thaw Status

    Data.gov (United States)

    National Aeronautics and Space Administration — The MEaSUREs Global Record of Daily Landscape Freeze/Thaw Status, Version 01 data set is derived from the Defense Meteorological Satellite Program (DMSP) satellite...

  7. Lightship Daily Observations

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations taken on board lightships along the United States coasts from 1936 - 1983. Generally 4-6 observations daily. Also includes deck logs, which give...

  8. Dementia - daily care

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000030.htm Dementia - daily care To use the sharing features on ... prevent choking. Tips for Talking With Someone With Dementia Keep distractions and noise down: Turn off the ...

  9. Daily Weather Maps

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Several different government offices have published the Daily weather maps over its history. The publication has also gone by different names over time. The U.S....

  10. Daily bowel care program

    Science.gov (United States)

    ... gov/ency/patientinstructions/000133.htm Daily bowel care program To use the sharing features on this page, ... Work with your health care provider. Basic Bowel Program Keeping active helps prevent constipation. Try to walk, ...

  11. DailyMed

    Data.gov (United States)

    U.S. Department of Health & Human Services — DailyMed provides high quality information about marketed drugs. This information includes FDA labels (package inserts). This Web site provides health information...

  12. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  13. Defense Management Challenges Facing DOD in Implementing Defense Reform Initiatives

    National Research Council Canada - National Science Library

    Warren, David

    1998-01-01

    .... Specifically, it is proposing to: reengineer many of its business processes; consolidate and reorganize DOD'S headquarters elements and defense agencies, including the Office of the Secretary of Defense...

  14. Global Cooperation and Competition in the Defense and Aerospace Industries

    Science.gov (United States)

    2010-04-26

    April 27, 2009, from LexisNexis Academic . Felstead, P. (2009, May 19). French industry buoyant over Rafale export prospects. Jane’s Defense Week...April 27, 2009, from LexisNexis Academic . Franck, Raymond, Ira Lewis and Bernard Udis (2008a), Echoes across the Pond: Understanding EU-US Defense...EADS woes mount as A400M hits turbulence. The Daily Telegraph (London), 5. Retrieved April 27, 2009, from LexisNexis Academic . Hagelin, B. (2006

  15. Philosophical Scrutiny of the Strategic Defense Initiatives.

    Science.gov (United States)

    Schonsheck, Jonathan

    1986-01-01

    Analyzes three Strategic Defense Initiative (SDI) proposals, and argues that only the least technologically feasible variant (the AstroAtmosOceanDome conception) can be judged morally superior to old-fashioned "we'll kill you if you kill us" deterrence ideas. (JDH)

  16. Chronic daily headaches

    Directory of Open Access Journals (Sweden)

    Fayyaz Ahmed

    2012-01-01

    Full Text Available Chronic Daily Headache is a descriptive term that includes disorders with headaches on more days than not and affects 4% of the general population. The condition has a debilitating effect on individuals and society through direct cost to healthcare and indirectly to the economy in general. To successfully manage chronic daily headache syndromes it is important to exclude secondary causes with comprehensive history and relevant investigations; identify risk factors that predict its development and recognise its sub-types to appropriately manage the condition. Chronic migraine, chronic tension-type headache, new daily persistent headache and medication overuse headache accounts for the vast majority of chronic daily headaches. The scope of this article is to review the primary headache disorders. Secondary headaches are not discussed except medication overuse headache that often accompanies primary headache disorders. The article critically reviews the literature on the current understanding of daily headache disorders focusing in particular on recent developments in the treatment of frequent headaches.

  17. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Current Status The Navy is continuing to develop and evaluate new technologies to incorporate into OR, including an X- stern configuration; a new...officials, the Navy continues to prototype and test the X- stern and propulsor technologies on a scale model to minimize risk. In 2014, the contractor and...ATOR) Erin E. Preston, Sean E. Manzano Integrated Air and Missile Defense (IAMD) Maria A. Durant, John M. Ortiz Joint Air-to-Surface Standoff Missile

  18. Global Historical Climatology Network - Daily (GHCN-Daily), Version 3

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Global Historical Climatology Network - Daily (GHCN-Daily) dataset integrates daily climate observations from approximately 30 different data sources. Version 3...

  19. The design and implementation of network attack and defense platform based on cloud desktop

    Science.gov (United States)

    Yan, Zining; Wang, Yunhan; Shao, Shijiao; Li, Boquan

    2017-08-01

    This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation process of the network attack and defense training platform. This paper focuses on the cloud desktop construction scheme based on B/S structure, and aims to enhance the flexibility and convenience of network attack and defense training platform.

  20. 77 FR 43064 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2012-07-23

    ... Secretary of ] Defense for Acquisition, Technology & Logistics on scientific and technical matters as they... the public. Specifically, the Under Secretary of Defense (Acquisition, Technology and Logistics), with... Study on Technology and Innovation Enablers for Superiority in 2030 will meet in closed session August...

  1. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  2. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  3. Defense Technology Objectives of the Joint Warfighting Science and Technology and Defense Technology Area Plan.

    Science.gov (United States)

    1996-05-01

    field improved test battery for assessing neurological and performance consequences of toxic exposure. By FY98, field Flow Injection Analysis techniques...for data limited battle areas on land and at sea. Participate in operational test exerciser such as FOAL EAGLE and Advanced Warfighting Experiment (AWE

  4. Getting Defense Acquisition Right

    Science.gov (United States)

    2017-01-01

    as a carrot and a stick. In the balance of this article, I want to focus on this second principle. How do we use profit effectively to obtain better...low), cost ($), performance (a composite scaled metric) and degree of small business utilization (with its own scale). Think how this would have...the Department of Defense went through a period of transition that included major chang­ es in defense budgets and force composition . But today we are

  5. 76 FR 28757 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-05-18

    ... of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation. SUMMARY: The Defense Logistics...

  6. 75 FR 76423 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2010-12-08

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board of...

  7. 76 FR 28960 - Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting

    Science.gov (United States)

    2011-05-19

    ... of the Secretary Defense Intelligence Agency National Defense Intelligence College Board of Visitors Closed Meeting AGENCY: National Defense Intelligence College, Defense Intelligence Agency, Department of... a closed meeting of the Defense Intelligence Agency National Defense Intelligence College Board of...

  8. Toothbrushing: Do It Daily.

    Science.gov (United States)

    Texas Child Care, 1993

    1993-01-01

    Offers a practical guide for promoting daily toothbrushing in young children. Discusses the importance of proper dental care, explains the causes of tooth decay, describes proper dental care for infants and young children, recommends materials and teaching methods, and discusses visits to the dentist and the benefits of fluoride for dental health.…

  9. Defense Acquisitions Acronyms and Terms

    Science.gov (United States)

    2012-12-01

    Defense Industrial Base DID Data Item Description DIEA Department of Defense Information Enterprise Architecture DIPEC Defense Industrial Plant...CJCSI 6212.01F). Department of Defense Information Enterprise Architecture ( DIEA ) A federation of descriptions that provide context and rules for

  10. Defensive medicine in Israel - a nationwide survey.

    Science.gov (United States)

    Asher, Elad; Greenberg-Dotan, Sari; Halevy, Jonathan; Glick, Shimon; Reuveni, Haim

    2012-01-01

    Defensive medicine is the practice of diagnostic or therapeutic measures conducted primarily as a safeguard against possible malpractice liability. We studied the extent, reasons, and characteristics of defensive medicine in the Israeli health care system. Cross-sectional study performed in the Israeli health care system between April and July 2008 in a sample (7%) of board certified physicians from eight medical disciplines (internal medicine, pediatrics, general surgery, family medicine, obstetrics and gynecology, orthopedic surgery, cardiology, and neurosurgery). A total of 889 physicians (7% of all Israeli board certified specialists) completed the survey. The majority [60%, (95%CI 0.57-0.63)] reported practicing defensive medicine; 40% (95%CI 0.37-0.43) consider every patient as a potential threat for a medical lawsuit; 25% (95%CI 0.22-0.28) have previously been sued at least once during their career. Independent predictors for practicing defensive medicine were surgical specialty [OR=1.6 (95%CI 1.2-2.2), p=0.0004], not performing a fellowship abroad [OR=1.5 (95%CI 1.1-2), p=0.027], and previous exposure to lawsuits [OR=2.4 (95%CI 1.7-3.4), pIndependent predictors for the risk of being sued during a physician's career were male gender [OR=1.6 (95%CI 1.1-2.2), p=0.012] and surgery specialty [OR=3.2 (95%CI 2.4-4.3), p<0.0001] (general surgery, obstetrics and gynecology, orthopedic surgery, and neurosurgery). Defensive medicine is very prevalent in daily physician practice in all medical disciplines. It exposes patients to complications due to unnecessary tests and procedures, affects quality of care and costs, and undermines doctor-patient relationships. Further studies are needed to understand how to minimize defensive medicine resulting from an increased malpractice liability market.

  11. Defensive medicine in Israel - a nationwide survey.

    Directory of Open Access Journals (Sweden)

    Elad Asher

    Full Text Available BACKGROUND: Defensive medicine is the practice of diagnostic or therapeutic measures conducted primarily as a safeguard against possible malpractice liability. We studied the extent, reasons, and characteristics of defensive medicine in the Israeli health care system. METHODS AND FINDINGS: Cross-sectional study performed in the Israeli health care system between April and July 2008 in a sample (7% of board certified physicians from eight medical disciplines (internal medicine, pediatrics, general surgery, family medicine, obstetrics and gynecology, orthopedic surgery, cardiology, and neurosurgery. A total of 889 physicians (7% of all Israeli board certified specialists completed the survey. The majority [60%, (95%CI 0.57-0.63] reported practicing defensive medicine; 40% (95%CI 0.37-0.43 consider every patient as a potential threat for a medical lawsuit; 25% (95%CI 0.22-0.28 have previously been sued at least once during their career. Independent predictors for practicing defensive medicine were surgical specialty [OR=1.6 (95%CI 1.2-2.2, p=0.0004], not performing a fellowship abroad [OR=1.5 (95%CI 1.1-2, p=0.027], and previous exposure to lawsuits [OR=2.4 (95%CI 1.7-3.4, p<0.0001]. Independent predictors for the risk of being sued during a physician's career were male gender [OR=1.6 (95%CI 1.1-2.2, p=0.012] and surgery specialty [OR=3.2 (95%CI 2.4-4.3, p<0.0001] (general surgery, obstetrics and gynecology, orthopedic surgery, and neurosurgery. CONCLUSIONS: Defensive medicine is very prevalent in daily physician practice in all medical disciplines. It exposes patients to complications due to unnecessary tests and procedures, affects quality of care and costs, and undermines doctor-patient relationships. Further studies are needed to understand how to minimize defensive medicine resulting from an increased malpractice liability market.

  12. Technology

    Directory of Open Access Journals (Sweden)

    Xu Jing

    2016-01-01

    Full Text Available The traditional answer card reading method using OMR (Optical Mark Reader, most commonly, OMR special card special use, less versatile, high cost, aiming at the existing problems proposed a method based on pattern recognition of the answer card identification method. Using the method based on Line Segment Detector to detect the tilt of the image, the existence of tilt image rotation correction, and eventually achieve positioning and detection of answers to the answer sheet .Pattern recognition technology for automatic reading, high accuracy, detect faster

  13. Making Daily Mobility

    DEFF Research Database (Denmark)

    Jensen, Ole B.; Wind, Simon

    , social networks, understanding of places and ultimately ourselves and others. To successfully accomplish everyday life, households have to cope with large number of different activities and mobility in relation to their children, work, social life, obligations, expectations, needs and wishes. Drawing...... practice configurations. The paper draws on empirical material collected from the project ‘Analysis of activity-based travel chains and sustainable mobility’ (ACTUM WP2), consisting of qualitative semi-structured interviews with 45 respondents in 11 children families spread across the Greater Copenhagen...... in Denmark as well as seven days of GPS trackings of each family member. The paper unpacks how the household member’s daily practices are more than individual accomplishments carried out in isolation, but coordinated and performed in relation to other members. Drawing on practice theory, the daily practices...

  14. Recreating Daily life in Pompeii

    Directory of Open Access Journals (Sweden)

    Nadia Magnenat-Thalmann

    2010-05-01

    Full Text Available We propose an integrated Mixed Reality methodology for recreating ancient daily life that features realistic simulations of animated virtual human actors (clothes, body, skin, face who augment real environments and re-enact staged storytelling dramas. We aim to go further from traditional concepts of static cultural artifacts or rigid geometrical and 2D textual augmentations and allow for 3D, interactive, augmented historical character-based event representations in a mobile and wearable setup. This is the main contribution of the described work as well as the proposed extensions to AR Enabling technologies: a VR/AR character simulation kernel framework with real-time, clothed virtual humans that are dynamically superimposed on live camera input, animated and acting based on a predefined, historically correct scenario. We demonstrate such a real-time case study on the actual site of ancient Pompeii.

  15. Virtualization Technology Applied to Rootkit Defense

    Science.gov (United States)

    2007-03-01

    According to a white paper released by McAfee, “from 2000 to 2005, rootkit complexity grew by more than 400 percent, and year-over-year, Q1 (quarter one...system or the application (e.g. API ). [18] Encompassing viruses, worms, trojans horses, back doors, spyware, botnets, loggers, dialers, and other...other exit condi- tions defined by the root mode software, exit non-root operation. Below are the brief descriptions from Intel’s IA32 VT spec . [9

  16. Missile Defense Information Technology Small Business Conference

    Science.gov (United States)

    2009-09-01

    Training – IT Infrastructure Library ( ITIL ) Framework – MDIOC – Summary Purpose 3Approved for Public Release 09-MDA-4854 (27 AUG 09) 4Approved for...4854(27 AUG 09) ITIL Phases Go/No Go Decisions Initiation Documentation of the Business Need through Preliminary BCA Concept Development Technical...accordance with user requirements using performance metrics SDLC Phases ITIL Phases Service Strategy Identify the requirements that support the

  17. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  18. Progrès de la médecine, progrès technologiques et pratiques cliniques : les soignants se racontent Medical progress, technology and clinical practice: caregivers share their daily challenges

    Directory of Open Access Journals (Sweden)

    Sylvie Fortin

    2012-11-01

    Full Text Available À partir d’une étude anthropologique des pratiques cliniques en milieux de soins tertiaires, cet article s’intéresse aux défis posés par les progrès médicaux et technologiques en unités de soins intensifs (aigus et en unités d’oncologie pédiatrique (chroniques. Ces progrès interpellent quotidiennement médecins et personnel infirmier, posant des défis pour lesquels peu de réponses existent. Normes et valeurs s’actualisent en ces lieux où des enjeux entourant la vie, la “qualité” de vie, et la mort sont quotidiens. L’hôpital pédiatrique est certes un endroit où tous les espoirs sont permis. C’est aussi un lieu où la mort est à apprivoiser ; elle devient un choix, s’imposant rarement d’elle-même. Sur la base des témoignages des soignants et de nos propres observations, nous proposons une réflexion sur la ‘fin de vie’, objet d’un choix difficile, en dialogue avec la technologie qui la rend possible. Ces différentes voix témoigneront de rationalités parfois parallèles, convergentes ou divergentes, et des normes et valeurs qui s’affrontent, se rencontrent et se négocient dans l’espace social de la clinique.Stemming from an anthropological study of clinical practices in tertiary health care institutions, our paper focuses on challenges brought by medical and technological progress in paediatric intensive care units (acute and oncology units (chronic. This progress affects clinicians and nurses daily, posing challenges for which there are no ‘easy’ solutions. Norms and values surface in these clinical settings where issues regarding life, quality of life and death are part of everyday practice. A paediatric hospital is certainly a place where all hopes are warranted, but it is also a place where death must be acknowledged. Death is in fact often a question of choice as it almost always avoidable. Through the testimonies of health care professionals and our own field observations, we offer a

  19. Medical Chemical and Biological Defense Research

    National Research Council Canada - National Science Library

    Linden, Carol D

    2001-01-01

    Partial contents; Medical Chemical/Biological Defense Research, Chemical/Biological Defense Rationale for Rationale for Investment,Medical Chemical and Biological Defense Research Program Mission, Medical Chemical...

  20. Next Generation Nuclear Plant Defense-in-Depth Approach

    Energy Technology Data Exchange (ETDEWEB)

    Edward G. Wallace; Karl N. Fleming; Edward M. Burns

    2009-12-01

    The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

  1. Induction of defensive enzymes (isozymes) during defense against ...

    African Journals Online (AJOL)

    ... related to mitigating pathogen-induced oxidative damage which result in the decrease of calli decay, and this implies that antioxidant defense response may be involved in the mechanisms of plant against fungal pathogen. Keywords: Pear callus, fungi infection, defense enzyme, isozyme, biochemical defense mechanism ...

  2. Center for Infrastructure Defense

    OpenAIRE

    2013-01-01

    Includes an image of the main page on this date and compressed file containing additional web pages. The Center for Infrastructure Defense (CID) focuses on the continued operation of critical military and civilian infrastructure in the presence of accident, failure, and attack. Operations Research (OR) Department in the Graduate School of Operational and Information Sciences at the Naval Postgraduate School.

  3. Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    to the United States as a result of cyber espionage and cybercrime is over$100 billion dollars per year.13,14The DoD faces a cyber defense investment...that cost continues 17 L. Ablon, M.C. Libicki, and A.A. Golay. Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar. Santa Monica, CA: RAND

  4. Defense Spending and Reform

    Science.gov (United States)

    2012-04-02

    Budget; Finance Reform; Military Spending ; Defense Spending; Budget Cuts 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...global military spending is China with 7 percent, and United Kingdom comes in a distant third with 4 percent (see Table 2).8 Table 1 Adjusted

  5. Defense Logistics Agency Revenue Eliminations

    National Research Council Canada - National Science Library

    1996-01-01

    The issue of revenue eliminations was identified during our work on the Defense Logistics Agency portion of the Audit of Revenue Accounts in the FY 1996 Financial Statements of the Defense Business Operations Fund...

  6. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles . We are currently sustaining 30...Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-362 Ballistic Missile Defense System (BMDS) As of FY 2017 President’s Budget Defense...Program Name Ballistic Missile Defense System (BMDS) DoD Component DoD Responsible Office References SAR Baseline (Planning Estimate) National Security

  7. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  8. Changing the face of cyber warfare with international cyber defense collaboration

    CSIR Research Space (South Africa)

    Grobler, M

    2011-03-01

    Full Text Available in cyberspace is rather complex since the technological revolution and dynamic technological innovations are often not well suited to any legal system. A further complication is the lack of comprehensive international cyber defense cooperation treaties...

  9. 77 FR 3237 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2012-01-23

    ... of Defense for Acquisition, Technology & Logistics on scientific and technical matters as they affect..., Technology and Logistics), with the coordination of the DoD Office of General Counsel, has determined in...

  10. 75 FR 3898 - Federal Advisory Committee; Defense Science Board; Closed Meeting

    Science.gov (United States)

    2010-01-25

    ... Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of.... Specifically, the Under Secretary of Defense (Acquisition, Technology and Logistics), with the coordination of...

  11. Belowground herbivory and plant defenses

    NARCIS (Netherlands)

    Van Dam, N.M.

    2009-01-01

    Belowground-feeding herbivores may be very destructive to plants. Roots are known to produce various defense compounds to protect themselves against these herbivores, both with direct and indirect—inducible—defense compounds. Recent literature reviews reveal no overall pattern for root-shoot defense

  12. Physics in daily life

    CERN Document Server

    Hermans, Jo

    2012-01-01

    This book provides answers to everyday questions that any curious mind would ask, like : Why is water blue ? What makes ice so slippery ? How do we localize sound ? How do we keep our body temperature so nice and constant ? How do we survive the sauna at 90 C ? Why do large raindrops fall faster than small ones, and what exactly is their speed ? The answers are given in an accessible and playful way, and are illustrated with funny cartoons. In this book forty "Physics in Daily Life" columns, which appeared earlier in Europhysics News, are brought together in one inspiring volume. As well as being a source of enjoyment and satisfying insights for anyone with some physics background, it also serves as a very good teaching tool for science students. This booklet is a feast of erudition and humour.

  13. Daily Food and Activity Diary

    Science.gov (United States)

    ... We Can! ) Health Professional Resources Daily Food and Activity Diary Keeping a record of your daily food ... lose weight or maintain a healthy weight and activity levels. It also will give your doctor or ...

  14. Guidance and control for defense systems against ballistic threats

    OpenAIRE

    BATTISTINI, SIMONE

    2013-01-01

    A defense system against ballistic threat is a very complex system from the engineering point of view. It involves different kinds of subsystems and, at the same time, it presents very strict requirements. Technology evolution drives the need of constantly upgrading system’s capabilities. The guidance and control fields are two of the areas with the best progress possibilities. This thesis deals with the guidance and control problems involved in a defense system against ballistic threats. ...

  15. Straight Talk: Major Program Manager Views of Defense Acquisition

    OpenAIRE

    Roy Wood; Al Moseley

    2011-01-01

    Proceedings Paper (for Acquisition Research Program) Current efforts by the Office of the Secretary of Defense (OSD) and the Under Secretary of Defense for Acquisition, Technology, and Logistics (USD[AT&L]) to improve acquisition outcomes are focused on addressing perceived problems that create inefficiencies in major programs. Program Manager (PM) Forums were established by senior acquisition leaders within OSD to hear directly from a sampling of major PMs to help key OSD leaders underst...

  16. Edificio Daily Mirror

    Directory of Open Access Journals (Sweden)

    Williams, Owen

    1963-07-01

    Full Text Available The building has 18 levels. The Press occupies the 4 basement floors. The ground floor is taken up with the entrance hall, and an indoor carriage way. A snack bar and the telephone operators are situated on the second floor. The production department and the medical services are located on the third storey, whilst the fourth is occupied by the offices and library. The fifth floor is the beginning of the higher section of the building. This floor and up to including the 11th floor are devoted to office space, except for the 10th storey, which contains the office apartments of the directors and the Council Chamber. Equipment related to various services of the building is housed on the 12th storey. Finally, this tall building constitutes a fine landmark in the London skyline. The Daily Mirror building is outstanding for the appropriate nature, the completeness and the quality of its installations, which thus provide the most widely read paper in the world with outstandingly efficient offices.Este edificio consta de 18 plantas. El cuerpo de Prensa se aloja en los cuatro sótanos; los vestíbulos de entrada y una calzada interior para vehículos se hallan en la planta baja; la primera alberga un snack-bar y centralita telefónica; la segunda, el departamento de producción y centro de asistencia médica, y la tercera, las oficinas y biblioteca principales. La cuarta planta señala el comienzo del bloque alto; esta planta, junto con las quinta, sexta, séptima, octava y décima, están dedicadas a oficinas. La novena contiene las oficinas-apartamentos de los directores y salas de Consejo, y la undécima, la maquinaria para las diversas instalaciones del edificio. La elevada torre constituye un grandioso hito de referencia en esta zona de Londres. El «Daily Mirror» se distingue por el acierto, número y perfección de sus instalaciones, que proporcionan, al periódico de mayor actualidad mundial, las más adecuadas y amplias oficinas modernas.

  17. Allergic Host Defenses

    OpenAIRE

    Palm, Noah W.; Rosenstein, Rachel K.; Medzhitov, Ruslan

    2012-01-01

    Allergies are generally thought to be a detrimental outcome of a mistargeted immune response that evolved to provide immunity to macro-parasites. Here we present arguments to suggest that allergic immunity plays an important role in host defense against noxious environmental substances, including venoms, hematophagous fluids, environmental xenobiotics and irritants. We argue that appropriately targeted allergic reactions are beneficial, although they can become detrimental when excessive. Fur...

  18. A Defense Budget Primer

    Science.gov (United States)

    1998-12-09

    budget practices. See Appendix D for the actual timetable of congressional action on the FY1999 budget.65 See James V. Saturno , The Appropriations...details, see James V. Saturno , The Appropriations Process and the Congressional69 Budget Act, CRS Report 97-947. Table 6. Milestone Votes on the Defense...James V. Saturno , The74 Appropriations Process and the Congressional Budget Act, CRS Report 97-947. The Budget Enforcement Act of 1990 and subsequent

  19. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  20. Defense Science Board Task Force Report on Defense Strategies for Ensuring the Resilience of National Space Capabilities

    Science.gov (United States)

    2017-03-01

    Executive Summary is a product of the Defense Science Board (DSB). The DSB is a Federal Advisory Committee established to provide independent advice to the...Executive Summary Since 2000, when the Defense Science Board concluded space superiority was absolutely essential in achieving global awareness, information...Whelan Government Advisors Dr. Larry Gershwin – ODNI/NIM Science and Technology Executive Secretary Col Russell Teehan, USAF – AT&L/Space, Strategic

  1. Technology Commercialization Program 1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-11-01

    This reference compilation describes the Technology Commercialization Program of the Department of Energy, Defense Programs. The compilation consists of two sections. Section 1, Plans and Procedures, describes the plans and procedures of the Defense Programs Technology Commercialization Program. The second section, Legislation and Policy, identifies legislation and policy related to the Program. The procedures for implementing statutory and regulatory requirements are evolving with time. This document will be periodically updated to reflect changes and new material.

  2. Network attacks and defenses a hands-on approach

    CERN Document Server

    Trabelsi, Zouheir; Al Braiki, Arwa; Mathew, Sujith Samuel

    2012-01-01

    The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laborat

  3. Modulation of defensive reflex conditioning in snails by serotonin

    Science.gov (United States)

    Andrianov, Vyatcheslav V.; Bogodvid, Tatiana K.; Deryabina, Irina B.; Golovchenko, Aleksandra N.; Muranova, Lyudmila N.; Tagirova, Roza R.; Vinarskaya, Aliya K.; Gainutdinov, Khalil L.

    2015-01-01

    Highlights Daily injection of serotonin before a training session accelerated defensive reflex conditioning in snails.Daily injection of 5-hydroxytryptophan before a training session in snails with a deficiency of serotonin induced by the “neurotoxic” analog of serotonin 5,7-dihydroxytryptamine, restored the ability of snails to learn.After injection of the “neurotoxic” analogs of serotonin 5,6- and 5,7-dihydroxytryptamine as well as serotonin, depolarization of the membrane and decrease of the threshold potential of premotor interneurons was observed. We studied the role of serotonin in the mechanisms of learning in terrestrial snails. To produce a serotonin deficit, the “neurotoxic” analogs of serotonin, 5,6- or 5,7-dihydroxytryptamine (5,6/5,7-DHT) were used. Injection of 5,6/5,7-DHT was found to disrupt defensive reflex conditioning. Within 2 weeks of neurotoxin application, the ability to learn had recovered. Daily injection of serotonin before a training session accelerated defensive reflex conditioning and daily injections of 5-HTP in snails with a deficiency of serotonin induced by 5,7-DHT restored the snail's ability to learn. We discovered that injections of the neurotoxins 5,6/5,7-DHT as well as serotonin, caused a decrease in the resting and threshold potentials of the premotor interneurons LPa3 and RPa3. PMID:26557063

  4. The Feasibility and Acceptability of Using Technology-Based Daily Diaries with HIV-Infected Young Men Who have Sex with Men: A Comparison of Internet and Voice Modalities.

    Science.gov (United States)

    Cherenack, Emily M; Wilson, Patrick A; Kreuzman, Andrew M; Price, Georgine N

    2016-08-01

    This study delivered a daily diary to 67 HIV-infected men who have sex with men (MSM) between 16 and 24 years old for 66 days to measure HIV-risk behaviors and other psychosocial variables via two diary modalities: internet (accessible via any web-enabled device) and voice (accessible via telephone). Participants were randomized to complete one diary modality for 33 days before switching to the second modality for 33 days. The study was implemented in three urban HIV health care centers in the United States where participants were receiving services. Through diary data and qualitative interview data, we examined the feasibility and acceptability of the dairies and identified barriers and facilitators of dairy compliance. Results show high participant retention in the daily diary (93.4 %) and high compliance for the number of dairies completed (72.4 %). Internet diaries were preferred by 92 % of participants and completed at a significantly higher rate (77.5 %) than voice diaries (67.7 %). Facilitators included opportunities for self-reflection and cathartic sharing, monetary compensation, relationships with study staff, and daily reminders. Barriers included being busy or not having privacy at the time of reminders, forgetting, and falling asleep. Participants also described barriers and facilitators unique to each modality. Overall, both modalities were feasible and acceptable for use with our sample of HIV-infected MSM.

  5. Old technology not necessarily outdated technology

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, OUT OF THE CLASSROOM Download the paper: Case Study: HAM Radio and Hospitals” Colleen Donovan’s course paper provided support for the idea that old technology isn’t necessarily outdated technology. Donovan wrote a case study...

  6. Inherently Offensive: Airpower and the Dialectic with Defense

    Science.gov (United States)

    2017-06-01

    old paradigms in the SEAD environment . As a result of the continued search for an advantage provided by technology , air defenses challenged the...ABSTRACT This thesis contains an analysis of the technologies throughout history that challenge the offensive utility of the air weapon. The author...examines a sampling of technologies from World War II through Korea such as radar, electronic attack, flak, and Window. Next, the author assesses

  7. Synthetic Plant Defense Elicitors

    Directory of Open Access Journals (Sweden)

    Yasemin eBektas

    2015-01-01

    Full Text Available To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of the some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection.

  8. Phenomenon of Psychological Defense

    Directory of Open Access Journals (Sweden)

    Elena T. Sokolova

    2011-01-01

    Full Text Available The author discusses the controversial issues of formation and functioning of psy¬chological defense mechanisms in ontogenesis and in personality disorders as they are represented in classical and contemporary psychoanalysis, in cognitivism and communication theory. The paper emphasizes the role of cognitive organi¬zation (style, sign-symbolic mediation, representative system of object relations and attachments in individual typological variability of the level organization of ciency of personal and social adaptation, in maturity and mental health of personality

  9. Nanomaterials for Defense Applications

    Science.gov (United States)

    Turaga, Uday; Singh, Vinitkumar; Lalagiri, Muralidhar; Kiekens, Paul; Ramkumar, Seshadri S.

    Nanotechnology has found a number of applications in electronics and healthcare. Within the textile field, applications of nanotechnology have been limited to filters, protective liners for chemical and biological clothing and nanocoatings. This chapter presents an overview of the applications of nanomaterials such as nanofibers and nanoparticles that are of use to military and industrial sectors. An effort has been made to categorize nanofibers based on the method of production. This chapter particularly focuses on a few latest developments that have taken place with regard to the application of nanomaterials such as metal oxides in the defense arena.

  10. Defense mechanisms and personality disorders.

    Science.gov (United States)

    Lingiardi, V; Lonati, C; Delucchi, F; Fossati, A; Vanzulli, L; Maffei, C

    1999-04-01

    The evaluation of defense mechanisms represents one of the most promising fields in the psychodynamic-oriented empirical research on personality disorders (PDs). This study examines the association between DSM-IV PDs and defense mechanisms. We evaluated a sample of 50 adult outpatients seeking personality assessment and psychotherapeutic treatment. PDs have been assessed using the Structured Clinical Interview for DSM-IV Personality Disorder, version 2.0. Defense mechanisms have been evaluated by a group of trained clinical psychologists and psychiatrists (interrater reliability from .61 to .95) using Perry's Defense Mechanism Rating Scale. Our results support the hypothesis that some defense mechanisms underlie PDs and that defenses call for further attention as we assess PDs.

  11. Using wireless technology in clinical practice: does feedback of daily walking activity improve walking outcomes of individuals receiving rehabilitation post-stroke? Study protocol for a randomized controlled trial.

    Science.gov (United States)

    Mansfield, Avril; Wong, Jennifer S; Bayley, Mark; Biasin, Lou; Brooks, Dina; Brunton, Karen; Howe, Jo-Anne; Inness, Elizabeth L; Jones, Simon; Lymburner, Jackie; Mileris, Ramona; McIlroy, William E

    2013-07-18

    Regaining independent ambulation is the top priority for individuals recovering from stroke. Thus, physical rehabilitation post-stroke should focus on improving walking function and endurance. However, the amount of walking completed by individuals with stroke attending rehabilitation is far below that required for independent community ambulation. There has been increased interest in accelerometer-based monitoring of walking post-stroke. Walking monitoring could be integrated within the goal-setting process for those with ambulation goals in rehabilitation. The feedback from these devices can be downloaded to a computer to produce reports. The purpose of this study is to determine the effect of accelerometer-based feedback of daily walking activity during rehabilitation on the frequency and duration of walking post-stroke. Participants will be randomly assigned to one of two groups: feedback or no feedback. Participants will wear accelerometers daily during in- and out-patient rehabilitation and, for participants in the feedback group, the participants' treating physiotherapist will receive regular reports of walking activity. The primary outcome measures are the amount of daily walking completed, as measured using the accelerometers, and spatio-temporal characteristics of walking (e.g. walking speed). We will also examine goal attainment, satisfaction with progress towards goals, stroke self-efficacy, and community-integration. Increased walking activity during rehabilitation is expected to improve walking function and community re-integration following discharge. In addition, a focus on altering walking behaviour within the rehabilitation setting may lead to altered behaviour and increased activity patterns after discharge. ClinicalTrials.gov NCT01521234.

  12. Empowering self-defense training.

    Science.gov (United States)

    Thompson, Martha E

    2014-03-01

    The purpose of self-defense training is to expand people's options, yet it is often framed as a solely physical, and limiting, response to violence. I draw on my own experience as a self-defense instructor and that of others in the self-defense movement to argue that an empowerment approach to self-defense training contributes to the anti-violence movement in multiple ways: providing a pathway to increase women's and girls' safety and their potential for becoming powerful and effective social change agents right now, providing an informed and embodied understanding of violence, and offering comprehensive options to recognize, prevent, and interrupt violence.

  13. MODULATION OF DEFENSIVE REFLEX CONDITIONING IN SNAILS BY SEROTONIN

    Directory of Open Access Journals (Sweden)

    Vyatcheslav V Andrianov

    2015-10-01

    Full Text Available We studied the role of serotonin in the mechanisms of learning in terrestrial snails. To produce a serotonin deficit, the neurotoxic analogues of serotonin, 5,6- or 5,7-dihydroxytryptamine (5,6/5,7-DHT were used. Injection of 5,6/5,7-DHT was found to disrupt defensive reflex conditioning. Within two weeks of neurotoxin application, the ability to learn had recovered. Daily injection of serotonin before a training session accelerated defensive reflex conditioning and daily injections of 5-HTP in snails with a deficiency of serotonin induced by 5,7-DHT restored the snail’s ability to learn. We discovered that injections of the neurotoxins 5,6/5,7-DHT as well as serotonin, caused a decrease in the resting and threshold potentials of the premotor interneurons LPa3 and RPa3.

  14. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    ARL created innovative composite architectures for the ECH to maximize its performance. The combination of improved materials, processing, and design ...smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to serve and ready...technology transition, and smart acquisition. The rapidly changing technology landscape means that the Labs also must adapt their mission to continue to

  15. Echoes Across the Pond: Understanding EU-US Defense Industrial Relationships

    Science.gov (United States)

    2009-08-05

    science and technology-related decision-making, - 103 - including an understanding of knowledge transfers and networking. Hopefully, both the US and...Washington, DC: author, (RL30563). Conseil économique et social, L’impact economique de la defense (The economic impact of defense), Paris: author. http...www.conseil- economique -et-social.fr/, accessed 2 October 2007. Datamonitor (2006a), Aerospace & Defense in Europe: Industry Profile (Reference

  16. A modern anachronism : An anatomy of president Reagan's strategic defense initiative

    OpenAIRE

    Tachibana, Seiitsu

    1985-01-01

    With President Ronald Reagan's strategic defense initiative (SDI) or 'Star Wars,' the U.S. has embarked on a double track road for the decades ahead and well into the 21st century: defensive options and in addition offensive systems. The initial vision of a leakproof SDI has receded into differing variants of only partial 'defensive' shields. The history of the nuclear arms race reveals that the side which is the first to achieve certain technological breakthrough cannot for long prevail over...

  17. Defense Intelligence Strategy

    National Research Council Canada - National Science Library

    Clapper, James R

    2008-01-01

    ... developed. The emergence of a highly interconnected global economy is reshaping international alliances, speeding the adoption of technologies, and giving rise to the development of new economic centers...

  18. Logistiline Daily Service / Paavo Kangur

    Index Scriptorium Estoniae

    Kangur, Paavo, 1966-

    2005-01-01

    Sügisel ostis Leedu endise majandusministri Valetntinas Milaknise firma Daily Service ära kõik bürootarvetemüüja Reval Impexi aktsiad. 300 miljoni kroonise aastakäibega firma Eesti tütarettevõte prognoosib oma tänavuseks käibeks 31,2 miljonit krooni. Lisa: Daily Service'i struktuur

  19. Continuing to assist Albania's Defense Ministry

    OpenAIRE

    2012-01-01

    The Defense Institution Reform Initiative (DIRI) continued to support the Albanian Ministry of Defense in a Strategic Defense Review (SDR) in Tirana, Albania 6-9 November. This engagement was the thirteenth in an eighteen-month series of SDR workshops to address the Government of Albania's desire to strengthen defense systems and processes within the Ministry of Defense.

  20. Tactical Integrated Air Defense System

    Science.gov (United States)

    1978-06-09

    119 Patriot ........ ....................... 119 Roland 1I1 ..... ...................... ... 122 Stinger... Roland 11 ..... .. .. ......................... 122 42. Stinger ... . . . .... . . . . . . . . . . . . 123 CHAPTER I INTRODUCT ION . Both air force and air...oreatest air defense systems of moidern warfare, As Major General George a. Simler stated. A ’"The air defen~se system in North Vietnam is the most

  1. Macroevolution of plant defense strategies.

    Science.gov (United States)

    Agrawal, Anurag A

    2007-02-01

    Theories of plant defense expression are typically based on the concepts of tradeoffs among traits and of phylogenetic conservatism within clades. Here, I review recent developments in phylogenetic approaches to understanding the evolution of plant defense strategies and plant-herbivore coevolutionary interactions. I focus particularly on multivariate defense against insect herbivores, which is the simultaneous deployment of multiple traits, often arranged as convergently evolved defense syndromes. Answering many of the outstanding questions in the biology of plant defense will require generating broad hypotheses that can be explicitly tested by using comparative approaches and interpreting phylogenetic patterns. The comparative approach has wide-spread potential to reinvigorate tests of classic hypotheses about the evolution of interspecific interactions.

  2. Daily and Sub-daily Precipitation for the Former USSR

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset is a compilation of in situ daily and hourly meteorological observations for the former USSR initially obtained within the framework of several joint...

  3. Outgoing Longwave Radiation Daily Climate Data Record (OLR Daily CDR)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The product contains the 1-degree by 1-degree daily mean outgoing longwave radiation flux at the top of the atmosphere derived from HIRS radiance observations...

  4. Defense Waste Processing Facility prototypic analytical laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Policke, T.A.; Bryant, M.F.; Spencer, R.B.

    1991-12-31

    The Defense Waste Processing Technology (DWPT) Analytical Laboratory is a relatively new laboratory facility at the Savannah River Site (SRS). It is a non-regulated, non-radioactive laboratory whose mission is to support research and development (R & D) and waste treatment operations by providing analytical and experimental services in a way that is safe, efficient, and produces quality results in a timely manner so that R & D personnel can provide quality technical data and operations personnel can efficiently operate waste treatment facilities. The modules are sample receiving, chromatography I, chromatography II, wet chemistry and carbon, sample preparation, and spectroscopy.

  5. Wormuth: Work on Security, Defense 'Holistically'

    OpenAIRE

    Center for Homeland Defense and Security

    2010-01-01

    Center for Homeland Defense and Security, PRESS RELEASES Concepts spawned at the Center for Homeland Defense and Security could be very valuable to government entities such as the Department of Defense as that agency expands its focus in...

  6. 76 FR 62046 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2011-10-06

    ... in closed session on October 26 and October 27, 2011; at the Johns Hopkins University Applied Physics... the Secretary of Defense and the Under Secretary of Defense for Acquisition, Technology & Logistics on... activities. The Board will also discuss plans for future consideration of scientific and technical aspects of...

  7. Digital daily cycles of individuals

    DEFF Research Database (Denmark)

    Aledavood, Talayeh; Jørgensen, Sune Lehmann; Saramäki, Jari

    2015-01-01

    day-night pattern, there are individual differences: e.g., some of us are intrinsically morning-active, while others prefer evenings. In this article, we look at digital daily cycles: circadian patterns of activity viewed through the lens of auto-recorded data of communication and online activity. We...... begin at the aggregate level, discuss earlier results, and illustrate differences between population-level daily rhythms in different media. Then we move on to the individual level, and show that there is a strong individual-level variation beyond averages: individuals typically have their distinctive...... daily pattern that persists in time. We conclude by discussing the driving forces behind these signature daily patterns, from personal traits (morningness/eveningness) to variation in activity level and external constraints, and outline possibilities for future research....

  8. Chronic Daily Headache in Adolescents

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2006-02-01

    Full Text Available The prevalence of chronic daily headache (CDH, and its impact and related medication use or overuse in adolescents were examined at the Neurological Institute, Taipei Veterans General Hospital, and other centers in Taiwan.

  9. Allegheny County Jail Daily Census

    Data.gov (United States)

    Allegheny County / City of Pittsburgh / Western PA Regional Data Center — A daily census of the inmates at the Allegheny County Jail (ACJ). Includes gender, race, age at booking, and current age. The records for each month contain a...

  10. Unravelling daily human mobility motifs.

    Science.gov (United States)

    Schneider, Christian M; Belik, Vitaly; Couronné, Thomas; Smoreda, Zbigniew; González, Marta C

    2013-07-06

    Human mobility is differentiated by time scales. While the mechanism for long time scales has been studied, the underlying mechanism on the daily scale is still unrevealed. Here, we uncover the mechanism responsible for the daily mobility patterns by analysing the temporal and spatial trajectories of thousands of persons as individual networks. Using the concept of motifs from network theory, we find only 17 unique networks are present in daily mobility and they follow simple rules. These networks, called here motifs, are sufficient to capture up to 90 per cent of the population in surveys and mobile phone datasets for different countries. Each individual exhibits a characteristic motif, which seems to be stable over several months. Consequently, daily human mobility can be reproduced by an analytically tractable framework for Markov chains by modelling periods of high-frequency trips followed by periods of lower activity as the key ingredient.

  11. Lightship Daily Observations - NARA Collection

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations taken on board lightships along the United States coasts from 1893 - 1943. Generally 4-6 observations daily. Also includes deck logs, which give...

  12. Cybersecurity:The Road Ahead for Defense Acquisition

    Science.gov (United States)

    2016-06-01

    magazine included an article by Under Secre-tary of Defense for Acquisition, Technology, and Logistics Frank Kendall, titled “Protecting the Future...software. Clearly, the DoD has a lot of work to do to reverse the trend. In response to these trends and the growing cyber threat, Kendall commissioned

  13. 77 FR 51970 - Renewal of Missile Defense Advisory Committee

    Science.gov (United States)

    2012-08-28

    ... representing any particular point of view and in a manner that is free from conflict of interest. The... academia and the science and technology communities; Federally Funded Research and Development Centers... defense policy and other matters of special interest to the DoD and MDA. a. The Technical Subcommittee...

  14. Technology Empowerment: Security Challenges.

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Drake Edward [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Backus, George A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Wendell [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nelson, Thomas R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Skocypec, Russell D. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-03-01

    Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment will continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.

  15. Space-Based Chemical Lasers in strategic defense

    Science.gov (United States)

    Wildt, Dan

    1992-07-01

    The Strategic Defense Initiative Organization (SDIO) has made significant progress in developing Space-Based chemical Laser (SBL) technologies and in studying the SBLs global defense capability. In this mission, a constellation of several orbiting laser platforms provides continuous global defense by intercepting threatening missiles in their boost phase, including short range ballistic missiles (SRBMs). An optional smaller constellation provides defense against launches from the low and midlatitude regions. In addition, SBLs have utility in other important related missions such as surveillance, air defense and discrimination. The hardware necessary to build such a system has been developed to the point where it is mature and ready for demonstration in space. Advances have been made in each of the following major areas of the SBL: laser device; optics/beam control; beam pointing; ATP (acquisition, tracking and pointing); uncooled optics; and laser lethality. Integration of the key laser and beam control technologies is now occurring in the ground-based ALI experiment, and a space demonstration experiment, Star LITE, is in the planning and concept development phase.

  16. Relationships Among Nightly Sleep Quality, Daily Stress, and Daily Affect.

    Science.gov (United States)

    Blaxton, Jessica M; Bergeman, Cindy S; Whitehead, Brenda R; Braun, Marcia E; Payne, Jessic D

    2017-05-01

    We explored the prospective, microlevel relationship between nightly sleep quality (SQ) and the subsequent day's stress on positive (PA) and negative affect (NA) as well as the moderating relationships between nightly SQ, subsequent stress, and subsequent PA on NA. We investigated whether age moderated these relationships. We collected 56 days of sleep, stress, and affect data using daily diary questionnaires (N = 552). We used multilevel modeling to assess relationships at the between- and within-person levels. Daily increases in SQ and decreases in stress interacted to predict higher daily PA and lower daily NA. Better SQ in older adults enhanced the benefits of PA on the stress-NA relationship more during times of low stress, whereas better sleep in younger adults enhanced the benefits of PA more during times of high stress. Between-person effects were stronger predictors of well-being outcomes than within-person variability. The combination of good SQ and higher PA buffered the impact of stress on NA. The moderating impact of age suggests that sleep and stress play different roles across adulthood. Targeting intervention and prevention strategies to improve SQ and enhance PA could disrupt the detrimental relationship between daily stress and NA.

  17. Cost of Space-Based Laser Ballistic Missile Defense

    Science.gov (United States)

    Field, George; Spergel, David

    1986-03-01

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additonal offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  18. Medicolegal characteristics of defense injuries in cases of homicides

    Directory of Open Access Journals (Sweden)

    Rančić Nemanja

    2017-01-01

    Full Text Available Background/Aim. During the homicidal act, a victim usually tries to defend himself/herself, and due to these attempts he/she could sustain so-called defense injuries, mostly localized on the arms. The aim of this research was to analyze important medicolegal characteristics of defense injuries, particularly regarding their importance in forensic expertise of homicides. Methods. We analyzed autopsies of all homicidal cases with defense injuries in Belgrade during a three-year period. Results. Defensive injuries were registered in 71 victims of murder. The majority (67.61% of victims with defense injuries were males. About 25% of victims were aged from 21 to 30 years. The majority (60 of victims were not under influence of alcohol. Homicides were mostly (90.14% performed by mechanical weapons. The highest frequency of defense injuries was noticed in the victims with multiple homicidal injuries localized on the front side of the body. In a half (50.7% of the cases they were present on both arms of the victim, mostly on the dorsal side of hands and forearms. Bruises were the most frequent form of defense injuries (36.61% out of 71 cases, while incisions, abrasions, gunshot injuries and stab wounds were less common. Conclusion. Determination of defense injuries and their medicolegal characteristics enables collecting of facts that are important for legal estimation of homicide, as well as for adequate sentence at the end of the court procedure. [Project of the Serbian Ministry of Education, Science and Technological Development, Grant no. 175014

  19. Cost of space-based laser ballistic missile defense.

    Science.gov (United States)

    Field, G; Spergel, D

    1986-03-21

    Orbiting platforms carrying infrared lasers have been proposed as weapons forming the first tier of a ballistic missile defense system under the President's Strategic Defense Initiative. As each laser platform can destroy a limited number of missiles, one of several methods of countering such a system is to increase the number of offensive missiles. Hence it is important to know whether the cost-exchange ratio, defined as the ratio of the cost to the defense of destroying a missile to the cost to the offense of deploying an additional missile, is greater or less than 1. Although the technology to be used in a ballistic missile defense system is still extremely uncertain, it is useful to examine methods for calculating the cost-exchange ratio. As an example, the cost of an orbiting infrared laser ballistic missile defense system employed against intercontinental ballistic missiles launched simultaneously from a small area is compared to the cost of additional offensive missiles. If one adopts lower limits to the costs for the defense and upper limits to the costs for the offense, the cost-exchange ratio comes out substantially greater than 1. If these estimates are confirmed, such a ballistic missile defense system would be unable to maintain its effectiveness at less cost than it would take to proliferate the ballistic missiles necessary to overcome it and would therefore not satisfy the President's requirements for an effective strategic defense. Although the method is illustrated by applying it to a space-based infrared laser system, it should be straightforward to apply it to other proposed systems.

  20. Passive automatic anti-piracy defense system of ships

    Science.gov (United States)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  1. Independent Review of the Defense Logistics Agencys Roles and Missions

    Science.gov (United States)

    2014-12-01

    retailed—by the Military Services themselves to their final consumers (e.g., the artisan or mechanic on the production line). The transfer of these...for the Office of the Under Secretary of Defense (Acquisition, Technology and Logistics). The views, opinions, and findings should not be construed... Technology (IT)/Enterprise Resource Planning (ERP) system. DLA faces strong incentives to reduce costs, and it employs an effective governance

  2. Enhanced Cyberspace Defense through Covert Publish-Subscribe Broker Pattern Communications

    National Research Council Canada - National Science Library

    Paxton, Steven G

    2008-01-01

    ... such as spear-phishing which exploit individuals with targeted information. These asymmetric attacks are able to bypass current network defense technologies allowing adversaries extended and often unrestricted access to portions of the enterprise...

  3. 75 FR 71647 - Defense Federal Acquisition Regulation Supplement; Discussions Prior to Contract Award (DFARS...

    Science.gov (United States)

    2010-11-24

    ...), chartered by the Deputy Under Secretary of Defense (Acquisition, Technology, and Logistics) to revise the Do... requirements. DoD notes the potential disadvantages of this proposed change in increased time to complete the...

  4. Collaborative Point Paper on Border Surveillance Technology

    National Research Council Canada - National Science Library

    2007-01-01

    The North Arnencan Technology and Industrial Base Organization (NATIBO) fosters cooperative planning for technology and industrial base program development among and between the Defense Departments of the U.S. and Canada...

  5. Accelerator Technology Division: Annual Report FY 1990

    National Research Council Canada - National Science Library

    Schriber, Stanley

    1991-01-01

    The Accelerator Technology (AT) Division continued in fiscal year 1990 to fulfill its mission of developing accelerator science and technology for application to research, defense, energy, and other problems of national interest...

  6. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  7. Local Area Defense (LAD) Demonstration

    National Research Council Canada - National Science Library

    Mackenzie, Colin F

    2004-01-01

    This pilot program is funded by the Army Medical Department (AMEDD) to demonstrate a real-time detection and rapid response system for local area defense using the University of Maryland Baltimore (UMB...

  8. Proactive Self Defense in Cyberspace

    National Research Council Canada - National Science Library

    Caulkins, Bruce D

    2009-01-01

    ... and standards to properly secure and defend the Global Information Grid (GIG) from cyber attacks. This paper will discuss the strategic requirements for enacting a proactive self-defense mechanism in cyberspace...

  9. Defenseive Structuring and Environmental Stress

    Science.gov (United States)

    Siegel, Bernard J.

    1970-01-01

    This essay explores a kind of adaptation, referred to as defenseive structuring, that recurs with great regularity among groups that perceive themselves as exposed to environmental stress of long duration with which they cannot cope directly and aggressively." (Author)

  10. Persistent forecasting of disruptive technologies

    National Research Council Canada - National Science Library

    Committee on Forecasting Future Disruptive Technologies; National Research Council

    ...) and the Defense Intelligence Agency (DIA) tasked the Committee for Forecasting Future Disruptive Technologies with providing guidance and insight on how to build a persistent forecasting system to predict, analyze, and reduce the impact...

  11. European Missile Defense and Russia

    Science.gov (United States)

    2014-07-01

    Russian of meeting between then Prime Minister Putin and defence experts in Sarov, Russia , February 24, 2012. 64. Viktor Yesin and Yevgeniy Savostyanov... Putin Letter to Obama to Address Missile Defense, Security,” RIA-Novosti, May 15, 2013, available from en.rian.ru/ russia /20130515/181170446.html...UNITED STATES · ARMY WAR COLLEGE PRESS Carlisle Barrac , ’A STR KNG T H ..,... WI SDOM EUROPEAN MISSILE DEFENSE AND RUSSIA Keir Giles with

  12. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  13. Improving Statistical Rigor in Defense Test and Evaluation: Use of Tolerance Intervals in Designed Experiments

    Science.gov (United States)

    2014-10-01

    Polytechnic Institute and State University, Naval Postgraduate School, and the Air Force Institute of Technology (AFIT). The consortium’s overall research...University http://www.dau.mil 21 Defense ARJ, October 2014, Vol. 21 No. 4 : 804–824 References Air Force Institute of Technology. (2012). Science of test...evaluation (T&E) (ATEC Policy Bulletin 3-12). Aberdeen Proving Ground, MD: Author. Department of Defense. (2012). Scientific test and analysis techniques

  14. Report of the Defense Science Board Task Force on Strategic Communication

    Science.gov (United States)

    2008-01-01

    NAME(S) AND ADDRESS(ES) Office of the Under Secretary of Defense for ,Acquisition, Technology and Logistics,Defense Scince Board,Washington,DC,20301... direction that adapts quickly, transforms stovepipes, integrates knowledge and functions, and builds next generation skills and technologies...sustained senior leadership at the White House level that focuses exclusively on global communication and directs all relevant aspects of national capacity

  15. 76 FR 72391 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-11-23

    ... Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Revised Defense Logistics Agency Regulation (DLAR) 1000.22. SUMMARY: On May 18, 2011, the Defense Logistics Agency (DLA) published a Notice of...

  16. 76 FR 53119 - Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense...

    Science.gov (United States)

    2011-08-25

    ... Office of the Secretary Defense Logistics Agency Revised Regulation 1000.22, Environmental Considerations in Defense Logistics Agency Actions AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Comment Addressed on Notice of Availability (NOA) of Revised Defense Logistics Agency Regulation (DLAR...

  17. Technical Soddi Defenses: The Trojan Horse Defense Revisited

    Directory of Open Access Journals (Sweden)

    Chad Steel

    2014-12-01

    Full Text Available In 2004, the Trojan horse defense was at a crossroads, with two child pornography cases where it was successfully employed in the United Kingdom, resulting in acquittals.  The original Trojan horse defense has now become part of the more general “technical SODDI” defense, which includes the possibility of unknown actors using unsecured Wi-Fi connections or having physical access to a computer to perform criminal acts.  In the past ten years, it has failed to be effective in the United States for criminal cases, with no published acquittals in cases where it was the primary defense.  In the criminal cases where it has been used as leverage in plea negotiations, there has been either poor forensics performed by the prosecution or political pressure to resolve a matter.  On the civil side, however, the defense has been wildly successful, effectively shutting down large John Doe copyright infringement litigation against non-commercial violators.  

  18. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  19. From Daily Life to Philosophy

    NARCIS (Netherlands)

    Bransen, J.A.M.

    2004-01-01

    This article argues that the little everyday things of life often provide excellent entries into the intellectual problems of academic philosophy. This is illustrated with an analysis of four small stories taken from daily life in which people are in agony because they do not know what to do. It is

  20. Digital Daily Cycles of Individuals

    Directory of Open Access Journals (Sweden)

    Talayeh eAledavood

    2015-10-01

    Full Text Available Humans, like almost all animals, are phase-locked to the diurnal cycle. Most of us sleep at night and are active through the day. Because we have evolved to function with this cycle, the circadian rhythm is deeply ingrained and even detectable at the biochemical level. However, within the broader day-night pattern, there are individual differences: e.g., some of us are intrinsically morning-active, while others prefer evenings. In this article, we look at digital daily cycles: circadian patterns of activity viewed through the lens of auto-recorded data of communication and online activity. We begin at the aggregate level, discuss earlier results, and illustrate differences between population-level daily rhythms in different media. Then we move on to the individual level, and show that there is a strong individual-level variation beyond averages: individuals typically have their distinctive daily pattern that persists in time. We conclude by discussing the driving forces behind these signature daily patterns, from personal traits (morningness/eveningness to variation in activity level and external constraints, and outline possibilities for future research.

  1. On polar daily geomagnetic variation

    Directory of Open Access Journals (Sweden)

    Paola De Michelis

    2015-11-01

    Full Text Available The aim of this work is to investigate the nature of the daily magnetic field perturbations produced by ionospheric and magnetospheric currents at high latitudes. We analyse the hourly means of the X and Y geomagnetic field components recorded by a meridian chain of permanent geomagnetic observatories in the polar region of the Northern Hemisphere during a period of four years (1995-1998 around the solar minimum. We apply a mathematical method, known as natural orthogonal component (NOC, which is capable of characterizing the dominant modes of the geomagnetic field daily variability through a set of empirical orthogonal functions (EOFs. Using the first two modes we reconstruct a two-dimensional equivalent current representation of the ionospheric electric currents, which contribute substantially to the geomagnetic daily variations. The obtained current structures resemble the equivalent current patterns of DP2 and DP1. We characterize these currents by studying their evolution with the geomagnetic activity level and by analysing their dependence on the interplanetary magnetic field. The obtained results support the idea of a coexistence of two main processes during all analysed period although one of them, the directly driven process, represents the dominant component of the geomagnetic daily variation.

  2. NWS Daily Climatology Data: 1989 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area...

  3. NWS Daily Climatology Data: 1980 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area as...

  4. NWS Daily Climatology Data: 1979 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area as...

  5. NWS Daily Climatology Data: 1989 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area as...

  6. NWS Daily Climatology Data: 1980 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area...

  7. NWS Daily Climatology Data: 1979 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area...

  8. NWS Daily Climatology Data: 1982 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area...

  9. NWS Daily Climatology Data: 1988 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area as...

  10. NWS Daily Climatology Data: 1981 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area as...

  11. NWS Daily Climatology Data: 1984 (SNF)

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: Daily min, max, average temperature (F), precipitation (water equivalent in inches), and daily insolation (Langleys) for the Superior National Forest area...

  12. Information Technology Management: Hurricane Katrina Disaster Recovery Efforts Related to Army Information Technology Resources

    Science.gov (United States)

    2006-10-19

    Information Technology Management Department of Defense Office of Inspector General October 19, 2006 AccountabilityIntegrityQuality Hurricane...00-00-2006 4. TITLE AND SUBTITLE Information Technology Management : Hurricane Katrina Disaster Recovery Efforts Related to Army Information

  13. Microbial Monitoring from the Frontlines to Space: A Successful Validation of a Department of Defense (DoD) Funded Small Business Innovation Research (SBIR) Technology on Board the International Space Station (ISS)

    Science.gov (United States)

    Oubre, Cherie; Khodadad, Christina; Castro, Victoria; Ott, Mark; Pollack, Lawrence; Roman, Monsi

    2017-01-01

    The RAZOR EX (Registered Trademark) PCR unit was initially developed by the DoD as part of an SBIR project to detect and identify biothreats during field deployment. The system was evaluated by NASA as a commercial technology for future microbial monitoring requirements and has been successfully demonstrated in microgravity on-board the International Space Station.

  14. Redefining The U.S.-Japan Alliance: Tokyo’s National Defense Program

    Science.gov (United States)

    1994-11-01

    FBIS-EAS- 94-164. 12. For example, "Reconsider TMD," Mainichi Daily News, 29 September 1994, and Sadao Sakai, "Improbable Missile Defense," The...Japan Times, 29 September 1994. 13. Japan’s Three Principles on Arms Export, declared in 1967 by the Prime Minister Eisaku Sato , provide that arms

  15. The impact of common metal allergens in daily devices

    DEFF Research Database (Denmark)

    Hamann, Dathan; Hamann, Carsten R; Thyssen, Jacob P

    2013-01-01

    We are widely exposed to metal allergens in our daily doings. As exposures constantly changes because of fashion trends and technological developments, there is a need for a continuous update of patch testers. An overview of consumer metal exposure studies that have been published in 2012 and 2013...

  16. Defense Technology Objectives of the Joint Warfighting Science and Technology Plan and the Defense Technology Area Plan.

    Science.gov (United States)

    1997-01-01

    to reduce the manpower and elapsed time to perform these activities over FY95 norms by 50% and 80%, respectively. The program will demonstrate a...FY98 FY99 FY00 FY01 FY02 FY03 0603231F 12830 1.5 1.1 2.0 2.1 2.3 0 0 Total 1.5 1.1 2.0 2.1 2.3 0 0 11-194 Human Systems HS.03.06 Aircrew Distributed

  17. Information Technology Management: Status of Selected DoD Policies on Information Technology Governance

    Science.gov (United States)

    2005-08-19

    Information Technology Management Department of Defense Office of the Inspector General August 19, 2005 AccountabilityIntegrityQuality Status of...TITLE AND SUBTITLE Information Technology Management : Status of Selected DoD Policies on Information Technology Governance 5a. CONTRACT NUMBER 5b...e - Assistant Inspector General for Acquisition and Technology Management i Department of Defense Office of Inspector General Report No. D

  18. Daily Occupations among asylum seekers

    DEFF Research Database (Denmark)

    Morville, Anne-Le

    2014-01-01

    Asylum seekers often find themselves in a situation where the structure and content of daily occupations have been disrupted and they might have limited access to paid work and education. Studies have shown that asylum seekers experience occupational deprivation and a change in daily occupations...... which might even influence their identity. Such deprivation can eventually lead to dissatisfaction with everyday life and to occupational dysfunction, i.e. a decline in ADL ability. Asylum seekers are a group who are more likely to suffer from health problems than the background population. Especially...... torture survivors suffer from ill health. Pain and psychological symptoms are among the most frequent health issues for both asylum seekers and torture survivors and may cause occupation-related problems. The overarching aim of this thesis was to investigate how staying in an asylum centre influenced...

  19. Organizing Defense Logistics: What Strategic Structures Should Exist for the Defense Supply Chain

    National Research Council Canada - National Science Library

    Maddox, Edward D

    2005-01-01

    .... The primary research question of this study was: What strategic organizational structures should exist within the Department of Defense to facilitate further integration of the defense supply chain...

  20. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2011-07-25

    ... are in support of contingency, humanitarian, or peacekeeping operations, or to facilitate defense... peacekeeping operations, or to facilitate defense against or recovery from nuclear, biological, chemical, or...

  1. The Inflammasome in Host Defense

    Directory of Open Access Journals (Sweden)

    Gang Chen

    2009-12-01

    Full Text Available Nod-like receptors have emerged as an important family of sensors in host defense. These receptors are expressed in macrophages, dendritic cells and monocytes and play an important role in microbial immunity. Some Nod-like receptors form the inflammasome, a protein complex that activates caspase-1 in response to several stimuli. Caspase-1 activation leads to processing and secretion of pro-inflammatory cytokines such as interleukin (IL-1β and IL-18. Here, we discuss recent advances in the inflammasome field with an emphasis on host defense. We also compare differential requirements for inflammasome activation in dendritic cells, macrophages and monocytes.

  2. Transnational architecting for homeland defense

    Science.gov (United States)

    O'Brien, Thomas W.

    2002-07-01

    The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.

  3. Department of Defense Inspector General Semiannual Report for Transmission to Congress October 1, 2004 - March 31, 2005

    Science.gov (United States)

    2005-03-01

    6 Information Technology Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9...the following challenges were identified: Joint Warfighting and Readiness Homeland Defense Human Capital Information Technology Management Acquisition... TECHNOLOGY MANAGEMENT The DoD Components use information technology (IT) in a wide variety of mission functions including finance, personnel management

  4. Dayak and Their Daily Life

    Directory of Open Access Journals (Sweden)

    Hamid Darmadi

    2017-03-01

    Full Text Available This article titled "Dayak and Daily Life" This paper aims to reveal the Dayak and in their daily life. Dayak is a native of Borneo has its own characteristics. Dayak, divided into 405 sub-sub clans [1]. Each sub Dayak both Indonesia and Malaysia are identical. Dayak customs and culture comes from the word "Power" which means upstream, to refer to people who live in inland areas or in the interior of Borneo. In the arsenal of art and culture, Dayak has many similarities such as; saber, chopsticks, beliong, betang, cupai, renjung, empajang and others. Dayak indigenous religion is Kaharingan which is the original religion born of the cultural ancestors of the Dayaks. Most of the Dayak people still adhere to the belief of the existence of unseen objects in certain places such as rocks, large trees, planting gardens in the forest, lakes, pools, and others are believed to have "magical powers". Daily life of the Dayaks in general farming, farming. When will open farming land, farming they held ritual.

  5. Defense Science Board Task Force Report on Cyber Defense Management

    Science.gov (United States)

    2016-09-01

    to the United States as a result of cyber espionage and cybercrime is over$100 billion dollars per year.13,14The DoD faces a cyber defense investment...that cost continues 17 L. Ablon, M.C. Libicki, and A.A. Golay. Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar. Santa Monica, CA: RAND

  6. Reflections on Daily Runs and Material Flows

    DEFF Research Database (Denmark)

    Gommesen, Niels Jørgen

    2014-01-01

    and movements. Based on my felt experiences during daily runs, it analyzes these vibrant land-scapes as heterogeneous assemblages, as collectives co-constituted between human-nonhuman actors, to study the material flows that move our bodies and expose them to new organizations. It sums up, that technologies......This essay reflects on the material flows and intensive states that surround us in our everyday lives, to provide an understanding of the ways in which they permeate and affect our bodies and cause a change in them, when we are moving through a landscape alongside various materialities, rhythms......, milieus and human-nonhuman beings that lives alongside each other, have an immediate impact on each other caused by the circulating intensities within the heterogeneous collectives. We discover that changes in one context interface with changes in another, rhythms resonate and create new movements...

  7. Financial Reporting Procedures for Defense Distribution Depots - Defense Logistics Agency Business Area of the Defense Business Operations Fund

    National Research Council Canada - National Science Library

    Young, Shelton

    1994-01-01

    In our audit of the FY 1993 Financial Statements for the Distribution Depots--Defense Logistics Agency Business Mea of the Defense Business Operations Fund, we evaluated procedures and controls used...

  8. Ballistic Missile Defense: New Plans, Old Challenges

    Directory of Open Access Journals (Sweden)

    Elizabeth Zolotukhina

    2010-01-01

    Full Text Available On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in any European BMD architecture.

  9. Introduction to modern sleep technology

    CERN Document Server

    Chiang, Rayleigh Ping-Ying

    2012-01-01

    This book offers a wide range of up-to-date insight on current research in sleep technology, covering advances in sleep medicine, clinical psychology, engineering, industrial design and technology management, all with the aim of improving people's daily lives.

  10. ADSL Technology

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2002-11-01

    Full Text Available The paper deals with the ADSL (Asymmetric Digital SubscriberLine technology- the asymmetric digital telecommunicationtechnology. It is characterised by high-speed transmissionof data and simultaneous transmission of information regardingthe throughput capacity of the telephone network. Thisresults in better efficiency of transmission, and higher utilisationof the bandwidth. Due to its advantages, the use of ADSLtechnology is increasing daily, especially by ente1prises in Europeand worldwide.

  11. Defensive arrangements in Coptic architecture

    Directory of Open Access Journals (Sweden)

    Nelly Shafik Ramzy

    2011-09-01

    Therefore Coptic architects developed peculiar religious architecture with exceptional defensive arrangements and this research is an attempt to overview those peculiar arrangements inside churches as well as in monasteries. It concluded that -unlike any other religious architecture- safekeeping was a determining factor in Coptic buildings’ design and that the development and the distribution of these arrangements had followed certain patterns and characteristics.

  12. Analytics for Cyber Network Defense

    Energy Technology Data Exchange (ETDEWEB)

    Plantenga, Todd. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Kolda, Tamara Gibson [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  13. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects...

  14. Cyber Defense: An International View

    Science.gov (United States)

    2015-09-01

    offers an example of a G7 state (United States, Japan , Germany, France, United Kingdom, Italy, and Canada) that has chosen a different model to...time and skills for national defense, with main tasks listed as: • Protection of Estonia’s e- lifestyle , • Public-private cooperation in protecting IT

  15. Quantum cascade lasers for defense and security

    Science.gov (United States)

    Day, Timothy; Pushkarsky, Michael; Caffey, Dave; Cecchetti, Kristen; Arp, Ron; Whitmore, Alex; Henson, Michael; Takeuchi, Eric B.

    2013-10-01

    Quantum cascade laser (QCL) systems are mature and at the vanguard of a new generation of products that support military applications such as Infrared Countermeasures (IRCM) and targeting. The demanding product requirements for aircraft platforms that include reduced size, weight, power consumption and cost (SWaP-C) extends to portable, battery powered handheld products. QCL technology operates throughout the mid-wave (MWIR) and long-wave (LWIR) infrared to provide new capabilities that leverage existing thermal imaging cameras. In addition to their suitability for aircraft platforms, QCL products are a natural fit to meet operator demands for small, lightweight pointer and beacon capabilities. Field-testing of high power, lightweight, battery operated devices has demonstrated their utility across a range of air and ground applications. This talk will present an overview of QCL technology and the Defense and Security products and capabilities that are enabled by it. This talk will also provide an overview of the extensive environmental and performance testing associated with products based on QCL technology.

  16. Research on moving target defense based on SDN

    Science.gov (United States)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  17. Defense Acquisition Transformation Report to Congress

    National Research Council Canada - National Science Library

    Krieg, Kenneth J

    2007-01-01

    ... Transformation initiatives and the goals that it has established to achieve change. It provides implementation plans to reform the Defense Acquisition System in the Department of Defense to keep pace with changing demands and adapt to new challenges...

  18. Department of Defense PERSEREC (DOD PERSEREC)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSN information for Defense Manpower Data Center (DMDC) of the Department of Defense. DMDC will use the SSA data...

  19. Dissecting theWRKY Web of Plant Defense Regulators

    OpenAIRE

    Dong Wang; Nita Amornsiripanitch; Xinnian Dong

    2006-01-01

    Many biological processes are controlled by intricate networks of transcriptional regulators. With the development of microarray technology, transcriptional changes can be examined at the whole-genome level. However, such analysis often lacks information on the hierarchical relationship between components of a given system. Systemic acquired resistance (SAR) is an inducible plant defense response involving a cascade of transcriptional events induced by salicylic acid through the transcription...

  20. The US Defense Industrial Base: Past, Present, and Future

    Science.gov (United States)

    2008-01-01

    by the mili- tary industrial complex.” Yet, notwithstanding his oft-cited warning, nearly seven- teen years after the Soviet Union itself...World War II saw dramatic changes in the US approach to its peacetime defense posture. Immediately after the war, the United States demobilized and...eigh- teen to twenty-four months since the 1960s. 138 The record of the government and industry in producing technological innovations has, on the

  1. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    Determined TY - Then Year U.S.C- United States Code USD(AT&L) - Under Secretary of Defense for Acquisition, Technology, & Logistics DHMSM 2016 MAR...program established two segments to support deployment of the EHR System to the MHS enterprise, serving all Active Duty, Reserve, Guard, and...beneficiaries. Fixed Facilities ( Segment 1) will deploy the EHR System to all medical and dental permanent fixed facilities worldwide, inclusive of

  2. Examining daily activity routines of older adults using workflow.

    Science.gov (United States)

    Chung, Jane; Ozkaynak, Mustafa; Demiris, George

    2017-07-01

    We evaluated the value of workflow analysis supported by a novel visualization technique to better understand the daily routines of older adults and highlight their patterns of daily activities and normal variability in physical functions. We used a self-reported activity diary to obtain data from six community-dwelling older adults for 14 consecutive days. Workflow for daily routine was analyzed using the EventFlow tool, which aggregates workflow information to highlight patterns and variabilities. A total of 1453 events were included in the data analysis. To demonstrate the patterns and variability of each individual's daily activities, participant activity workflows were visualized and compared. The workflow analysis revealed great variability in activity types, regularity, frequency, duration, and timing of performing certain activities across individuals. Also, when workflow approach was applied to spatial information of activities, the analysis revealed the ability to provide meaningful data on individuals' mobility in different levels of life spaces from home to community. Results suggest that using workflows to characterize the daily activities of older adults will be helpful for clinicians and researchers in understanding their daily routines and preparing education and prevention strategies tailored to each individual's activity level. This tool also has the potential to be integrated into consumer informatics technologies, such as patient portals or personal health records, so that consumers may be encouraged to become actively involved in monitoring and managing their health. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. 22 CFR 120.6 - Defense article.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Defense article. 120.6 Section 120.6 Foreign Relations DEPARTMENT OF STATE INTERNATIONAL TRAFFIC IN ARMS REGULATIONS PURPOSE AND DEFINITIONS § 120.6 Defense article. Defense article means any item or technical data designated in § 121.1 of this subchapter...

  4. Application of military uncooled infrared sensors to homeland defense

    Science.gov (United States)

    Hornberger, Chris

    2002-08-01

    During the early 1990's, uncooled microbolometer thermal imaging technology began a journey from Government and corporate laboratories to practical application in addressing military, Government, and commercial customer needs. Today, that transition could arguably be considered complete, punctuated by BAE SYSTEMS' delivery of the 10,000th microbolometer camera on 12 February 2002. While microbolometer developmental research continues to advance the state-of-the-art at an ever increasing pace, uncooled infrared cameras are widely deployed serving society in meaningful ways; from preventative maintenance and process inspection to law enforcement and rescue operations. Following last years terrorist attacks in New York and Virginia, President Bush appointed Governor Ridge to lead federal coordination efforts for defense of the homeland. While uncooled microbolometer sensors served in Homeland Security long before September 2001, it is certain that new applications will be identified for surveillance, security, law enforcement and protection needs. In this paper we will describe advances in military uncooled infrared sensor technology and how these sensors can serve in the role of Homeland Defense. Developments in uncooled sensors that will be described include the rugged performance validation of a thermal weapon sight and head-mounted imager. We will look at those areas of Homeland Defense that are most likely to benefit from the application of uncooled microbolometer thermal imaging sensor technology. These include: a) search & rescue camera systems, b) handheld surveillance systems and c) hands-free camera systems.

  5. Chronic Daily Headache - A Reappraisal

    Directory of Open Access Journals (Sweden)

    Chakravarty A

    2004-01-01

    Full Text Available Chronic Daily Headache (CDH generally refers to frequent headache occuring more than 15 days/month for over three months. Such headaches may be primary or secondary - the latter referring to headaches related to identifiable intra and extracranial vascular or other pathologies or systemic illnesses. The primary type may be subclassified as short and long lasting ones, depending upon whether the headache spells are more or less than four hours in duration. The present review would deal with the four major types of long lasting primary CDH which include Chronic migraine (CM, Chronic tension type headache (CTTH, New daily persistent headache (NDPH and Hemicrania continua (HC. The first part of the article would focus on the clinical pattern recognising features of these types. The relationship of medication overuse to CM would be critically evaluated. In the second part, the status of CDH in the recently proposed classification of headache disorders by the International Headache Society would be briefly evaluated. In the next section the clinical Profile or CDH in Indian patients would be highlighted based on available published data. Lastly, the pathophysiology of this vexing condition would be discussed specially in relation to CM and postulating on how it may evolve from episodic migraine.

  6. Active defense scheme against DDoS based on mobile agent and network control in network confrontation

    Science.gov (United States)

    Luo, Rong; Li, Junshan; Ye, Xia; Wang, Rui

    2013-03-01

    In order to effective defend DDoS attacks in network confrontation, an active defense scheme against DDoS is built based on Mobile Agent and network control. A distributed collaborative active defense model is constructed by using mobile agent technology and encapsulating a variety of DDoS defense techniques. Meanwhile the network control theory is applied to establish a network confrontation's control model for DDoS to control the active defense process. It provides a new idea to solve the DDoS problem.

  7. Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice

    Science.gov (United States)

    2015-01-01

    Management Framework ( RMF ) for DoD Information Technology (IT) 11/28/2007 Revised: 3/12/2014 DoDI 8520.02 Public Key Infrastructure (PKI) and Public...28, 2007. U.S. Department of Defense Instruction 8510.01, Risk Management Framework ( RMF ) for DoD Information Technology (IT), March 12, 2014. U.S

  8. 78 FR 69836 - Defense Science Board; Notice of Advisory Committee Meetings

    Science.gov (United States)

    2013-11-21

    ... Acquisition, Technology & Logistics on scientific and technical matters as they affect the perceived needs of... closed to the public. Specifically, the Under Secretary of Defense (Acquisition, Technology, and Logistics), in consultation with the DoD Office of General Counsel, has determined in writing that all...

  9. 32 CFR Appendix A to Part 555 - Director of Defense Research and Engineering

    Science.gov (United States)

    2010-07-01

    ... interactions with other Federal Agencies and technology users at federal, state, and local level, and of... should be made that the laboratory's background, experience and facilities are such that private industry... definition where existing Defense technology offers a unique potential solution. ...

  10. Defense Acquisition Research Journal: Strengthening Cost Consciousness, Professionalism, and Technical Excellence

    Science.gov (United States)

    2016-04-01

    Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST), Institute of Electrical and Electronics Engineers ...Institute of Science and Technology, United Kingdom, respectively; and a PhD in Electrical and Computer Engineering and Statistics from Texas A&M...Hawkins, USAF (Ret.) The Defense Acquisition Professional Reading List The American Warfare State: The Domestic Politics of Military Spending

  11. Intent to Quit among Daily and Non-Daily College Student Smokers

    Science.gov (United States)

    Pinsker, E. A.; Berg, C. J.; Nehl, E. J.; Prokhorov, A. V.; Buchanan, T. S.; Ahluwalia, J. S.

    2013-01-01

    Given the high prevalence of young adult smoking, we examined (i) psychosocial factors and substance use among college students representing five smoking patterns and histories [non-smokers, quitters, native non-daily smokers (i.e. never daily smokers), converted non-daily smokers (i.e. former daily smokers) and daily smokers] and (ii) smoking…

  12. Defense Logistics: Enhanced Policy and Procedures Needed to Improve Management of Sensitive Conventional Ammunition

    Science.gov (United States)

    2016-02-01

    Vulnerability of Sensitive Defense Material to Theft 54 Table 11: Status of Recommendations from Inventory Management: Handheld Missiles Are...Vulnerable to Theft and Undetected Losses 56 Figures Figure 1: Department of Defense and Military Services’ Automated Information Systems for Security...Category WARS-NT Worldwide Ammunition Reporting System-New Technology This is a work of the U.S. government and is not subject to copyright

  13. Positive Trends in Defense Resources for the Armed Forces of the Slovak Republic

    Directory of Open Access Journals (Sweden)

    Milan Sopoci

    2016-06-01

    Full Text Available The article deals with some security aspects and their influence on the defense resources of the Slovak Republic. The contribution it brings lies in the comparison between the defenses resources of the last years and their increase over the years. It shows a positive trend in terms of the modernization of equipment, weapons, technology and weapons systems of the Armed Forces of the Slovak Republic.

  14. Defense Contracting: Complete Historical Data Not Available on Canceled DOD Solicitations

    Science.gov (United States)

    2016-06-29

    federal executive agencies seek competition for contracting opportunities by issuing solicitations. In certain instances, after notifying industry of its...Department of Defense (DOD) canceled after receiving bids or proposals from industry between fiscal years 2010 and 2014.1 This report describes: 1...systems and interviewed officials from the office of the Under Secretary of Defense for Acquisition, Technology and Logistics . To identify examples of

  15. Defense Acquisitions: Opportunities Exist to Improve DOD’s Oversight of Power Source Investments

    Science.gov (United States)

    2010-12-01

    defense power sources industry in DOD investments in power source S&T, we met with representatives of Saft America Inc. ( Saft ), Advanced Thermal Batteries...and EaglePicher Technologies, LLC (EaglePicher). According to the companies, Saft and Page 33 GAO-11-113 Defense Acquisitions Appendix I...Air-to-Surface Standoff Missile, Navstar Global Positioning System (GPS) GPS III, and Advanced Extremely High Frequency satellites program offices

  16. Defense Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats

    Science.gov (United States)

    2017-01-01

    REPORT OF THE DEFENSE SCIENCE BOARD TASK FORCE ON Defense Strategies for Advanced Ballistic and Cruise Missile Threats January 2017 Office of...Science Board Task Force on Defense Strategies for Advanced Ballistic and Cruise Missile Threats completed its information-gathering in February 2016...Defense Strategies fo r Advanced Ballistic and Crui se Missile Threats l am pleased to forward the final report of the DSB Task Force on Defense

  17. Insights from human studies into the host defense against candidiasis.

    Science.gov (United States)

    Filler, Scott G

    2012-04-01

    Candida spp. are the most common cause of mucosal and disseminated fungal infections in humans. Studies using mutant strains of mice have provided initial information about the roles of dectin-1, CARD9, and Th17 cytokines in the host defense against candidiasis. Recent technological advances have resulted in the identification of mutations in specific genes that predispose humans to develop candidal infection. The analysis of individuals with these mutations demonstrates that dectin-1 is critical for the host defense against vulvovaginal candidiasis and candidal colonization of the gastrointestinal tract. They also indicate that CARD9 is important for preventing both mucosal and disseminated candidiasis, whereas the Th17 response is necessary for the defense against mucocutaneous candidiasis. This article reviews the recent studies of genetic defects in humans that result in an increased susceptibility to candidiasis and discusses how these studies provide new insight into the host defense against different types of candidal infections. Copyright © 2011 Elsevier Ltd. All rights reserved.

  18. Integrated Defensive Electronic Countermeasures (IDECM)

    Science.gov (United States)

    2015-12-01

    Future Years Defense Program ICE - Independent Cost Estimate IOC - Initial Operational Capability Inc - Increment JROC - Joint Requirements Oversight...Quantity Total Cost $M Description Australia 7/21/2011 9.9 Australia procured IDECM Block 2/3 (ALE-55) systems as part of the Australian Super Hornet...procurement, per Line 32, Amendment 2 of Case AT-P-SAF. Australia 6/28/2010 2.4 Australia procured IDECM Block 2/3 (EFC) systems as part of the

  19. Nicotine's defensive function in nature.

    Directory of Open Access Journals (Sweden)

    Anke Steppuhn

    2004-08-01

    Full Text Available Plants produce metabolites that directly decrease herbivore performance, and as a consequence, herbivores are selected for resistance to these metabolites. To determine whether these metabolites actually function as defenses requires measuring the performance of plants that are altered only in the production of a certain metabolite. To date, the defensive value of most plant resistance traits has not been demonstrated in nature. We transformed native tobacco(Nicotiana attenuata with a consensus fragment of its two putrescine N-methyl transferase (pmt genes in either antisense or inverted-repeat (IRpmt orientations. Only the latter reduced (by greater than 95% constitutive and inducible nicotine. With D(4-nicotinic acid (NA, we demonstrate that silencing pmt inhibits nicotine production, while the excess NA dimerizes to form anatabine. Larvae of the nicotine-adapted herbivore Manduca sexta (tobacco hornworm grew faster and, like the beetle Diabrotica undecimpunctata, preferred IRpmt plants in choice tests. When planted in their native habitat, IRpmt plants were attacked more frequently and, compared to wild-type plants, lost 3-fold more leaf area from a variety of native herbivores, of which the beet armyworm, Spodoptera exigua, and Trimerotropis spp. grasshoppers caused the most damage. These results provide strong evidence that nicotine functions as an efficient defense in nature and highlights the value of transgenic techniques for ecological research.

  20. Preparing South Africa for Cyber Crime and Cyber Defense

    Directory of Open Access Journals (Sweden)

    Marthie Grobler

    2013-10-01

    Full Text Available The international scope of the Internet, the fast technological advances, the wide reach of technological usage and the increase in cyber-attacks require the South African administrative and legislative system to both intersect largely with the application and implementation of international legislation, take timeous precautionary measures and stay updated on trends and developments. One of the problems associated with the technological revolution is that the cyberspace is full of complex and dynamic technological innovations that are not well suited to any lagging administrative and legal system. A further complication is the lack of comprehensive and enforceable treaties facilitating international cooperation with regard to cyber defense. The result is that many developing countries in particular, are either not properly aware, not well prepared, or adequately protected by both knowledge and legislation, in the event of a cyber-attack on a national level. Even if these countries realize the threats, the time to react is of such a long nature due to consultation and legislative processes, that the legal systems provide little support to ensure timeous and necessary counter-measures. This article will address this problem by looking at the impact of technological revolution on cybercrime and cyber defense in a developing country and will evaluate the relevant South African legislation. It will also look at the influence of cyber defense on the international position of the South African Government. South Africa at present does not have a coordinated approach in dealing with Cybercrime and does not have a comprehensive Cyber defense strategy in place. The structures that have been established to deal with Cyber security issues are inadequate to holistically deal with these issues. The development of interventions to address cybercrime requires a partnership between business, government and civil society. This article will provide an approach to

  1. Global Daily Climatology Network: Kazakhstan subset

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset is a compilation of in situ daily meteorological observations for Kazakhstan within the framework of joint efforts to create Global Daily Climatology...

  2. NOAA Daily Optimum Interpolation Sea Surface Temperature

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The NOAA 1/4° daily Optimum Interpolation Sea Surface Temperature (or daily OISST) is an analysis constructed by combining observations from different platforms...

  3. Daily Medicine Record for Your Child

    Science.gov (United States)

    ... the-Counter Pain Relievers and Fever Reducers Daily Medicine Record for Your Child (English) Share Tweet Linkedin ... Age: ____ 2 years old___ Weight: ___ 30 pounds ___ Daily Medicine Record Child’s name: ___________________ Today’s date: _________________ Age: ____________ Weight: ________________ (pounds) ...

  4. CDC WONDER: Daily Fine Particulate Matter

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Daily Fine Particulate Matter data available on CDC WONDER are geographically aggregated daily measures of fine particulate matter in the outdoor air, spanning...

  5. Hybrid network defense model based on fuzzy evaluation.

    Science.gov (United States)

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  6. 2003 annual report. Information and health, defense, energy; Rapport annuel 2003. Information et sante, defense, energie

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    This document is the 2003 annual report of the French atomic energy commission (CEA). It presents, first, the main highlights of the research activity of the CEA in three domains: the national defense (the Simulation program and the share of the technical means with the scientific community, the nuclear warheads, the nuclear propulsion, the cleansing of the Rhone valley facilities, the monitoring of treaties respect and the fight against proliferation and terrorism; the energy: the researches on nuclear wastes, the optimization of industrial nuclear systems, the innovations devoted to future nuclear systems, the new energy-related technologies, the basic energy research; the technologies devoted to information and health: micro- and nano-technologies, the software technologies, the basic research. It presents also the main research facilities opened to the community of scientific and industrial users, the training activities, partnerships, agreements and the improvements made in the general organization of the CEA: scientific evaluation, planning, optimization, manpower, international relations, communication, risk management, certification, radiation protection and environmental monitoring. The financial data are added at the end of the document. (J.S.)

  7. Implementation of the Department of Defense Small Business Innovation Research Commercialization Pilot Program: Recent Experience and International Lessons

    Science.gov (United States)

    2012-07-25

    Area Plan, and the Basic Research Plan. Together, these plans represent the foundation of the Defense Science and Technology Strategy, while each of...needed to ensure the UK retains its ranking as the world’s second largest aerospace economy in an increasingly globalised and competitive market...set-asides and encourage greater Phase III awards by aligning SBIR/STTR focus areas with DoD R&D Plans (e.g., the Defense Technology Area Plan, Basic

  8. The Daily Practices of Successful Principals

    Science.gov (United States)

    Brock, Barbara L.; Grady, Marilyn L.

    2011-01-01

    While many books outline the attributes of successful school leaders, few describe how those traits manifest in daily practice. "The Daily Practices of Successful Principals" goes beyond the outward picture of excellence and provides a compendium of daily practices used by successful principals in various settings. Written by former administrators…

  9. Automated Generation of Models of Activities of Daily Living

    OpenAIRE

    Saives, Jérémie; Faraut, Gregory

    2014-01-01

    International audience; In order to increase the safety of autonomous elderly people in their home, Ambient Assisted Living technologies are currently emerging. Namely, the recognition of their activities might be a way to detect eventual health problems, and can be performed in a Smarthome equipped with binary sensors. Hence, this communication aims at providing means to automatically generate a formal model of the Activities of Daily Living. A data mining approach in order to discover frequ...

  10. Contribution to the improvement of management in defense logistics

    Directory of Open Access Journals (Sweden)

    Srđan D. Ljubojević

    2013-12-01

    Full Text Available Introduction Changes in social environment require adequate answers of all organizational systems, including defense systems and their logistic systems. Improvement of management in defense logistics involves good knowledge of management theory and practice, knowledge of the impact of ownership and market on management, knowledge of public and other macroeconomic sectors functioning, broader opening towards environment and the exchange of knowledge, information and lessons learned with international environment. The paper presents theoretical and practical knowledge that is prerequisite for improving the management of defense and the management of defense logistic systems.   Definition and the essence of management   Regarding its complexity and a lack of a comprehensive definition, the concept of management is nowadays considered in three ways: as a skill, as social categories - structure of management, as well as a theory - a scientific discipline. When we aanalyze the phenomenon of management, with respect to the historical aspect of its development, there is a necessity to distinguish between management as a scientific discipline and management practice.   Relation between organizational science and management In theory and practice, management is associated with the achievements of many other scientific fields. One of the areas closest to management is organizational science. Today, in the management theory and organization theory, the prevailing attitudes state that these two areas are non-separable and that they are focused on the explaination of the same phenomenon, with the same desire to improve effectivity and development of different purpose systems. There is no clear boundary between organizational science and management, both from theoretical and practical aspects.   Achievements and shortcomings of organizational schools   As a result of solving problems in real systems, a number of opinions and different organizational

  11. Technological Literacy for Teachers

    Science.gov (United States)

    Hasse, Cathrine

    2017-01-01

    Ongoing developments in educational technologies place increasing demands on teachers who have to make decisions on a daily basis concerning how, when, and where to make use of technologies in classrooms. Building on results from the Danish project Technucation, this paper argues that there is a marked need for a teacher-specific version of the…

  12. Once-Daily Amoxicillin for Pharyngitis

    Science.gov (United States)

    Andrews, Megan; Condren, Michelle

    2010-01-01

    A once-daily antibiotic regimen for group A β-hemolytic streptococcal pharyngitis (GABHS) could improve compliance and be effective in the prevention of rheumatic fever, a dangerous complication of untreated or poorly treated GABHS. Amoxicillin is ideal for once-daily dosing due to its low cost. Azithromycin, cefadroxil, ceftibuten, cefixime and extended release amoxicillin are also FDA approved to treat GABHS once daily; however, even when taken for short courses, these antibiotics are more expensive compared with a oncedaily dosing of conventional amoxicillin for 10 days. The American Heart Association recently recommended once-daily amoxicillin dosing when treating GABHS, and amoxicillin has been proven to be effective when dosed once daily, with no obvious disadvantage compared with twice-daily dosing or with conventional penicillin treatment 3 to 4 times daily. PMID:22477812

  13. Needed: Reincarnation of National Defense Education Act of 1958

    Science.gov (United States)

    Harris, Mary M.; Miller, James R.

    2005-06-01

    This paper reviews the historical and current response of the United States to threats to its world leadership in scientific endeavors, with particular attention to the National Defense Education Act of 1958. The current status of the United States in mathematics, science, and engineering education is reviewed with respect to K-12 student achievement, K-12 teacher quality, numbers of degrees granted, and other indicators of international competitiveness. Concluding that we are a nation in peril, recommendations are made to enhance the likelihood that the United States will retain its preeminent position in science and technology and, therefore, provide for the national defense and economic wellbeing of citizens in an information age and global economy.

  14. Territorial Defense, Education, and Interculturalism

    Directory of Open Access Journals (Sweden)

    Claudia Patricia Sierra Pardo

    2011-10-01

    Full Text Available The article carries out a series of reflections regarding the social and economic conditions in which the cultivation of oil palm affected the Bajo Atrato region of the Department of Chocó at the end of the nineteen nineties. It also discusses the actions carried out by communities, companies, and organizations in solidarity with the region’s cause, since these expressions make it possible to understand the role of organization and education in territorial defense processes. Finally, the article examines the different tensions, struggles, challenges, and contradictions inherent to these types of processes.

  15. What Happens After the Defense?

    DEFF Research Database (Denmark)

    Feldtmann, Birgit

    2015-01-01

    The move toward privately contracted armed security personnel raises a number of regulative and legal issues. One example is the question of the master’s duty to render assistance in situations of distress: Does the master have to render assistance if the seafarer in distress is in fact a pirate...... who has attempted to attack the master’s vessel and whose distress is the direct result of lawful self-defense by PCASP? This is the question at the heart of this article, which argues that there are certain post incident obligations and that it is crucial to address these obligations at the flag...

  16. SQL Injection Attacks and Defense

    CERN Document Server

    Clarke, Justin

    2012-01-01

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL Injection Att

  17. Cyber defense and situational awareness

    CERN Document Server

    Kott, Alexander; Erbacher, Robert F

    2015-01-01

    This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for th

  18. Patrol Officer Daily Noise Exposure.

    Science.gov (United States)

    Gilbertson, Lynn R; Vosburgh, Donna J H

    2015-01-01

    established by the OSHA or ACGIH occupational exposure levels from the daily occupational tasks that were monitored.

  19. Battered woman syndrome defense in Canadian courts.

    Science.gov (United States)

    Regehr, C; Glancy, G

    1995-04-01

    As a result of a 1990 Supreme Court of Canada decision, battered woman syndrome defense is now accepted as a legitimate extension of self-defense in Canadian courts. This defense hinges on the expert testimony that a battered woman who is accused of murder or aggravated assault suffers from the psychological sequelae of abuse and that this psychological distress contributes to her apprehension of danger and ultimately her apprehension of death during a particular battering episode. The authors present a brief overview of the history of battered woman syndrome defense, the role of the expert in assessing the applicability of this defense in any particular situation, and the pitfalls of using battered woman syndrome defense.

  20. Technology Assessment for Powertrain Components Final Report CRADA No. TC-1124-95

    Energy Technology Data Exchange (ETDEWEB)

    Tokarz, F. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Gough, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-19

    LLNL utilized its defense technology assessment methodologies in combination with its capabilities in the energy; manufacturing, and transportation technologies to demonstrate a methodology that synthesized available but incomplete information on advanced automotive technologies into a comprehensive framework.

  1. Ballistic Missile Defense and the Atlantic Alliance

    OpenAIRE

    Yost, David S.

    1982-01-01

    T h e Atlantic Alliance may be at the threshold of a new debate on the implications of ballistic missile defense (BMD) for European security. Secretary of Defense Caspar Weinberger and several U.S. Senators and Congressmen support a thorough review of U.S. BMD options, including possible revision of the 1972 Anti- Ballistic Missile (ABM) Treaty and its 1974 Protocol. Although active defense of intercontinental ballistic missiles (ICBMs) seems the most likely application f...

  2. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  3. Implementing an Integrated Network Defense Construct

    Science.gov (United States)

    2013-06-01

    to create an easily defendable avenue for ingress and egress. In medieval times, castles leveraged this principle. If an attacker was brazen enough...of an encompassing defensive structure for network security (Small, 2012). 2.1. The Cyber Defense Dilemma While the philosophy of network...defense mirrors that of the physical world, its application has some significant drawbacks. Whereas the medieval castle defenders had the high ground

  4. The Defense Science Board 2001 Summer Study on Defense Science and Technology

    Science.gov (United States)

    2002-05-01

    controlled prostheses. The February 8, 2002 issue of Science, entitled “ Bodybuilding : _________________________________________________ Chapter...History of “ Bodybuilding ” Year Advance 1597 Reconstruction of the nose by tissue grafting 1682 Repair of human skull with dog skull bone 1888 First

  5. [Relationship between defense mechanism and therapeutic alliance].

    Science.gov (United States)

    Laconi, S; Cailhol, L; Pourcel, L; Thalamas, C; Lapeyre-Mestre, M; Chabrol, H

    2015-10-01

    The therapeutic alliance can be defined as a collaborative relationship between the patient and the practitioner. It represents an essential component of the psychotherapeutic process (Ambresin et al., 2007; Cungi, 2006; Martin et al., 2000). Some authors suggest that a good alliance can have a favorable impact on the therapeutic success (Barber et al., 2000; Hubble, Duncan, & Miller 1999; Horvath & Luborsky, 1993; Horvath & Symonds, 1991). This alliance can be influenced by psychological and behavioral factors (Cungi, 2006) Thus, some defense mechanisms could prevent change or, on the contrary could facilitate adaptation (Ambresin et al., 2007) and have an impact on the therapeutic success (Muris & Merckelbach, 1996). However, the relationship between therapeutic alliance and defense mechanisms represents an insufficiently explored field (Ambresin et al., 2007; Cungi, 2006). The aim of the present study was to examine the relationship between therapeutic alliance and twenty defense mechanisms in a sample of French psychiatric patients, by differentiating results in men and women. We also examined the positive and the negative therapeutic alliance. Sixty patients aged from 18 to 58 (M=41.50; SD=11.03) completed the French versions of the Defense Style Questionnaire-40 (DSQ-40) and the Helping Alliance questionnaire-II (HAq-II). Therapeutic alliance was significantly associated with each defense style: mature (0.62), neurotic (0.45) Ptherapeutic alliance (R(2) adj=36, F=12.39, β=0.65, Ptherapeutic alliance (R(2) adj=36, F=12.34, β=0.62, Ptherapeutic alliance was significantly associated with all mature defenses, three neurotic defenses (reaction formation, pseudo-altruism, idealization) and four immature defenses (splitting, denial, somatization, passive aggression). Among men, three mature defenses were associated (anticipation, humor, sublimation), four neurotic (reaction formation, pseudo-altruism, idealization and undoing) and two immature (somatization and

  6. Nrf2 and Cardiovascular Defense

    Directory of Open Access Journals (Sweden)

    Reuben Howden

    2013-01-01

    Full Text Available The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E 2-related factor 2 (Nrf2, regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis. The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  7. Nrf2 and cardiovascular defense.

    Science.gov (United States)

    Howden, Reuben

    2013-01-01

    The cardiovascular system is susceptible to a group of diseases that are responsible for a larger proportion of morbidity and mortality than any other disease. Many cardiovascular diseases are associated with a failure of defenses against oxidative stress-induced cellular damage and/or death, leading to organ dysfunction. The pleiotropic transcription factor, nuclear factor-erythroid (NF-E) 2-related factor 2 (Nrf2), regulates the expression of antioxidant enzymes and proteins through the antioxidant response element. Nrf2 is an important component in antioxidant defenses in cardiovascular diseases such as atherosclerosis, hypertension, and heart failure. Nrf2 is also involved in protection against oxidant stress during the processes of ischemia-reperfusion injury and aging. However, evidence suggests that Nrf2 activity does not always lead to a positive outcome and may accelerate the pathogenesis of some cardiovascular diseases (e.g., atherosclerosis). The precise conditions under which Nrf2 acts to attenuate or stimulate cardiovascular disease processes are unclear. Further studies on the cellular environments related to cardiovascular diseases that influence Nrf2 pathways are required before Nrf2 can be considered a therapeutic target for the treatment of cardiovascular diseases.

  8. Financial Reporting for Other Defense Organizations at the Defense Agency Financial Services Accounting Office

    Science.gov (United States)

    2001-02-09

    FINANCIAL REPORTING FOR OTHER DEFENSE ORGANIZATIONS AT THE DEFENSE AGENCY FINANCIAL SERVICES ACCOUNTING OFFICE Report No. D-2001-048...34) 09Feb2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") Title and Subtitle Financial Reporting for Other Defense Organizations at the Defense...Supplementary Notes Abstract This report is the first in this series addressing the underlying financial reporting processes that cause abnormal balances

  9. 75 FR 65462 - Renewal of Department of Defense Federal Advisory Committee; Department of Defense Military...

    Science.gov (United States)

    2010-10-25

    ... Military Family Readiness Council AGENCY: Department of Defense (DoD). ACTION: Renewal of Federal advisory... Department of Defense Military Family Readiness Council (hereafter referred to as the ``Council''). FOR... military family readiness by the Department of Defense; and (c) evaluate and assess the effectiveness of...

  10. 75 FR 3210 - Renewal of Department of Defense Federal Advisory Committee; Defense Business Board

    Science.gov (United States)

    2010-01-20

    ... sector corporations or entities and a wealth of top-level, global business experience in the areas of... of the Secretary Renewal of Department of Defense Federal Advisory Committee; Defense Business Board... gives notice that it is renewing the charter for the Defense Business Board (hereafter referred to as...

  11. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

    2011-08-01

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

  12. Daily Public Assistance Grants Award Activity

    Data.gov (United States)

    Department of Homeland Security — Daily activity of Public Assistance Grant Awards, including FEMA Region, State, Disaster Declaration Number, Event description, Mission Assigned agency, Assistance...

  13. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  14. Chemistry Perfumes Your Daily Life

    Science.gov (United States)

    Fortineau, Anne-Dominique

    2004-01-01

    The use of perfumes can be tracked back to many early civilizations. Historically, perfumes were composed exclusively of natural ingredients, mainly essential oils, and were reserved for the wealthiest people. The use of synthetic ingredients marked the beginning of modern perfumery at the end of the 19th century. Nowadays, perfumes are available to everyone and are present in a wide range of consumer goods. The methods used to extract perfume ingredients from their natural sources have changed over time as technology has advanced. Depending on the material, expression, distillation, and solvent extraction are the main techniques used to extract the odorant components from a natural source. Synthetic organic chemistry has provided perfumers with novel ingredients that are cheaper and more stable than many natural materials over the years. Today, more than 3000 fragrance ingredients are estimated to be available to perfumers to create a harmonious composition of head (for example, citrusy), heart (for example, fruity floral) and base notes (for example, musky). Future developments and uses of perfume are endless and as Ernest Beaux, the perfumer who created Chanel N85, once said, "In perfumery the future lies primarily in the hands of the chemists." Featured on the Cover See Featured Molecules .

  15. Forecasting Science and Technology for the Department of Defense

    Science.gov (United States)

    2009-12-01

    conducted with an eye to taking into account such convergences. We offer a detailed set of recommendations on the organization and management of a series...integrative properties of neuronal systems, would offer a solution to this challenge. An early concept for the design of such sensors involved coupling...developments in prosthetics and tissue engineering of artificial organs, the interface between receptors and their artificial supports became the

  16. Software Technology Readiness Assessment. Defense Acquisition Guidance with Space Examples

    Science.gov (United States)

    2010-04-01

    evaluation and the overall system implementation progress 64 And Finally, an Expert’s Voice … • Richard Feynman * was once asked how many process...down the problem 2) Think real hard 3) Write down the solution * Richard Feynman (1918-1988); professor and researcher; one of the most

  17. Subject Categorization Guide for Defense Science and Technology

    Science.gov (United States)

    1986-10-01

    Sciences therapy and prosthesis . For pharmaceutics, See 06/15, Pharmacology. For veterinary medicine, See 02/05, Animal Husbandry and Veterinary Medicine...prieumoniac 01/03 Landing lights 20/08 Klein Nishina formula 01/05 Landing mats 09/01 Klysti-ons 01/05 Landing paOs 06/04 Knee (Anatory) 08/10 Landslides...15/01 Military organizations 12/06 Microprocessors 05/09 Military personnel 12/05 Microprogramming 15/06 Military planning 14/02 Microradiography 05

  18. Domestic Disasters and Geospatial Technology for the Defense Logistics Agency

    Science.gov (United States)

    2014-12-01

    Routing Problem ( VRP ) Spreadsheet Solver and Esri Maps for Microsoft Office to determine the optimal route each fuel truck should take to meet every...also used an optimization model to analyze DLA quantitative fuel distribution data. This report used Vehicle Routing Problem ( VRP ) Spreadsheet Solver...Contract Action USACE U.S. Army Corps of Engineers VIC Virtual Information Center VRP Vehicle Routing Problem xv ACKNOWLEDGMENTS We would

  19. Department of Defense Space Science and Technology Strategy 2015

    Science.gov (United States)

    2015-01-01

    level of a world-class laboratory as envisioned by Thomas Edison to support Navy and Marine Corps needs. The RC was extremely impressed with the...satellite crosslink Edison Demonstration of Small Networks (EDSN) NASA FY 14 Maintaining crosslinking for 8 CubeSats Ground system development

  20. Advanced Optical Technologies for Defense Trauma and Critical Care

    Science.gov (United States)

    2014-02-04

    High-resolution imaging of microvasculature in human skin in-vivo with optical coherence tomography,” Optics Express 20, 7694-7705 (2012). 17...resolution imaging of microvasculature in human skin in-vivo with optical coherence tomography," Optics Express, 20, 7694-7705 (2012). 23. Mazhar, A

  1. Hypermedia Laboratory, Defense Applied Information Technology Center; Review for 1988

    Science.gov (United States)

    1988-12-01

    information personalized to meet their needs. Information " boutiques ", organized by subject and interconnected, will form a virtual worldwide...been a rash of violent acts in and around YYerun, the capital of YY. Recidivist terrorists have bombed a few restaurants and hotels , and have

  2. Proceedings of the Department of Defense Environmental Technology Workshop

    Science.gov (United States)

    1995-05-01

    Extract 4.45 0.60 0.140 Sucrose / Tryptone 10.80 0.35 0.032 Sucrose / Malt Extract 5.45 0.57 0.110 1. All media contained O.IM potassium phosphate...Malt Extract 5.51 0.36 0.065 Glycerol / Tryptone 6.73 0.29 0.043 Glycerol / Malt Extract 5.45 0.50 0.092 Sucrose / Tryptone 7.05 0.26 0.037 Sucrose ...planned at the Air Force Reserve site on the Duluth Air Force Base in MN. o Electro- osmosis is under consideration at the Offut Air Force Base in Omaha

  3. Technological Illusions and the Entropy of American Defense

    Science.gov (United States)

    2014-04-11

    After 200 years of comparatively minor scrutiny, since 1992, homosexual service within the military came under constant bombardment. Beginning with...the 1993 implementation of Clinton’s “Don’t Ask, Don’t Tell Policy” to the 2010 DOD review, views toward homosexual service within the military...adaptation is people. The key to unlocking their innovative nature is a personnel system that nurtures adaptability rather than constricting it

  4. High Endoatmospheric Defense Interceptor (HEDI) Technology Testing Program Environmental Assessment

    Science.gov (United States)

    1989-05-31

    observed in April 1989, the algal community of the harbor basin was composed of patchy, silt-laden growths of green algae (Halimeda opuntia ), brown...Penstemon alamosensis) Gray sibara (Sibara o.riseal Organ Mountains evening primrose (penothera ogaansis~ Sand prickly pear ( Opuntia are~naria) Curl-leaf...provide a copy of the draft EIS for review to Mr. Gene Nitta, Protected Species Management Branch, Pacific Area Office, 2570 Dole Street, Honolulu

  5. Implementing Solar Technologies at Airports

    Energy Technology Data Exchange (ETDEWEB)

    Kandt, A.; Romero, R.

    2014-07-01

    Federal agencies, such as the Department of Defense and Department of Homeland Security, as well as numerous private entities are actively pursuing the installation of solar technologies to help reduce fossil fuel energy use and associated emissions, meet sustainability goals, and create more robust or reliable operations. One potential approach identified for siting solar technologies is the installation of solar energy technologies at airports and airfields, which present a significant opportunity for hosting solar technologies due to large amounts of open land. This report focuses largely on the Federal Aviation Administration's (FAA's) policies toward siting solar technologies at airports.

  6. 2011 Congressional Report on Defense Business Operations

    Science.gov (United States)

    2011-04-30

    OBMS 9/20/2010 ODAA Business Management System $2.420 PVDAS 9/30/2010 Pharmacovigilance Defense Application System $2.000 TBI/PH - ITI 8/4... Pharmacovigilance Defense Application System $2.000 UITS Universal Immunization Tracking System $0.640 JTDI Joint Technical Data Integration $3.321 MSSM

  7. Teaching Women Self-Defense: Pedagogical Issues.

    Science.gov (United States)

    Madden, Margaret E.; Sokol, Thomas J.

    1997-01-01

    Addresses feminist pedagogical issues concerning whether the instructional methods and content of self-defense courses truly result in the empowerment of women in response to violence against them. Reviews research on the utility of learning resistance techniques, lists recommendations for self-defense teaching methods, and outlines a sample…

  8. Strengthening Nordic-Baltic Defense Capabilities

    DEFF Research Database (Denmark)

    Breitenbauch, Henrik Ø.

    2014-01-01

    and troubling challenge to the way international security has been structured in Europe since the end of the Cold War. While most of the existing defense cooperation with a view of strengthening defense capabilities has been carried out within the internationally renowned framework of NORDEFCO...... the NATO aspect of Nordic-Baltic security....

  9. 29 CFR 1630.15 - Defenses.

    Science.gov (United States)

    2010-07-01

    ... Relating to Labor (Continued) EQUAL EMPLOYMENT OPPORTUNITY COMMISSION REGULATIONS TO IMPLEMENT THE EQUAL EMPLOYMENT PROVISIONS OF THE AMERICANS WITH DISABILITIES ACT § 1630.15 Defenses. Defenses to an allegation of discrimination under this part may include, but are not limited to, the following: (a) Disparate treatment...

  10. The Defense Mechanisms of Coronary Patients.

    Science.gov (United States)

    Peglar, Marian; Borgen, Fred H.

    1984-01-01

    Tested 73 male inpatients with coronary heart disease on the Defense Mechanisms Inventory, State-Trait Anxiety Inventory, and a perception of health measure. Subjects were followed for five years. Principalization was discovered to be the most successful and projection the least successful defense. (JAC)

  11. Marquis: a defense of abortion?

    Science.gov (United States)

    Gelfand, S D

    2001-04-01

    This is a reply to Don Marquis' "Why Abortion is Immoral." Marquis, who asserts that abortion is morally wrong, bases his argument on the following premise: Killing a being is morally wrong if that being is the sort of being who has a valuable future. I argue that this premise is false. I then assert that if I am correct about this premise being false, Marquis is faced with a dilemma. If he does not alter the premise in a way that makes it true, his argument is unsound. However, if he does make such an alteration, he must also alter a second premise in his argument, and this second change opens him to the charge of question begging. In addition, I conclude that such an alteration requires Marquis to adopt a position much like that taken by Judith J. Thompson in "A Defense of Abortion," a position he initially states is indefensible.

  12. Lung defenses against opportunistic infections.

    Science.gov (United States)

    Lipscomb, M F

    1989-12-01

    This review has examined the possible role of CMI in providing protection against three pathogens that can be opportunists in the lung. Monoclonal antibodies that identify the cellular components of the immune response and recombinant cytokines are important tools to better understand how pulmonary immunity is regulated. Although not discussed in detail, recombinant microbial antigens are useful for understanding various aspects of protective immunity and immunosuppression as well as for advancing vaccine development. There are important problems to address in order to continue steady progress in understanding pulmonary defenses, including some of those mentioned in this brief review. There should be an increased use of infectious models that more closely mimic naturally occurring infections, and comparisons should be made between results obtained with parenteral versus intrapulmonary routes of infection.

  13. Physics of a ballistic missile defense - The chemical laser boost-phase defense

    Science.gov (United States)

    Grabbe, Crockett L.

    1988-01-01

    The basic physics involved in proposals to use a chemical laser based on satellites for a boost-phase defense are investigated. After a brief consideration of simple physical conditions for the defense, a calculation of an equation for the number of satellites needed for the defense is made along with some typical values of this for possible future conditions for the defense. Basic energy and power requirements for the defense are determined. A sumary is made of probable minimum conditions that must be achieved for laser power, targeting accuracy, number of satellites, and total sources for power needed.

  14. Tumorigenesis: cell defense against hypoxia?

    Directory of Open Access Journals (Sweden)

    Nafiseh Pakravan

    2013-04-01

    Full Text Available Microenvironmental elements can directly contribute to the induction and the maintenance of tumor. Oxygen is the main element in the cell microenvironment and hypoxia can affect the process of tumorigenesis. In response to hypoxia, cells change their pattern and characteristics. These changes suggest that it is not just adaptation, but some sort of cell defense against hypoxia. If hypoxia is corrected, then cell defense mechanisms are interrupted. An examination of the process of tumorigenesis helps to design better therapeutic strategies.A systematic review of the English literature was conducted by searching PubMed, Google Scholar, and ISI Web databases for studies on changes that defend and help cells to live in a hypoxic microenvironment. Cells respond to hypoxia by de-differentiation and an increase in heat shock proteins. Angiogenesis and deviation of inflammatory response in favor of hypoxic cell survival also defend and save the oxygen-starved cells from death. Finally, anti-angiogenic therapies and more hypoxia enhance metastasis, as tumors with low oxygen concentration are more malignant than tumors with high oxygen concentration. All these enable cells to migrate away from low oxygen areas and seek a more conducive microenvironment. Therapies that make the microenvironment more hypoxic need to be revised. This has been done for antiangiogenic therapies, previously considered to be anti-tumor approaches. Effective therapies may be correcting therapies which direct the tumor microenvironment towards natural physical/chemical condition. Correcting therapies either bring back tumor cells to a normal form (correct tumor cells or help the immune system to eradicate tumor cells which can not be corrected.

  15. Strategic Defense Initiative: do we really need it

    Energy Technology Data Exchange (ETDEWEB)

    Behler, G.R.

    1986-04-07

    In March 1983, President Ronald Reagan announced that his administration planned to start a multi-billion dollar research program called the Strategic Defense Initiative. This program is aimed at finding ways to defend the United States and its allies from strategic nuclear attack, using developing technologies. As announced by the US administration, the SDI is strictly a research program at this time. Most agree that such research does not violate existing US-USSR or other treaties. However, deployment of such a system would violate existing treaties. Few programs announced by any administration have created as much controversy. After almost three years of debate, all sides have had ample opportunity to express their points of view. This paper looks at what the Strategic Defense Initiative is, explores the positions of those in favor and those opposed to it, considers the potential impact of the Gramm-Rudman bill on the SDI and defense in general, and finally answers the question, Do we really need it.

  16. Stochastic modelling of daily rainfall sequences

    NARCIS (Netherlands)

    Buishand, T.A.

    1977-01-01

    Rainfall series of different climatic regions were analysed with the aim of generating daily rainfall sequences. A survey of the data is given in I, 1. When analysing daily rainfall sequences one must be aware of the following points:
    a. Seasonality. Because of seasonal variation

  17. Children's Daily Routines during Kindergarten Transition

    Science.gov (United States)

    Wildenger, Leah K.; McIntyre, Laura Lee; Fiese, Barbara H.; Eckert, Tanya L.

    2008-01-01

    Routines are an important feature of family life and functioning in families with young children. Common daily routines such as dinnertime, bedtime, and waking activities are powerful organizers of family behavior and may be instrumental to children and families during times of transition, such as elementary school entry. Daily routines were…

  18. Techniques for Daily Living: Curriculum Guides.

    Science.gov (United States)

    Wooldridge, Lillian; And Others

    Presented are specific guides concerning techniques for daily living which were developed by the child care staff at the Illinois Braille and Sight Saving School. The guides are designed for cottage parents of the children, who may have both visual and other handicaps, and show what daily living skills are necessary and appropriate for the…

  19. [Chronic daily headache in children and adolescents].

    Science.gov (United States)

    Cuvellier, J-C; Cuisset, J-M; Vallée, L

    2008-12-01

    Chronic daily headache (CDH) affects 2-4% of adolescent females and 0.8-2% of adolescent males. Chronic daily headache is diagnosed when headaches occur more than 4h/day, 15 headache days per month or more, over a period of 3 consecutive months, without an underlying pathology. It is manifested by severe intermittent, migraine-like headaches as well as by chronic baseline headaches. Both Silberstein-Lipton criteria and the second edition of the International Classification of Headache Disorders (ICHD) can be used to classify chronic daily headache in children and adolescents. Chronic daily headache is classified into four diagnostic categories: transformed (Silberstein-Lipton criteria)/chronic (ICHD) migraine, chronic tension-type headache, new daily persistent headache, and hemicrania continua. Children and adolescents with chronic daily headache frequently have sleep disturbance, pain at other sites, dizziness, medication-overuse headache, and a psychiatric comorbidity (anxiety and mood disorders). Chronic daily headache frequently results in school absence. Successful approaches to treatment include reassurance, education, use of preventative medication, avoidance of analgesics, and helping the child return to a functional daily routine and a regular school schedule.

  20. How the Daily Press Looks at Hunger.

    Science.gov (United States)

    Robinson, Sondra G.

    Utilizing both content analysis of 139 editorials appearing in 19 United States daily newspapers and the results of a survey of 146 newspaper editors, a study asked three questions: (1) To what extent is hunger covered in the news and editorial columns of U.S. daily newspapers? (2) How is hunger defined as a problem in terms of its causes in those…

  1. Daily Stressors in Primary Education Students

    Science.gov (United States)

    Fernández-Baena, F. Javier; Trianes, María V.; Escobar, Milagros; Blanca, María J.; Muñoz, Ángela M.

    2015-01-01

    Daily stress can have a bearing on children's emotional and academic development. This study aimed to assess daily stressors and to determine their prevalence among primary education students, taking into account their gender, academic year, social adaptation, and the school location. A sample of 7,354 Spanish schoolchildren aged between 6 and 13…

  2. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Brown, P.S. (ed.)

    1983-06-01

    Research activities at Lawrence Livermore National Laboratory are described in the Energy and Technology Review. This issue includes articles on measuring chromosome changes in people exposed to cigarette smoke, sloshing-ion experiments in the tandem mirror experiment, aluminum-air battery development, and a speech by Edward Teller on national defense. Abstracts of the first three have been prepared separately for the data base. (GHT)

  3. Investment in defense and cost of predator-induced defense along a resource gradient

    DEFF Research Database (Denmark)

    Steiner, Uli

    2007-01-01

    . In this study, I exposed tadpoles to caged predators along a resource gradient in order to estimate investment in defense and costs of defense by assessing predator-induced plasticity. Induced defenses included increased tail depth, reduced feeding, and reduced swimming activity; costs associated......An organism's investment in different traits to reduce predation is determined by the fitness benefit of the defense relative to the fitness costs associated with the allocation of time and resources to the defense. Inherent tradeoffs in time and resource allocation should result in differential...... investment in defense along a resource gradient, but competing models predict different patterns of investment. There are currently insufficient empirical data on changes in investment in defensive traits or their costs along resource gradients to differentiate between the competing allocation models...

  4. Transforming Department of Defense Financial Management: A Strategy for Change

    National Research Council Canada - National Science Library

    2001-01-01

    At the request of the Secretary of Defense (SECDEF), the Department of Defense (DoD) contracted with the Institute for Defense Analyses to conduct a study to recommend a strategy for financial management improvements within the Department...

  5. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    National Research Council Canada - National Science Library

    Hoff, Russell V

    2007-01-01

    .... This thesis examines whether cost changes are evident following consolidation within the defense industry by conducting a regression analysis of Major Defense Acquisition Programs across 13 broad defense market sectors...

  6. An outline of military technological dynamics as restraints for acquisition, international cooperation and domestic technological development

    Directory of Open Access Journals (Sweden)

    Édison Renato Silva

    2014-12-01

    Full Text Available The expectation that technological returns from defense expenditure through acquisition, international cooperation and domestic research would further national development underappreciates the different technological dynamic of the armed services. This paper outlines the technological dynamic the stems from fighting in the air, at sea and on land, exemplifying consequences for the case of acquisition.

  7. Daily medication routine of adolescents with HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Cristiane Cardoso de Paula

    2013-12-01

    Full Text Available The objective of this study was to describe the sociodemographic, clinical, and behavioral characteristics of the daily medication routine of adolescents with HIV/AIDS of ages 13 to 19 years, followed at a reference service. This descriptive cross-sectional study was performed with 23 adolescents, using a quantitative approach. Data were collected using a form during appointments at the outpatient clinic. Univariate analysis revealed: females, in the initial phase of adolescence, and vertical transmission. The highlights were: lack of assiduity to appointments; unprotected sex; and consumption of alcohol. Regarding the daily medication routine, subjects depend on their parents or guardians, use strategies to remember to take the medications, and are unaware about the laboratory test for disease management and treatment. There is a need for educative intervention using information and communication technology, such as the Internet, to promote health and autonomy among adolescents. Descriptors: Acquired Immunodeficiency Syndrome; Adolescent Health; Antiretroviral Therapy, Highly Active; Nursing.

  8. Pineal Proteins Upregulate Specific Antioxidant Defense Systems in the Brain

    Directory of Open Access Journals (Sweden)

    Vijay K. Bharti

    2009-01-01

    Full Text Available The neuroendocrine functions of the pineal affect a wide variety of glandular and nervous system processes. Beside melatonin (MEL, the pineal gland secretes and expresses certain proteins essential for various physiological functions. It has been suggested that the pineal gland may also have an antioxidant role due to secretory product other than MEL. Therefore, the present study was designed to study the effect of buffalo (Bubalus bubalis pineal proteins (PP on the antioxidant defense system in the brain of female rats. The twenty-four rats were taken in present study and were divided into four groups: control (0 day, control (28 day, vehicle control and buffalo PP. The PP was injected 100 µg/kg BW intraperitoneal (i.p. daily for 28 days. The activities of superoxide dismutase (SOD, glutathione peroxidase (GPx, catalase (CAT, glutathione reductase (GR and reduced glutathione (GSH concentration and the levels of lipid peroxidation (LPO in the brain tissue were measured to assess the antioxidant systems. These enzymes protect from adverse effects of free radicals and help in amelioration of oxidative stress. Buffalo pineal proteins administration did not cause any effect on brain LPO, whereas GPx, GR and GSH were significantly (p < 0.05 decreased. However, SOD and CAT activities were increased to significant levels than the control in PP treated rats. Our study herein suggested that buffalo (Bubalus bubalis pineal proteins upregulates specific antioxidant defense systems and can be useful in control of various oxidative stress-induced neuronal diseases.

  9. Advancement in Engineering Technology

    DEFF Research Database (Denmark)

    Kalia, Kartik; Rehman, M. Atiqur; Hussain, Dil muhammed Akbar

    2016-01-01

    In this paper we will be discussing about the impact of technology on our daily lives. How everybody is dependent upon technology in one or other way. Methods/Statistical Analysis: Technology has played a significant role in the evolution of the society. Science has produced many new ideas...... but to harvest those ideas, technology is a must. With the huge requirement of engineering equipment's, the industry needs specialists who can manage and operate these technologies. Detailed information about the merits and demerits of technology is also mentioned in this paper. Findings: Technology has affected...... the environment on a great scale; in some cases, technology is even replacing human being or use of manpower. So proper counter measures have been mentioned, which can be used to control and limit harmful effect....

  10. Defense Contract Management Command Capitalization of Fixed Assets

    National Research Council Canada - National Science Library

    Young, Shelton

    1997-01-01

    The audit objective was to determine whether the Defense Logistics Agency and the Defense Finance and Accounting Service had implemented effective management control procedures and complied with laws...

  11. Defense Finance and Accounting Service Commercial Activities Program

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report evaluated the Defense Finance and Accounting Service competitive sourcing process and reviewed the adequacy of the Defense Finance and Accounting Service management control program...

  12. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  13. Night Vision Technology and the Night Attack by Light Infantry

    Science.gov (United States)

    1992-12-30

    34• Stephen L. Canby (for C&L Associates), Classic Light Infantry and New Tehnology (Adington, VA. Defense Advanced Project Agency, 1981), 47. 21Willard... Furlong , Robert D.M. "Infantry Night Vision Systems," Armada International 14 (June-July 1990): 6-22. Henderson, F.P. The Effect of Day and Night on...Air Defense School, undated. 62 Canby, Stephen L. "Classic Light Infantry and New Technology." Defense Advanced Research Project Agency, 1981

  14. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    Science.gov (United States)

    2012-12-01

    including the United States, account for some 80 percent of the world’s defense spending.10 Commonsense dictates that the U.S. military can afford to...a declaration that, in the new world, a nation can sustain its competitive edge only if it has the knowledge and technological capacity to keep

  15. A Comparison of SiC Power Switches for High-Rel Defense Applications (preprint)

    Science.gov (United States)

    2007-07-01

    junction transistor ( BJT ). The VJFET is principally valued for having demonstrated the highest current and voltage combinations, positive...for defense applications. They are the vertical junction field effect transistor (VJFET), the metal-oxide-semiconductor FET (MOSFET), and the bipolar...most technologically ready SiC power switch, the vertical junction field effect transistor (VJFET), has been demonstrated in preproduction devices at

  16. 76 FR 38051 - Defense Federal Acquisition Regulation Supplement; Definition of Sexual Assault (DFARS Case 2010...

    Science.gov (United States)

    2011-06-29

    ... for the Under Secretary of Defense for Acquisition, Technology, and Logistics to develop requirements.... II. Discussion and Analysis A. Public Comments Two respondents submitted positive comments in... assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to...

  17. Defense Acquisitions: How and Where DOD Spends and Reports Its Contracting Dollars

    Science.gov (United States)

    2016-12-20

    mandatory and discretionary federal spending. Services accounted for 44% of total DOD contract obligations, goods for 47%, and research and...Congressional Research Service 10 Figure 8. Federal and U.S. Expenditures Source: National Science Foundation, Science and Engineering Indicators 2016...Sargent Jr. Specialist in Science and Technology Policy Gabriel M. Nelson Research Assistant Ceir Coral National Defense Fellow December 20, 2016

  18. Streamlining Administrative Procedures at the Defense Language Institute: The Strategic Impact Model in Action

    Science.gov (United States)

    Oded, Yaniv; Su, Bude

    2010-01-01

    Performance at the Defense Language Institute was examined through the prism of human performance technology and the strategic impact model. This examination revealed performance deficiencies in the administrative realm that required mainly a noninstructional intervention. A systematic analysis showed that digitizing administrative procedures…

  19. Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities

    Energy Technology Data Exchange (ETDEWEB)

    1984-02-01

    Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

  20. Pharmacokinetics of nevirapine: once-daily versus twice-daily dosing in the 2NN study

    NARCIS (Netherlands)

    Kappelhoff, Bregt S.; Huitema, Alwin D. R.; van Leth, Frank; Robinson, Patrick A.; MacGregor, Thomas R.; Lange, Joep M. A.; Beijnen, Jos H.

    2005-01-01

    OBJECTIVE: As part of the large international, randomized 2NN trial, the pharmacokinetics of nevirapine in once-daily 400 mg and twice-daily 200 mg dosing regimens were investigated. METHOD: Treatment-naive HIV-1-infected patients were randomized to receive nevirapine 400 mg once daily or 200 mg

  1. Daily Aspirin Therapy: Understand the Benefits and Risks

    Science.gov (United States)

    Daily aspirin therapy: Understand the benefits and risks Daily aspirin therapy can be a lifesaving option, but it's not ... everyone. Get the facts before considering a daily aspirin. By Mayo Clinic Staff Daily aspirin therapy may ...

  2. Novel naval technologies: Sustaining or disrupting naval doctrine

    NARCIS (Netherlands)

    te Kulve, Haico; Smit, Willem A.

    2010-01-01

    The defense sector is generally known to be simultaneously conservative and enthusiastic about novel technologies. Uptake of new technologies by the military may differ depending on the perceived impact of new technologies. Introduction of technological changes can sustain or disrupt doctrine and

  3. 32 CFR 21.680 - Technology investment agreements.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Technology investment agreements. 21.680 Section... AGREEMENT REGULATIONS DoD GRANTS AND AGREEMENTS-GENERAL MATTERS Definitions § 21.680 Technology investment... of the nation's technology and industrial base. Technology investment agreements include one kind of...

  4. Information report presented in application of article 145 of the regulation by the commission of national defense and armed forces about the propulsion system of the second aircraft carrier; Rapport d'information depose en application de l'article 145 du reglement par la commission de la defense nationale et des forces armees sur le mode de propulsion du second porte-avions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-11-01

    In the framework of the project of launching of a sister-ship to the Charles de Gaulle aircraft carrier, this report makes an objective analysis of the different possible propulsion systems that can be considered for this battle ship according to different criteria: 1 - two possible energy sources and four possible configurations of aircraft carrier considered: alternative between nuclear propulsion and conventional propulsion, the two nuclear ships eventualities, the hypothesis of an entirely French-made classical propulsion ship, the opportunity of a French-British cooperation for a conventional aircraft carrier project; 2 - decision criteria: operational need, cost, industrial and technological stakes, constraints linked with daily ship and crew life; 3 - propulsion systems alternative: conventional propulsion and reinforcement of the European defense policy, nuclear propulsion for an operational superiority and for a complementarity with the Charles de Gaulle. (J.S.)

  5. Escolares com baixa visão: percepção sobre as dificuldades visuais, opinião sobre as relações com comunidade escolar e o uso de recursos de tecnologia assistiva nas atividades cotidianas Students with low vision: perception about visual dificulties, opinions on relations with the school community and use of assistive technology resources in daily activities

    Directory of Open Access Journals (Sweden)

    Marília Costa Câmara Ferroni

    2012-06-01

    Full Text Available este trabalho teve como objetivos conhecer a percepção de escolares com baixa visão (visão subnormal em relação à suas dificuldades visuais, suas opiniões sobre a relação com a comunidade escolar e o uso de recursos de Tecnologia Assistiva nas atividades cotidianas. Realizou-se pesquisa quantitativa, tipo transversal, utilizandose roteiro estruturado aplicado por entrevista, no ano de 2010, a 19 escolares que situavam-se na faixa etária entre 12 e 17 anos, que eram frequentadores dos serviços de Habilitação e ou Reabilitação Visual nos municípios de Campinas e Ribeirão Preto e que estavam matriculados no Ensino Fundamental II e Médio. Verificou-se que 94,7% dos entrevistados apresentavam baixa visão congênita e 5,3% a adquirida, sendo 52,6% do sexo feminino e 47,4% do sexo masculino. Os resultados demonstraram que 94,7% declararam ter dificuldades visuais na escola destacando-se as dificuldades para enxergar a lousa (33,3%, ler dicionário (22,2% e realizar leitura de livros (16,7%. Enfatizando as relações com a comunidade escolar, a maioria dos escolares (79,0% afirmou ter bom relacionamento com os professores, 68,4% indicaram possuir boa relação colaborativa com os colegas de classe e 52,4% informaram não possuir relacionamento com a direção, coordenação e outros professores. Sobre o uso de recursos de Tecnologia Assistiva, prevaleceu a informática, sendo que 76,7% utilizam recursos específicos para baixa visão. Verificou-se que a maioria dos alunos possui bom relacionamento com professores e colegas de classe. Em relação a autopercepção das dificuldades visuais, sobressaíram as dificuldades acadêmicas, dificuldades de locomoção e de lazer como assistir televisão.the major goals of this study were to learn about low vision students' perception about their visual difficulties, their opinion about their relationship with the school community and the use of Assistive Technology resources in daily

  6. Energy and technology review

    Energy Technology Data Exchange (ETDEWEB)

    Stowers, I.F.; Crawford, R.B.; Esser, M.A.; Lien, P.L.; O' Neal, E.; Van Dyke, P. (eds.)

    1982-07-01

    The state of the laboratory address by LLNL Director Roger Batzel is summarized, and a breakdown of the laboratory funding is given. The Livermore defense-related committment is described, including the design and development of advanced nuclear weapons as well as research in inertial confinement fusion, nonnuclear ordnance, and particle beam technology. LLNL is also applying its scientific and engineering resources to the dual challenge of meeting future energy needs without degrading the quality of the biosphere. Some representative examples are given of the supporting groups vital for providing the specialized expertise and new technologies required by the laboratory's major research programs. (GHT)

  7. A solution for parallel network architectures applied to network defense appliances and sensors

    Science.gov (United States)

    Naber, Eric C.; Velez, Paul G.; Johal, Amanpreet S.

    2012-06-01

    Network defense has more technologies available for purchase today than ever before. As the number of threats increase, organizations are deploying multiple defense technologies to defend their networks. For instance, an enterprise network boundary often implements multiple network defense appliances, some with overlapping capabilities (e.g., firewalls, IDS/IPS, DNS Defense). These appliances are applied in a serial fashion to create a chain of network processing specifically designed to drop bad traffic from the network. In these architectures, once a packet is dropped by an appliance subsequent appliances do not process it. This introduces significant limitations; (1) Stateful appliances will maintain an internal state which differs from network reality; (2) The network manager cannot determine, or unit test, how each appliance would have treated each packet; (3) The appliance "votes" cannot be combined to achieve higherlevel functionality. To address these limitations, we have developed a novel, backwards-compatible Parallel Architecture for Network Defense Appliances (PANDA). Our approach allows every appliance to process all network traffic and cast a vote to drop or allow each packet. This "crowd-sourcing" approach allows the network designer to take full advantage of each appliance, understand how each appliance is behaving, and achieve new collaborative appliance behavior.

  8. The Development of the US National Missile Defense and its Impact on the International Security

    Directory of Open Access Journals (Sweden)

    J. Yu. Parshkova

    2015-01-01

    Full Text Available The article reflects the US officials' point of view on the development of its national missile defense. The major threat to international security is the proliferation of ballistic missiles and weapons of mass destruction. The United States and the former Soviet Union made huge efforts to reduce and limit offensive arms. However, presently the proliferation of ballistic missiles spreads all over the world, especially in the Middle East, because of the ballistic missile technology falling into the hands of hostile non-state groups. Missile defenses can provide a permanent presence in a region and discourage adversaries from believing they can use ballistic missiles to coerce or intimidate the U.S. or its allies. With the possible attack regional missile defense systems will be promptly mobilized to enhance an effective deterrent. The ultimate goal of such large-scale missile defense deployment is to convince the adversaries that the use of ballistic missiles is useless in military terms and that any attack on the United States and its allies is doomed to failure. The United States has missile defense cooperative programs with a number of allies, including United Kingdom, Japan, Australia, Israel, Denmark, Germany, Netherlands, Czech Republic, Poland, Italy and many others. The Missile Defense Agency also actively participates in NATO activities to maximize opportunities to develop an integrated NATO ballistic missile defense capability. The initiative of the development of US BMD naturally belongs to the United States. That country has enormous technological, financial, economic, military and institutional capabilities, exceeding by far those of the other NATO members combined.

  9. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    To Be Determined TY - Then Year U.S.C- United States Code USD(AT&L) - Under Secretary of Defense for Acquisition, Technology, & Logistics DEAMS...Inc 1 2016 MAR UNCLASSIFIED 3 Col Shaun Hick 4225 Logistics Avenue Building 266, Room S226 Wright-Patterson AFB, OH 45433-2557 Shaun.Hick@us.af.mil...acquisition strategy that implemented BCL, Office of Management and Budget, and Information Technology Acquisition Reform policy by segmenting the two

  10. A systems approach to finding cost-effective alternatives to European Ballistic Missile Defense

    OpenAIRE

    Siddiqui, Irfan; Jacobus, Lucas; Navejas, Abel; Parker, Stephen; Harr, Cameron; Long, David; Wiehe, Blake; Chacon, Abbot; Mellroth, Chris; Adams, Eric; Gomes, John; Berthelotte, Brad

    2013-01-01

    SYSTEMS ENGINEERING CAPSTONE PROJECT REPORT Approved for public release; distribution is unlimited Increasing political tensions between nations, coupled with advancements in technology, have resulted in the need for a Ballistic Missile Defense (BMD) system, specifically in the European theater where ally nations are particularly vulnerable. This report focuses on defending Turkey with a solution that could be fielded by FY18. It includes the following mature technologies: Patriot Advan...

  11. In defense of posthuman dignity.

    Science.gov (United States)

    Bostrom, Nick

    2005-06-01

    Positions on the ethics of human enhancement technologies can be (crudely) characterized as ranging from transhumanism to bioconservatism. Transhumanists believe that human enhancement technologies should be made widely available, that individuals should have broad discretion over which of these technologies to apply to themselves, and that parents should normally have the right to choose enhancements for their children-to-be. Bioconservatives (whose ranks include such diverse writers as Leon Kass, Francis Fukuyama, George Annas, Wesley Smith, Jeremy Rifkin, and Bill McKibben) are generally opposed to the use of technology to modify human nature. A central idea in bioconservativism is that human enhancement technologies will undermine our human dignity. To forestall a slide down the slippery slope towards an ultimately debased 'posthuman' state, bioconservatives often argue for broad bans on otherwise promising human enhancements. This paper distinguishes two common fears about the posthuman and argues for the importance of a concept of dignity that is inclusive enough to also apply to many possible posthuman beings. Recognizing the possibility of posthuman dignity undercuts an important objection against human enhancement and removes a distortive double standard from our field of moral vision.

  12. The Sports Column on National Daily Newspapers

    Directory of Open Access Journals (Sweden)

    Alp Çelik

    2015-10-01

    Full Text Available National daily newspapers aim to report detailed daily news. Sport pages of the newspapers contain sport columns and news about sport activities. The aim of this research was to investigate the sport columns appearing on sport pages of national daily newspapers published in Turkey. During the research process, nine national daily newspapers published in Turkey were reviewed for one year. The number of sport columns, publishing page, publishing space in cm. and accessibility of newspapers are ascertained. Newspaper field measurement, statistical and percentage calculations are made by Microsoft Excel. The study was completed with the transfer of the data obtained from Excel to Word as a document. According to the obtained data, regarding the news density on sport columns; Milliyet has the most news published, Cumhuriyet has the most news on front page, Haber Turk has the most space allocated and Zaman has been the most accessible newspaper.

  13. Percent Daily Value: What Does It Mean?

    Science.gov (United States)

    Healthy Lifestyle Nutrition and healthy eating What do the Daily Value numbers mean on food labels? Answers from Katherine ... 15, 2016 Original article: http://www.mayoclinic.org/healthy-lifestyle/nutrition-and-healthy-eating/expert-answers/food-and-nutrition/ ...

  14. NASA Earth Exchange Global Daily Downscaled Projections

    Data.gov (United States)

    National Aeronautics and Space Administration — The NASA Earth Exchange Global Daily Downscaled Projections (NEX-GDDP) dataset is comprised of downscaled climate scenarios for the globe that are derived from the...

  15. CARVE: Daily Flight Reports, 2012-2015

    Data.gov (United States)

    National Aeronautics and Space Administration — This dataset includes detailed daily flight reports from each of the airborne campaigns over the Alaskan and Canadian Arctic for the Carbon in Arctic Reservoirs...

  16. JPRS Report, Science & Technology Europe

    Science.gov (United States)

    1988-10-20

    technologies 18.0 CNR 19.5 Biology and Medicine 14.4 ENEA 14.0 Physics 11.9 Defense 8.2 Space 114 Int. Contracts 5.5 Interdiscipline Research...720,706 1.1.4 Engineering & 336,900 482,750 54,113 2,930 104,775 136,545 591 23,044 14 1,141,662 18.0 technological research Interdiscipline 13,050

  17. Impact of intestinal stoma of daily activities

    OpenAIRE

    Kougl, Jiří

    2016-01-01

    In the theoretical part I am devoted to the history, anatomy, types of stoma, concept of stoma, indications for an establishment of stoma, pre and postoperative care, treatment of stoma, instruments and the influence on daily activities of a client while having a stoma. In the practical part I am following my own research of the impact of stoma on daily life's activities of klients with a stoma.

  18. [Study of defense styles, defenses and coping strategies in alcohol-dependent population].

    Science.gov (United States)

    Ribadier, A; Varescon, I

    2017-05-01

    Defense mechanisms have been seen to greatly change over time and across different definitions made by different theoretical currents. Recently with the definition provided by the DSM IV, defense mechanisms have integrated the concept of coping as a defensive factor. These mechanisms are no longer considered just through a psychodynamic approach but also through a cognitive and behavioral one. In recent years, new theories have therefore integrated these two components of the defensive operation. According to Chabrol and Callahan (2013), defense mechanisms precede coping strategies. In individuals with psychopathological disorders, these authors indicate a relative stability of these mechanisms. Also, we asked about the presence of unique characteristics among people with alcohol dependence. Indeed, studies conducted with people with alcohol dependence highlight the presence of a neurotic defense style and some highly immature defenses (projection, acting out, splitting and somatization). In terms of coping strategies, persons with alcohol dependence preferentially use avoidant strategies and strategies focused on emotion. However, although several studies have been conducted to assess coping strategies and defense styles within a population of individuals with an alcohol problem, at the present time none of them has taken into account all these aspects of defense mechanisms. The aim of this study is therefore to study the defenses and defense styles and coping strategies in an alcohol-dependent population. This multicenter study (3 CHU, 1 center of supportive care and prevention in addiction and 1 clinic) received a favorable opinion of an Institutional Review Board (IRB Registration #: 00001072). Eighty alcohol-dependent individuals responded to a questionnaire assessing sociodemographic characteristics and elements related to the course of consumption. Coping strategies were assessed by means of a questionnaire validated in French: the Brief Cope. The Defense

  19. Happiness and Defense Styles in Psychiatrists.

    Science.gov (United States)

    Machado, Leonardo; Tavares, Hermano; Petribú, Kátia; Pinto, Tiago; Cantilino, Amaury

    2016-03-01

    The aim of this study was to measure happiness in a sample of Brazilian psychiatrists and correlate it with the defense styles used by them and sociodemographic data. This study was observational, cross-sectional, and analytical. Data were collected through self-administered questionnaires by Brazilian psychiatrists who participated in the XXXII Brazilian Congress of Psychiatry, 2014. In this sample of psychiatrists, happiness levels were high (scoring 5.69 of a total of 7), and mature defense styles prevailed, especially humor and anticipation. In a multivariate analysis, having children, good sleep quality, increased sexual interest, and use of defense styles such as humor, anticipation, and idealization all showed a positive relationship with happiness; on the other hand, using defense style such as acting out or annulment demonstrated a negative relationship with happiness. Despite the well-known professional burden that they bear, Brazilian psychiatrists surveyed presented, in general, high levels of subjective well-being and happiness.

  20. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  1. Amazon, priority for Brazilian National Defense Policy

    National Research Council Canada - National Science Library

    Pereira, Sergio

    2000-01-01

    .... The Brazilian national defense policy, issued in 1996, the first in the history of the country, established directives to orient the Brazilian military strategic planning as well as diplomatic...

  2. Artificial Intelligence and the Future of Defense

    DEFF Research Database (Denmark)

    Maas, Matthijs Michiel; Sweijs, Tim; De Spiegeleire, Stephan

    first-hand how quickly these developments now go. Many analysts foresee truly disruptive changes in education, employment, health, knowledge generation, mobility, etc. But what will AI mean for defense and security? In a new study HCSS offers a unique perspective on this question. Most studies to date...... of this study argue that AI may have a far more transformational impact on defense and security whereby new incarnations of ‘armed force’ start doing different things in novel ways. The report sketches a much broader option space within which defense and security organizations (DSOs) may wish to invest....... The report contains an overview of the role that ‘intelligence’ - the computational part of the ability to achieve goals in the world - has played in defense and security throughout human history; a primer on AI (what it is, where it comes from and where it stands today - in both civilian and military...

  3. Defense Mechanism Card Pull in TAT Stories.

    Science.gov (United States)

    Cramer, Phebe

    2017-01-01

    This study investigates the question of whether different Thematic Apperception Test (TAT; Murray, 1943 ) cards are likely to prompt stories that are characterized by different defense mechanisms. This condition is known as card pull and refers to the probability that different TAT cards elicit different personality scores for the same variable. If so, the assessment of defense use would be importantly influenced by the TAT cards used in an assessment. TAT stories from 3 different community samples were examined (Ns = 91, 98, 121), using a statistical method developed by Stein et al ( 2014 ). The results indicated that different TAT cards pull for different defenses, as assessed by the Defense Mechanism Manual (DMM: Cramer, 1991b ). However, the nature of card pull was not always consistent across samples. These dissimilarities could be due to group differences, or to the presence of different TAT cards used in the test battery, indicating that card pull is importantly determined by context.

  4. Uncertainties in building a strategic defense.

    Science.gov (United States)

    Zraket, C A

    1987-03-27

    Building a strategic defense against nuclear ballistic missiles involves complex and uncertain functional, spatial, and temporal relations. Such a defensive system would evolve and grow over decades. It is too complex, dynamic, and interactive to be fully understood initially by design, analysis, and experiments. Uncertainties exist in the formulation of requirements and in the research and design of a defense architecture that can be implemented incrementally and be fully tested to operate reliably. The analysis and measurement of system survivability, performance, and cost-effectiveness are critical to this process. Similar complexities exist for an adversary's system that would suppress or use countermeasures against a missile defense. Problems and opportunities posed by these relations are described, with emphasis on the unique characteristics and vulnerabilities of space-based systems.

  5. Trilateral Strategic Defense Capability Planning Symposium

    National Research Council Canada - National Science Library

    Butts, Kent

    2004-01-01

    .... This strategic planning initiative has developed the Emerging Security Environment to 2022 document, a National Military Strategy, a National Internal Security Plan, and a Multi-Year Defense Capability Planning System (MYDCaPS...

  6. Defense Primer: A Guide for New Members

    Science.gov (United States)

    2017-03-03

    1 Congress and the Armed ...with Regard to the Armed Forces ................................... 1 The NDAA Process...1 President’s Constitutional Authority with Regard to the Armed Forces ................................... 1 The Department of Defense

  7. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    OpenAIRE

    Mathilde Gralepois; Corinne Larrue; Mark Wiering; Ann Crabbé; Sue Tapsell; Hannelore Mees; Kristina Ek; Malgorzata Szwed

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland and Sweden). The evolutions within the defense strategy over the last 30 years have been analyzed with th...

  8. Enabling National Security Through Dual-Use Technology

    Science.gov (United States)

    2014-04-30

    single most powerful mechanism to make defense a smart buyer of technology is to reduce the artificial barriers that separate defense businesses from...Technical textiles  Ultra-capacitors  Improved lifetime of batteries  Biosensors for harmful gases  Extra-strong fibers As the above examples

  9. Classifying RFID attacks and defenses

    NARCIS (Netherlands)

    Mitrokotsa, A.; Rieback, M.R.; Tanenbaum, A.S.

    2009-01-01

    RFID (Radio Frequency Identification) systems are one of the most pervasive computing technologies with technical potential and profitable opportunities in a diverse area of applications. Among their advantages is included their low cost and their broad applicability. However, they also present a

  10. Cost Effective Regional Ballistic Missile Defense

    Science.gov (United States)

    2016-02-16

    missiles if the war had lasted six more months. With another two years, German research could have produced the first intercontinental ballistic missile ...consideration of missile defenses against strategic threats to the United States homeland (e.g. intercontinental ballistic missiles (ICBM)) lies...AIR WAR COLLEGE AIR UNIVERSITY COST EFFECTIVE REGIONAL BALLISTIC MISSILE DEFENSE by Christopher M. Ford, Colonel, U.S. Army A Research

  11. Italian version of the defense style questionnaire.

    Science.gov (United States)

    San Martini, Pietro; Roma, Paolo; Sarti, Sara; Lingiardi, Vittorio; Bond, Michael

    2004-01-01

    The Defense Style Questionnaire (DSQ) assesses defensive behavior by empirically evaluating conscious derivatives of defense and coping mechanisms in everyday life. It was developed on the assumption that defenses can be ordered along a maturity-immaturity continuum and tend to group into clusters, or defensive styles. The original factor analytical study, by Bond et al. (1983) identified four styles, called maladaptive, image-distorting, self-sacrifice, and adaptive styles. Successive studies only partially confirmed this factor structure. We present the factor structure and the main psychometric features of the Italian version of the questionnaire. The DSQ was translated into Italian by the back-translation method and administered to a sample of 294 men (mean age, 33.33 years) and 333 women (mean age, 32.38 years). An exploratory factor analysis identified three factors largely corresponding to Bond's maladaptive, image-distorting, and adaptive defensive styles and to analogous factors identified by other authors. Accordingly, three defense style scales were constructed, containing respectively 37, 17, and 12 items. These scales showed intercorrelations compatible with the hierarchical model of defensive functioning at the base of the questionnaire, acceptable, though ameliorable, test-retest reliabilities (r's = .79, .63, and .81, respectively) and, with the exception of the Adaptive Style scale, sufficient internal consistencies (alphas: .85, .72, .57). However, only the Maladaptive Style scale, probably due to its greater length, showed values of reliability and internal consistency high enough to warrant clinical use in its present form. Further investigation is required to find new items that may improve the reliability of the Image-Distorting and the Adaptive Style scales.

  12. Integrated Air and Missile Defense (IAMD)

    Science.gov (United States)

    2015-12-01

    Selected Acquisition Report (SAR) RCS: DD-A&T(Q&A)823-205 Integrated Air and Missile Defense (IAMD) As of FY 2017 President’s Budget Defense...Mission and Description 6 Executive Summary 7 Threshold Breaches 8 Schedule 9 Performance 10 Track to Budget 15 Cost and...Funding 16 Low Rate Initial Production 24 Foreign Military Sales 25 Nuclear Costs 25 Unit Cost 26 Cost Variance 29 Contracts 32

  13. Defense Acquisition Reform, 19602009: An Elusive Goal

    Science.gov (United States)

    2011-10-31

    policies throughout the Defense Department. Passed in 1978 by Congress, Public Law 95–140 acted on this recommendation by up- grading the existing...career opportunities for acquisition manag- ers to attain flag or civilian equivalent grade , then the Defense Department should provide other...requirements high performance teams (HPTs) tended to feel either ignored or in- timidated . They said acquisition members “are frequently chosen based on

  14. JROC Changes the Rules of Defense Procurement

    Science.gov (United States)

    1996-01-01

    Joint Warfightmg Capablhty Assessment Process, p 7 ’ JROC and JWCA bnefing, p 9 ‘Il Bemer , Keith and Stephen Daggett, “A Defense Budget Pnmer,” CRS...CO Lynne fienner, 1988) ,p120 ’ Bemer and Daggett, p 26 v1 Bemer and Daggett, p 27 vll Jane’s Defense Weeklv, 23 July 1991, p 32 ‘L1l JROC and

  15. Options for Deploying Missile Defenses in Europe

    Science.gov (United States)

    2009-02-01

    efforts at missile defense (such as the 1960s- era Nike -Zeus program) were aimed at countering the vast Soviet missile arsenal. Recent efforts are...on unclassified performance parameters for the various radars and interceptors and assumed that the systems would work “as advertised .” (A...develop defenses against ballistic missiles. Early U.S. efforts (such as the 1960s-era Nike -Zeus program) were aimed at countering the Soviet Union’s

  16. Determination of Solar Energy Transition Potential of Large Organizations: An Application to Department of Defense Facilities and Non-Tactical Vehicles

    Science.gov (United States)

    Castillo, Ariel S.

    The Department of Defense offers a great opportunity to implement solar energy solutions across its United States bases. It is the single largest energy consumer in the federal government, and has land available on its bases to implement solar energy solutions. By implementing solar energy solutions across its bases in the United States, the Department of Defense will be able to realize benefits such as meeting federal policies and mandates, reducing energy intensity from fossil fuel resources (including foreign oil), reducing carbon dioxide emissions, and improving national security and mission readiness. This dissertation will describe the current Department of Defense energy landscape for its facilities and non-tactical (fleet) vehicles, Department of Defense benefits of implementing solar energy technologies, and research methods and results that could help realize these benefits through the development of a multi-criteria decision model to augment implementation of solar energy technologies on Department of Defense bases.

  17. Quadrennial Defense Review 2014: trends in US defense policy and consequences for NATO

    OpenAIRE

    Overhaus, Marco

    2014-01-01

    Every four years the Pentagon publishes a report on the central developments and trends in US defense policy. The Quadrennial Defense Review (QDR) released in early March 2014 is the first to include in more detail the consequences of the defense budget cuts passed since 2011. Otherwise, the so-called US rebalance to the Asia-Pacific region and the war-weariness of the American people are the principal factors shaping US defense policy. While not representing a watershed for transatlantic def...

  18. Washington’s and Moscow’s Failed Policies Toward Russian Defense Reform

    Science.gov (United States)

    1997-04-01

    Emerges as Road Map to Russian Defense Conversion,” Aviation Week and Space Technology, 6 May 1996, 48. 43 Igor Khripunov , “Russia’s Dangerous Weakness...Augustine, 35-36. 2 Khripunov , “Russia’s Dangerous Weakness,” 38. 3 Senior official at the Institute of US-Canadian Studies, interview with author...Russian Resentment with Plans for Defense Conversion,” Wall Street Journal, September 19, 1994, A10. 4 Winestock, 3A. 5 Ibid., 3A. 6Igor Khripunov

  19. Legal review on PTSD defense of adolescent patients in criminal cases

    Directory of Open Access Journals (Sweden)

    Xiaofu Li

    2017-02-01

    Full Text Available Post-Traumatic Stress Disorder is nothing new for Chinese society; however, Chinese courts are hesitated to accept the PTSD as a mental defense for adolescent patients. PTSD defense might be popular in future and court shall give proper weight to relevant factors. It is a big problem that there are no procedures or instructions for the connection between diagnosis and judgment. The paper illustrates the origination of PTSD and its development in USA with some relevant cases. Even the American courts consider PTSD as a problem. And there should be detailed regulations in China to keep pace with the development of science technology.

  20. The methodological defense of realism scrutinized.

    Science.gov (United States)

    Wray, K Brad

    2015-12-01

    I revisit an older defense of scientific realism, the methodological defense, a defense developed by both Popper and Feyerabend. The methodological defense of realism concerns the attitude of scientists, not philosophers of science. The methodological defense is as follows: a commitment to realism leads scientists to pursue the truth, which in turn is apt to put them in a better position to get at the truth. In contrast, anti-realists lack the tenacity required to develop a theory to its fullest. As a consequence, they are less likely to get at the truth. My aim is to show that the methodological defense is flawed. I argue that a commitment to realism does not always benefit science, and that there is reason to believe that a research community with both realists and anti-realists in it may be better suited to advancing science. A case study of the Copernican Revolution in astronomy supports this claim. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. Cometary Defense with Directed Energy

    Science.gov (United States)

    Zhang, Q.; Lubin, P. M.; Hughes, G. B.

    2016-12-01

    Cometary impacts pose a long-term hazard to humans on Earth. Due to their comparative rarity, most planetary defense schemes neglect the comet threat, choosing instead to focus exclusively on mitigating asteroid impacts. Methods like kinetic impactors may be suitable for deflecting near-Earth asteroids (NEAs) and Jupiter-family comets (JFCs), both of which are characterized by low inclination orbits and short orbital periods which favor early detection—characteristics ideal for an interception mission. In contrast, Halley-type comets (HTCs) and long-period comets (LPCs) are often found in high inclination orbits rarely more than 2 yr prior to reaching Earth's orbit. Unless discovered and identified in a prior apparition—often centuries or millennia earlier, if ever—timely interception of a threatening HTC or LPC is improbable even with preparation, with missions demanding delta-v budgets often in excess of 30 km/s. Active comets, however, are already naturally perturbed from purely gravitational trajectories through solar-driven sublimation of volatiles. Further deflection may be achieved by supplementing the solar radiation with an artificial directed energy source such as by one or more laser arrays positioned on or near Earth. Simulations were developed with models derived from the known solar nongravitational perturbations of typical comets. Results suggest that a diffraction-limited 500 m array operating at 10 GW for 10 min/day may be sufficient to divert a typical active 500 m comet from an impact given 1 yr. A larger 1 km array operating at 100 GW for 100 s/day is similarly effective. Care must be taken to ensure the target remains intact throughout the deflection period due to comets' low compressive strength and resulting propensity for disintegration at high incident flux.

  2. Associations among Daily Stressors and Salivary Cortisol: Findings from the National Study of Daily Experiences

    Science.gov (United States)

    Stawski, Robert S.; Cichy, Kelly E.; Piazza, Jennifer R.; Almeida, David M.

    2013-01-01

    While much research has focused on linking stressful experiences to emotional and biological reactions in laboratory settings, there is an emerging interest in extending these examinations to field studies of daily life. The current study examined day-to-day associations among naturally-occurring daily stressors and salivary cortisol in a national sample of adults from the second wave of the National Study of Daily Experiences (NSDE). A sample of 1,694 adults (Age=57, Range=33–84; 44% male) completed telephone interviews detailing their stressors and emotions on eight consecutive evenings. Participants also provided saliva samples upon waking, 30 minutes post-waking, before lunch and before bed, on four consecutive interview days resulting in 5,995 days of interview/cortisol data. Analyses revealed three main findings. First, cortisol AUC was significantly higher on stressor days compared to stressor-free days, particularly for arguments and overloads at home, suggesting that daily stressors are associated with increased cortisol output, but that not all daily stressors have such an influence. Second, individuals reporting a greater frequency of stressor days also exhibited a steeper diurnal cortisol slope. Finally, daily stressor-cortisol associations were unaltered after adjustment for daily negative affect and physical symptoms. Our discussion focuses on the influence of naturally-occurring daily stressors on daily cortisol and the role of daily diary approaches for studying healthy cortisol responses to psychosocial stressors outside of traditional laboratory settings. PMID:23856186

  3. 76 FR 22681 - Defense Logistics Agency (DLA) Address Directory

    Science.gov (United States)

    2011-04-22

    ... of the Secretary Defense Logistics Agency (DLA) Address Directory AGENCY: Department of Defense. ACTION: Notice. SUMMARY: The Defense Logistics Agency (DLA) is updating its Address Directory which is.... Jody Sinkler, 703-767-5045. SUPPLEMENTARY INFORMATION: DLA Address Directory: Defense Logistics Agency...

  4. Personal daily dialysis: the evolution of the artificial kidney.

    Science.gov (United States)

    Kim, Jeong Chul; Ronco, Claudio

    2013-01-01

    To improve hemodialysis (HD) patients' clinical tolerance and quality of life, a new paradigm of technological evolution of the artificial kidney needs to be addressed at this point. Compared to the second law of thermodynamics, if HD is a barrier against entropy increase, personal daily dialysis (PDD), taking account of multidimensional treatment parameters specific to the patient, can be a new treatment option. Here, we review currently used HD equipment and competing technologies of the wearable artificial kidney (WAK) for future application to PDD. Biofeedback control during HD personalizes treatment parameters such as blood volume changes, thermal energy balance and biochemical variables in well-defined ranges and tries to deliver the targeted treatment dose without intradialytic hypotension. Miniaturized devices such as WAK could also meet the needs of patients by providing mobility, the possibility of normal social activities and flexibility of treatment schedule. So far, many studies have shown the future direction of renal replacement therapy for chronic patients: personalization and daily treatment. PDD might require a new index including a biological plan for recovery of homeostasis and a strategy toward long-term rehabilitation of the patient. The concept of entropy includes these multidimensional factors, and the artificial kidney should be evolved to minimize the increase in entropy of the patient. Copyright © 2013 S. Karger AG, Basel.

  5. Smartphones in remote medicine and daily neurosurgery: The Sabah update.

    Science.gov (United States)

    Perumall, Vinodh Vayara; Sellamuthu, Pulivendhan; Harun, Rahmat; Zenian, Mohd Sofan

    2015-01-01

    Healthcare costs continue to rise every day as the demand outgrows the supply of surgeons. The application of telephone consultation for immediate management is needed as most neurosurgeons are technology orientated. This enables a specialist at a remote mobile site to receive the necessary information and reduce transmission time, from the second the patient is seen till the management is obtained. We conducted a survey on smartphone ownership among doctors and gathered cases that needed neurosurgical input from 1(st) November 2012 till 30(th) April 2013 from all 24 district hospitals in Sabah, Malaysia. The percentage of smartphone ownership among doctors surveyed and usage of it for remote and daily medicine at various departments at Queen Elizabeth Hospital, Kota Kinabalu, which shows at least 90% smartphone ownership and proves 100% ownership of cross-platform instant messaging applications and its usage for remote and daily medicine. It also proves to be a more popular mode of referral compared to "teleconsultation" (TC). In Sabah, the TC service is used for remote medical consultation and only available at four hospitals. The sender needs direct access to a computer with the TC software, and it causes delay whereas doctors using smartphones will just need to discuss the case on the spot and obtain the appropriate management within minutes. Smartphone usage is also important in daily neurosurgery especially at the department level to promote efficient communication, organization, and interaction between all the staff. As for the department's administrative sector, it is useful to notify if anyone is on leave, attending courses or even meetings as the shortage can be avoided, and redistribution easily done. It also allows us to transfer simple intra-departmental data at any time, and any place whenever required. With all the given fact, it is clear that a day without utilizing this service in our daily life will leave us handicapped and struggling with time

  6. Defense Reutilization and Marketing Manual

    Science.gov (United States)

    1990-03-01

    by the tainer; such as 55-gallon metal drum. EPA Regional Administrator, or have had the 3. NSN or LSN/FSC and noun liner removed must have all bungs ... bungs ) to seal the con- materiel and procedures contained in this tainers upon receipt. manual for excess/surplus material shall (5) Markings/labels on...Madison Park High School, Boston, MA 02119 HS F Mario Umana Harbor School of Science & Technology, Boston, MA 02128 SMA N Massachusetts Maritime

  7. Daily life in the enclave Vitina

    Directory of Open Access Journals (Sweden)

    Zlatanović Sanja M.

    2005-01-01

    Full Text Available The paper is based on a fieldwork performed in 2003 in the enclave Vitina, Kosovo. The aim of the paper is to provide an ethnographic brief account of the post-war daily life in the researched area. Since 1999 and the establishment of the international protectorate over the area, the enclave’s daily life has changed profoundly. The people from Vitina are very much concerned about their daily troubles, especially the ones involving the relationship with the Albanian population. The daily life in Vitina is saturated with the war related traumas, existential insecurity and unpredictability, experiences of ghetto, paralyzed everyday life, and the time that appears to stand still. The Kosovo area is characterized by especially complex historical, political and cultural contexts. It is a borderline area, so identities seem to be undefined, varying, ambivalent and situational. In the last decades of the 20th century, the identities became homogenous, developing fixed boundaries. The ethnic identification thus becomes more relevant than any other membership or affiliation. A need to designate and preserve an ethnic identity in Kosovo has lead to a paroxysm. The dominant, Albanian population displays its ethnic symbols openly, while the Serbs demonstrate their symbols more alluringly but with the same amount of fervor. The ethnicity is being articulated in everyday life, in different answers to its requirements and challenges while a daily life is usually equalized with privacy and female sphere, therefore, the paper also discusses a relationship between the ethnic and gender identities.

  8. A STUDY ON DEFENSE ACQUISITION MODELS WITH AN EMERGING MARKET PERSPECTIVE. THE CASE OF TURKEY

    Directory of Open Access Journals (Sweden)

    Mustafa Kemal Topcu

    2015-10-01

    Full Text Available With the end of the Cold War, the static environment, characteristic of the bipolar world, has changed quickly into a dynamic and complicated environment with new actors. These changes have also affected the countries’ armed forces and new approaches to procurement/acquisition come into progress. After the Cold War, countries have focused on responding to changing threats with their decreasing defense budgets. In this study, acquisition models and their effects on Turkey’s technology acquisition and defense industry are evaluated. The evaluation is performed based on criteria such as contribution to national economy, customization, acquisition cost, time and risk, life cycle cost, and technology acquisition. Major acquisition models in this study are determined as direct procurement, production under license, joint venture, indigenous development, production via international consortium. Finally, it is observed that the best model is indigenous development while the others will serve as technology acquisition for indigenous development.

  9. A Double-Edged Sword: Race, Daily Family Support Exchanges, and Daily Well-Being

    OpenAIRE

    Kelly E. Cichy; Stawski, Robert S.; Almeida, David M.

    2013-01-01

    This study contributes to research on race and family ties by exploring racial differences in the direct effects of family support exchanges on daily well-being and the extent to which family support buffers/exacerbates stressor reactivity. African Americans and European Americans aged 34 to 84 (N = 1,931) from the National Study of Daily Experiences (NSDE) reported on family support exchanges (i.e., support received/support provided), daily stressors, and negative affect du...

  10. The First Line of Defense: Higher Education in Wartime and the Development of National Defense Education, 1939-1959

    Science.gov (United States)

    Ponte, Dana Adrienne

    2016-01-01

    This study posits that the National Defense Education Act of 1958 (NDEA) represented the culmination of nearly a century-long process through which education was linked to national defense in periods of wartime, and later retained a strategic utility for defense purposes in times of peace. That a defense rationale for federal support of public…

  11. 2007 Beyond SBIR Phase II: Bringing Technology Edge to the Warfighter

    Science.gov (United States)

    2007-08-23

    Kathleen Harger, Assistant Deputy Under Secretary of Defense for Innovation and Technology Transition Panelists: Mr. John Shakespeare , Washington DC...Secretary of Defense for Innovation and Technology Transition Panelists: - Mr. John Shakespeare ... Screening Production Fabrication Environmental Issues PRODUCTION Modernizaton Factory Improvements Productivity Center Field Visits/SIte Surveys

  12. Defense Commissary Agency Financial Reporting of Property, Plant, and Equipment.

    Science.gov (United States)

    1998-03-27

    ort DEFENSE COMMISSARY AGENCY FINANCIAL REPORTING OF PROPERTY, PLANT, AND EQUIPMENT Report Number 98-097 March 27, 1998 Office of the Inspector...UNDER SECRETARY OF DEFENSE (COMPTROLLER) DIRECTOR, DEFENSE COMMISSARY AGENCY SUBJECT: Audit Report on Defense Commissary Agency Financial Reporting of...General for Auditing Office of the Inspector General, DoD Report No. 98-097 March 27, 1998 (Project No. 7FJ-2026) Defense Commissary Agency Financial

  13. Information Technology Management: The Development of the Navy Standard Integrated Personnel System

    Science.gov (United States)

    2003-03-12

    Information Technology Management Department of Defense Office of the Inspector General March 12, 2003 AccountabilityIntegrityQuality The...from... to) - Title and Subtitle Information Technology Management : The Development of the Navy Standard Integrated Personnel System Contract

  14. Viral infection and host defense.

    Science.gov (United States)

    Carter, W A; De Clercq, E

    1974-12-27

    Double-stranded RNA, made as an intermediary substance in the replication of most, if not all, viruses, may play a much more important role in the pathogenesis and the recovery from virus infections than has hitherto been suspected. Apparently, dsRNA is used by both the challenge virus and the host cell in an attempt to gain "molecular control." Double-stranded RNA exerts a set of effects, which may be well balanced, not only at the level of the individual cell but also at the complex assemblage of these cells termed the organism (Fig. 1). In the cell, interferon synthesis is triggered, although interferon mRNA translation may not occur if dsRNA shuts off protein synthesis too quickly. In the whole organism, the disease severity will depend on how certain toxic reactions evoked by infection (such as cell necrosis and fever) are counterbalanced by an increase in the host defense mechanisms (for example, immune responsiveness and interferon production). Many aspects of the response, relating to either progress of, or recovery from, the disease, can be explained on the basis of a dsRNA. In addition to drawing attention to the biodynamic role of dsRNA, our hypothesis suggests specific experimental vectors designed to enhance our information on the molecular basis of the morbid process which occurs with viral infection. Finally, we suggest that, although the dsRNA molecule may be viewed as a rather simple unit structure, the opportunity for further diversity in the biological activity of a given dsRNA molecule always exists. Namely, each deviation from a perfectly double-helical arrangement introduces the possibility for emphasizing one biological reactivity at the expense of another. This latter structure-activity property may partially account for the extreme apparent diversity, commonly encountered, in the presentations of virologic illness. Appendix note added in proof. Subsequent to submission of this text, we have found that the potent mitogen effect of dsRNA for

  15. The future of planetary defense

    Science.gov (United States)

    Mainzer, A.

    2017-04-01

    Asteroids and comets have impacted Earth in the past and will do so in the future. While the frequency of impacts is reasonably well understood on geologic timescales, it is difficult to predict the next sizeable impact on human timescales by extrapolation from population statistics alone. Fortunately, by identifying and tracking individual objects, we can make precise predictions of any potential close encounters with Earth. As more advance notice is provided, the range of possible mitigation options expands. While the chance of an impact is very small, the potential consequences can be severe, meaning that sensible risk reduction measures should be undertaken. By implementing surveys, the risk of an unforeseen impact can be greatly reduced: the first step is finding the objects. Fortunately, the worldwide community of professional and amateur astronomers has made significant progress in discovering large near-Earth objects (NEOs). More than 95% of NEOs capable of causing global devastation (objects larger than 1 km in diameter) have been discovered, and none of these pose an impact hazard in the near future. Infrastructure is in place to link observations and compute close approaches in real time. Interagency and international collaborations have been undertaken to strengthen cooperative efforts to plan potential mitigation and civil defense campaigns. Yet much remains to be done. Approximately 70% of NEOs larger than 140 m (large enough to cause severe regional damage) remain undiscovered. With the existing surveys, it will take decades to identify the rest. Progress can be accelerated by undertaking new surveys with improved sensitivity.Plain Language SummaryAsteroids and comets have impacted Earth in the past and will do so in the future. Fortunately, by identifying and tracking them, we have the ability to predict any potential close encounters with Earth. By observing the sky repeatedly to search for near-Earth objects, the risk of an unforeseen impact can

  16. Department of Defense Inspector General Semiannual Report for Transmission to Congress April 1, 2005 - September 30, 2005

    Science.gov (United States)

    2005-09-01

    Technology Management Acquisition Processes and Contract Management Financial Management Health Care Logistics Infrastructure and Environment This chapter...magnitude of the information technology management challenge continues to be extremely problematic for the Department. A root cause of this difficulty is...Defense 2 0 0 2 Human Capital 1 4 0 5 Information Technology Management 2 7 2 11 Acquisition Processes and Contract Management 0 7 0 7 Financial

  17. The growing impact of satellite data in daily life

    Science.gov (United States)

    Stramondo, Salvatore

    2015-04-01

    Satellite images have a growing role in our daily life. Weather previsions, telecommunications, environmental planning, disaster mitigation and monitoring: these are only some of the fieldworks where space remote sensing data, and related processing techniques, provide extremely useful information to policy/decision makers, scientists, or to the "simple" citizen. The demonstration of the level of attention provided by the International Community to the impact of new technologies and satellite Earth Observation, in particular, onto everyday life is testified by the recent and forthcoming project calls. Horizon 2020, for instance, identified "Societal challenges" and "Science with and for Society" among the main pillars. In sub-themes we may read references to the "Environment", "Secure societies", "Climate changes", and many others, most of which soliciting the use of remote sensing technologies. In such scenario the scientists should be conscious about the capabilities and the implications in applying new technologies. Recent examples might be explanatory. Satellite data properly managed can be used to measure millimetric and/or centimetric movements of buildings and infrastructures. It has been demonstrated how long term monitoring of urban areas detecting pre-collapse deformations might provide useful hints to prevent such dramatic events. Or, in different frameworks, satellite data can be an advanced instrument for intelligence and military purposes. With such premises, ethic issues assume a key role to properly address the use of satellite technologies.

  18. 76 FR 61279 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Member (DFARS Case...

    Science.gov (United States)

    2011-10-04

    ... (DFARS) to implement section 3504 of the National Defense ] Authorization Act for Fiscal Year 2009... Defense Authorization Act (NDAA) for Fiscal Year (FY) 2009 (Pub. L. 110-417). Section 3504 amended section.... nonimmigrant visa for an individual to enter the U.S. temporarily for business as required for an alien to be...

  19. Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.

    Science.gov (United States)

    Rovner, Mark

    Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…

  20. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    NARCIS (Netherlands)

    Gralepois, M.; Larrue, C.; Wiering, M.A.; Crabbé, A.; Tapsell, S.; Mees, H.; Ek, K.; Szwed, M.

    2016-01-01

    ABSTRACT. In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated

  1. Is flood defense changing in nature? Shifts in the flood defense strategy in six European countries

    Directory of Open Access Journals (Sweden)

    Mathilde Gralepois

    2016-12-01

    Full Text Available In many countries, flood defense has historically formed the core of flood risk management but this strategy is now evolving with the changing approach to risk management. This paper focuses on the neglected analysis of institutional changes within the flood defense strategies formulated and implemented in six European countries (Belgium, England, France, the Netherlands, Poland, and Sweden. The evolutions within the defense strategy over the last 30 years have been analyzed with the help of three mainstream institutional theories: a policy dynamics-oriented framework, a structure-oriented institutional theory on path dependency, and a policy actors-oriented analysis called the advocacy coalitions framework. We characterize the stability and evolution of the trends that affect the defense strategy in the six countries through four dimensions of a policy arrangement approach: actors, rules, resources, and discourses. We ask whether the strategy itself is changing radically, i.e., toward a discontinuous situation, and whether the processes of change are more incremental or radical. Our findings indicate that in the European countries studied, the position of defense strategy is continuous, as the classical role of flood defense remains dominant. With changing approaches to risk, integrated risk management, climate change, urban growth, participation in governance, and socioeconomic challenges, the flood defense strategy is increasingly under pressure to change. However, these changes can be defined as part of an adaptation of the defense strategy rather than as a real change in the nature of flood risk management.

  2. Satire og diskurs i The Daily Show

    OpenAIRE

    Rygaard, Alexander Leicht; Dall, Christoffer; Jakobsen, Sebastian Rasch; Duvander, Søren; Knøster, Morten; Kirkegaard, Elissa Valles; Wallin, Dea

    2014-01-01

    This project examines how The Daily Show and its host Jon Stewart takes part in the American political debate. Furthermore, the term satire is explained by linguist Paul Simpson who reckons that satire is not as much a genre as it is a practice of discourse. By the use of detailed statistics by Gallup and Pew Research Center, a picture of the American media and its consumers is provided to explain why The Daily Show has gained more viewership through the years. Throughout a critical discourse...

  3. Demo III: Department of Defense testbed for unmanned ground mobility

    Science.gov (United States)

    Shoemaker, Chuck M.; Bornstein, Jonathan A.; Myers, Scott D.; Brendle, Bruce E., Jr.

    1999-07-01

    Robotics has been identified by numerous recent Department of Defense (DOD) studies as a key enabling technology for future military operational concepts. The Demo III Program is a multiyear effort encompassing technology development and demonstration on testbed platforms, together with modeling simulation and experimentation directed toward optimization of operational concepts to employ this technology. Primary program focus is the advancement of capabilities for autonomous mobility through unstructured environments, concentrating on both perception and intelligent control technology. The scout mission will provide the military operational context for demonstration of this technology, although a significant emphasis is being placed upon both hardware and software modularity to permit rapid extension to other military missions. The Experimental Unmanned Vehicle (XUV) is a small (approximately 1150 kg, V-22 transportable) technology testbed vehicle designed for experimentation with multiple military operational concepts. Currently under development, the XUV is scheduled for roll-out in Summer 1999, with an initial troop experimentation to be conducted in September 1999. Though small, and relatively lightweight, modeling has shown the chassis capable of automotive mobility comparable to the current Army lightweight high-mobility, multipurpose, wheeled vehicle (HMMWV). The XUV design couples multisensor perception with intelligent control to permit autonomous cross-country navigation at speeds of up to 32 kph during daylight and 16 kph during hours of darkness. A small, lightweight, highly capable user interface will permit intuitive control of the XUV by troops from current-generation tactical vehicles. When it concludes in 2002, Demo III will provide the military with both the technology and the initial experience required to develop and field the first generation of semi-autonomous tactical ground vehicles for combat, combat support, and logistics applications.

  4. Online detection of waterborne bioavailable copper by valve daily rhythms in freshwater clam Corbicula fluminea.

    Science.gov (United States)

    Jou, L J; Chen, W Y; Liao, C M

    2009-08-01

    Freshwater clam Corbicula fluminea, a surrogate species in metal toxicity testing, is a promising bioindicator of impairment in aquatic ecosystems. Little is known, however, about the relationship between clam valve daily rhythmic response and metal bioavailability related to a metal biological early warning system (BEWS) design. The purpose of this study was to link biotic ligand model (BLM)-based bioavailability and valve daily rhythm in C. fluminea to design a biomonitoring system for online in situ detection of waterborne copper (Cu). We integrated the Hill-based dose-time-response function and the fitted daily rhythm function of valve closure into a constructed programmatic mechanism. The functional presentation of the present dynamic system was completely demonstrated by employing a LabVIEW graphic control program in a personal computer. We used site-specific effect concentration causing 10% of total valve closure response (EC10) as the detection threshold to implement the proposed C. fluminea-based Cu BEWS. Here our results show that the proposed C. fluminea-based BEWS could be deliberately synthesized to online in situ transmit rapidly the information on waterborne bioavailable Cu levels under various aquatic environmental conditions through monitoring the valve daily rhythmic changes. We suggested that the developed C. fluminea-based dynamic biomonitoring system could assist in developing technically defensible site-specific water quality criteria to promote more efficient uses in water resources for protection of species health in aquatic environments.

  5. Precipitation affects plant communication and defense.

    Science.gov (United States)

    Pezzola, Enrico; Mancuso, Stefano; Karban, Richard

    2017-06-01

    Anti-herbivore defense shows high levels of both inter- and intraspecific variability. Defending against herbivores may be costly to the plant when it requires a tradeoff in allocation between defense and other missed opportunities, such as reproduction. Indeed, the plastic expression of defensive traits allows the plant to invest resources in defense only when the risk of being damaged actually increases, avoiding wasted resources. Plants may assess risk by responding to volatile cues emitted by neighbors that are under attack. Most plastic responses likely depend on environmental conditions. In this experiment, we investigated the effect of water availability on resistance induced by volatile cues in sagebrush. We found that plants receiving additional water over summer and/or volatile cues from neighbor donor plants showed reduced herbivore damage compared to control plants. Interestingly, we found no evidence of interactions between additional water and volatile cues. We performed an inferential analysis comparing historical records of the levels of herbivore damage during different years that had different temperature and precipitation accumulations. Results confirmed findings from the experiment, as the regression model indicated that sagebrush was better defended during wetter and hotter seasons. Reports from the literature indicated that sagebrush is extremely sensitive to water availability in the soil. We suggest that water availability may directly affect resistance of herbivory as well as sensitivity to cues of damage. Costs and benefits of allocating resources to defensive traits may vary with environmental conditions. © 2017 by the Ecological Society of America.

  6. Buildings Energy Technology

    Energy Technology Data Exchange (ETDEWEB)

    Cason, D.L.; Emmanuel, L. [eds.

    1996-11-01

    BET announces on a monthly basis current worldwide information available on the technology required for economic energy conservation in buildings and communities. It contains abstracts of DOE reports, journal articles, conference papers,patents,theses, and monographs added to the Energy Science and Technology Database during the past month. Also included are US information obtained through acquisition programs or interagency agreements and international information obtained through IEA`s Energy Technology Data Exchange or government- to-government agreements. The citations are available for online searching and retrieval; current information, added daily, is available to DOE and its contractors.

  7. Generalization effects of coping-skills training: influence of self-defense training on women's efficacy beliefs, assertiveness, and aggression.

    Science.gov (United States)

    Weitlauf, J C; Smith, R E; Cervone, D

    2000-08-01

    Concern for personal safety is a pervasive stressor for many women. Developing competencies in physical self-defense may empower women to engage more freely in daily activities with less fear. This study assessed the effects of physical self-defense training on multiple aspects of women's perceived self-efficacy and other self-reported personality characteristics. Training powerfully increased task-specific (self-defense) efficacy beliefs as well as physical and global efficacy beliefs. Training increased self-reported assertiveness, and posttraining decreases in hostility and aggression were found on several of the subscales of The Aggression Questionnaire (A. H. Buss & M. Perry, 1992), indicating that training did not have an aggression-disinhibiting effect. In the experimental condition, most of the effects were maintained (and some delayed effects appeared at follow-up.

  8. Maximum daily rainfall in South Korea

    Indian Academy of Sciences (India)

    sponding datasets are described in section 2. The data used are the annual maximum daily rainfall from 1961 to 2001. The models and the fitting procedures are described in section 3. We use the method of maximum likelihood for estimation and the profile likelihood method for the corresponding confidence intervals.

  9. Super 7: Daily Exercises in Problem Solving.

    Science.gov (United States)

    Hamilton, Octavia

    This book is a year-long program of daily exercises in problem solving for 2nd and 3rd grade students that presents 144 lessons, each with seven problems. The problems cover number sense, computation, measurements, geometry, problem solving, and patterns. The material is presented in a sequential fashion with concepts repeated and expanded, and…

  10. Big Ideas behind Daily 5 and CAFE

    Science.gov (United States)

    Boushey, Gail; Moser, Joan

    2012-01-01

    The Daily 5 and CAFE were born out of The Sister's research and observations of instructional mentors, their intense desire to be able to deliver highly intentional, focused instruction to small groups and individuals while the rest of the class was engaged in truly authentic reading and writing, and their understanding that a one size fits all…

  11. Daily storage management of hydroelectric facilities

    NARCIS (Netherlands)

    Chappin, E.J.L.; Ferrero, M.; Lazzeroni, P.; Lukszo, Z.; Olivero, M.; Repetto, M.

    2012-01-01

    This work presents a management procedure for hydroelectric facilities with daily storage. The water storage gives an additional degree of freedom allowing to shift in time power production when it is more convenient and to work at the maximum efficiency of hydraulic turbine. The management is

  12. Ribosomes Dance to a Daily Rhythm.

    Science.gov (United States)

    Iyer, Aishwarya; Grummt, Ingrid

    2017-08-01

    Sinturel et al. demonstrate that feeding-fasting rhythms and light-dark cycles direct daily changes in liver mass and cell size. These feeding-fasting- and light-dark-driven diurnal fluctuations are controlled by an unconventional mechanism that affects ribosome assembly and protein levels during the active phase. Copyright © 2017 Elsevier Ltd. All rights reserved.

  13. Professional ideals and daily practice in journalism

    DEFF Research Database (Denmark)

    Pihl-Thingvad, Signe

    2015-01-01

    of commitment, but until now these assumptions have never been empirically examined. This article provides new knowledge of the relationship between professional ideals and daily practice in journalism by describing the contours of the existing discrepancies in the generation of news in Denmark. In addition...

  14. On the Digital Daily Cycles of Individuals

    CERN Document Server

    Aledavood, Talayeh; Saramäki, Jari

    2015-01-01

    Humans, like almost all animals, are phase-locked to the diurnal cycle. Most of us sleep at night and are active through the day. Because we have evolved to function with this cycle, the circadian rhythm is deeply ingrained and even detectable at the biochemical level. However, within the broader day-night pattern, there are individual differences: e.g., some of us are intrinsically morning-active, while others prefer evenings. In this article, we look at digital daily cycles: circadian patterns of activity viewed through the lens of auto-recorded data of communication and online activity. We begin at the aggregate level, discuss earlier results, and illustrate differences between population-level daily rhythms in different media. Then we move on to the individual level, and show that there is a strong individual-level variation beyond averages: individuals typically have their distinctive daily pattern that persists in time. We conclude by discussing the driving forces behind these signature daily patterns, ...

  15. Outcomes of Chronic Daily Headache in Adolescents

    Directory of Open Access Journals (Sweden)

    J Gordon Millichap

    2007-03-01

    Full Text Available The outcomes and predictors of chronic daily headache (CDH were determined in a 2-year longitudinal study of a sample of 122 adolescents (32 male/90 female; ages 12-14 with annual telephone follow-up by neurologists at Taipei Veterans General Hospital, Taiwan.

  16. Do Daily Retail Gasoline Prices adjust Asymmetrically?

    NARCIS (Netherlands)

    L.J.H. Bettendorf (Leon); S.A. van der Geest (Stéphanie); G. Kuper

    2005-01-01

    textabstractThis paper analyzes adjustments in the Dutch retail gasoline prices. We estimate an error correction model on changes in the daily retail price for gasoline (taxes excluded) for the period 1996-2004 taking care of volatility clustering by estimating an EGARCH model. It turns out the

  17. Do daily retail gasoline prices adjust asymmetrically?

    NARCIS (Netherlands)

    Bettendorf, L.; van der Geest, S. A.; Kuper, G. H.

    2009-01-01

    This paper analyses adjustments in the Dutch retail gasoline prices. We estimate an error correction model on changes in the daily retail price for gasoline (taxes excluded) for the period 1996-2004, taking care of volatility clustering by estimating an EGARCH model. It turns out that the volatility

  18. The daily life of urban ethnic minorities

    NARCIS (Netherlands)

    Andries van den Broek; Saskia Keuzenkamp

    2008-01-01

    Original title: Het dagelijks leven van allochtone stedelingen. The integration of ethnic minorities in Dutch society is not an easy process. The present emphasis on the problems means there is little room for attention for the daily lives of people within the various ethnic groups. This

  19. Global daily dynamics of the pineal transcriptome

    DEFF Research Database (Denmark)

    Bustos, Diego M; Bailey, Michael J; Sugden, David

    2011-01-01

    Transcriptome profiling of the pineal gland has revealed night/day differences in the expression of a major fraction of the genes active in this tissue, with two-thirds of these being nocturnal increases. A set of over 600 transcripts exhibit two-fold to >100-fold daily differences in abundance...

  20. Maximum daily rainfall in South Korea

    Indian Academy of Sciences (India)

    Annual maxima of daily rainfall for the years 1961–2001 are modeled for five locations in South Korea (chosen to give a good geographical representation of the country). The generalized extreme value distribution is fitted to data from each location to describe the extremes of rainfall and to predict its future behavior.